Open Access
Subscription Access
Open Access
Subscription Access
Improving the Security Based Routing Protocol for Wireless Sensor Networks
Subscribe/Renew Journal
Wireless sensor networks (WSNs) have become one of the most popular wireless communication systems in the world. Various attacks have been launched against the WSN individual nodes over the past few years, and the overall security of the network has gradually deteriorated. In this research, we propose a secure uneven clustering method for WSN. The proposed method is based on a trust score evaluation model with the objective of identifying malevolent users in WSNs. The trust score is used to determine whether or not a node is malicious. The results show that the proposed Trust Algorithm outperforms the currently used LEACH algorithm, the TASRP algorithm and the FLSO algorithm in terms of the percentage of packets that are successfully delivered across all use cases and density of nodes.
Keywords
Security, Routing Protocol, Wireless Sensor Network.
Subscription
Login to verify subscription
User
Font Size
Information
- S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks”, Proceedings of International Conference on Communication, Computing and Security, pp. 146-151, 2011.
- P. Vivekanandan and A. Sunitha Nadhini, “A Survey on Efficient Routing Protocol using Mobile Networks”, International Journal of Advances in Engineering and Technology, Vol. 6, No. 1, pp. 370-382, 2013.
- V. Balasubramanian and A. Karmouch, “Managing the Mobile Ad-Hoc Cloud Ecosystem using software Defined Networking Principles”, Proceedings of International Symposium on Networks, Computers and Communications, pp. 1-6, 2017.
- M. Maalej, S. Cherif and H. Besbes, “QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks”, The Scientific World Journal, Vol. 2013, pp. 1-11, 2013.
- M. Chen, T. Kwon, S. Mao, Y. Yuan and V.C. Leung, “Reliable and Energy-Efficient Routing Protocol in Dense Wireless Sensor Networks”, International Journal of Sensor Networks, Vol. 4, No. 1-2, pp. 104-112, 2008.
- S. Murthy and G. Varaprasad, “Digital Signature-based Secure Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks”, IEEE Sensors Journal, Vol. 12, No. 10, pp. 2941-2949, 2012.
- A. Ahmed and A.W. Khan, “TERP: A Trust and Energy Aware Routing Protocol for Wireless Sensor Network”, IEEE Sensors Journal, Vol .15, No. 12, pp. 6962-6972, 2015.
- T. Khan and K. Singh, “TASRP: A Trust Aware Secure Routing Protocol for Wireless Sensor Networks”, International Journal of Innovative Computing and Applications, Vol. 12, No. 2-3, pp. 108-122, 2021.
- L. Gong and Z. Zhao, “Fine-Grained Trust-Based Routing Algorithm for Wireless Sensor Networks”, Mobile Networks and Applications, Vol. 2021, pp. 1-10, 2021.
- W. Lou, “An Efficient N-to-1 Multipath Routing Protocol in Wireless Sensor Networks”, Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems, pp. 1-8, 2005.
- K. Zhang and C. Wang, “A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks using Group Key Management”, Proceedings of IEEE International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-5, 2008.
- R. Sumathi and M.G. Srinivas, “A Survey of QoS Based Routing Protocols for Wireless Sensor Networks”, Journal of Information Processing Systems, Vol. 8, No. 4, pp. 589- 602, 2012.
- L. Daanoune and A. Ballouk, “A Comprehensive Survey on LEACH-based Clustering Routing Protocols in Wireless Sensor Networks”, Ad Hoc Networks, Vol. 114, pp. 102409- 102415, 2021.
- S. Kaur and R. Mahajan, “Hybrid Meta-Heuristic Optimization based Energy Efficient Protocol for Wireless Sensor Networks”, Egyptian Informatics Journal, Vol. 19, No. 3, pp. 145-150, 2018.
- U. Meena and A. Sharma, “Secure Key Agreement with Rekeying using FLSO Routing Protocol in Wireless Sensor Network”, Wireless Personal Communications, Vol. 101, pp. 1177-1199, 2018.
Abstract Views: 182
PDF Views: 0