Browse > Article
http://dx.doi.org/10.3837/tiis.2021.10.019

An Energy- Efficient Optimal multi-dimensional location, Key and Trust Management Based Secure Routing Protocol for Wireless Sensor Network  

Mercy, S.Sudha (Department of Computer Science Engineering, Jeppiaar Institute of Technology)
Mathana, J.M. (Department of Electronics and Communications Engineering, St Peter's Institute of Higher Education and Research)
Jasmine, J.S.Leena (Department of Computer Science Engineering, Velammal Engineering College)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.15, no.10, 2021 , pp. 3834-3857 More about this Journal
Abstract
The design of cluster-based routing protocols is necessary for Wireless Sensor Networks (WSN). But, due to the lack of features, the traditional methods face issues, especially on unbalanced energy consumption of routing protocol. This work focuses on enhancing the security and energy efficiency of the system by proposing Energy Efficient Based Secure Routing Protocol (EESRP) which integrates trust management, optimization algorithm and key management. Initially, the locations of the deployed nodes are calculated along with their trust values. Here, packet transfer is maintained securely by compiling a Digital Signature Algorithm (DSA) and Elliptic Curve Cryptography (ECC) approach. Finally, trust, key, location and energy parameters are incorporated in Particle Swarm Optimization (PSO) and meta-heuristic based Harmony Search (HS) method to find the secure shortest path. Our results show that the energy consumption of the proposed approach is 1.06mJ during the transmission mode, and 8.69 mJ during the receive mode which is lower than the existing approaches. The average throughput and the average PDR for the attacks are also high with 72 and 62.5 respectively. The significance of the research is its ability to improve the performance metrics of existing work by combining the advantages of different approaches. After simulating the model, the results have been validated with conventional methods with respect to the number of live nodes, energy efficiency, network lifetime, packet loss rate, scalability, and energy consumption of routing protocol.
Keywords
WSN; Optimization; Energy Consumption; Network Routing Protocol; Clustering;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Hawa, K. A. Darabkh, R. Al-Zubi, and G. Al-Sukkar, "A Self-Learning MAC Protocol for Energy Harvesting and Spectrum Access in Cognitive Radio Sensor Networks," J. Sensors, vol. 2016, pp. 1-18, 2016.
2 K. A. Darabkh, W. Y. Albtoush, and I. F. Jafar, "Improved clustering algorithms for target tracking in wireless sensor networks," J. Supercomput., vol. 73, no. 5, pp. 1952-1977, May 2017.   DOI
3 G. P. Gupta, M. Misra, and K. Garg, "Energy and trust aware mobile agent migration protocol for data aggregation in wireless sensor networks," J. Netw. Comput. Appl., vol. 41, pp. 300-311, May 2014.   DOI
4 W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks," in Proc. of the 33rd Annual Hawaii International Conference on System Sciences, vol. vol.1, p. 10, 2000.
5 M. Ahmadi, M. Shojafar, A. Khademzadeh, K. Badie, and R. Tavoli, "A Hybrid Algorithm for Preserving Energy and Delay Routing in Mobile Ad-Hoc Networks," Wirel. Pers. Commun., vol. 85, no. 4, pp. 2485-2505, Dec. 2015.   DOI
6 L. Sheng, J. Shao, and J. Ding, "A Novel Energy-Efficient Approach to DSR Based Routing Protocol for Ad Hoc Network," in Proc. of 2010 International Conference on Electrical and Control Engineering, pp. 2618-2620, Jun. 2010.
7 Y. Shi and R. Eberhart, "Parameter selection in particle swarm optimization," in Proc. of Proc. 7th Int. Conf. Evolutionary Programming, pp. 591-601, 1998.
8 Sugandh and R. Panday, "Energy Efficient-Long Life LEACH Variant Protocol for MANET Environment," Int. J. Comput. Sci. Inf. Technol., vol. 7, no. 5, pp. 2320-2325, 2016.
9 F. T. Zuhra, K. A. Bakar, A. Ahmed, and M. A. Tunio, "Routing protocols in wireless body sensor networks: A comprehensive survey," J. Netw. Comput. Appl., vol. 99, pp. 73-97, Dec. 2017.   DOI
10 M. Sheikhan and E. Hemmati, "PSO-Optimized Hopfield Neural Network-Based Multipath Routing for Mobile Ad-hoc Networks," Int. J. Comput. Intell. Syst., vol. 5, no. 3, pp. 568-581, 2012.   DOI
11 R. PushpaLakshmi, P. Lavanya, and S. Bhuvaneshwari, "Survey of ACO and PSO based Secure Routing protocols for Wireless networks," Int. J. Adv. Res. Sci. Eng., vol. 6, no. 12, pp. 820-832, 2017.
12 A. Behera and A. Panigrahi, "Determining the Network Throughput and Flow Rate Using GSR and AAL2R," Int. J. UbiComp, vol. 6, no. 3, pp. 9-18, Jul. 2015.   DOI
13 S. Sharma and P. S. Patheja, "Improving AODV Routing Protocol with Priority and Power Efficiency in Mobile Ad hoc WiMAX Network," Int. J. Comput. Technol. Electron. Eng., vol. 2, no. 1, pp. 87-93, 2002.
14 V. Sivaprasatham and J. Venkateswaran, "A Secure Key Management Technique for Wireless Body Area Networks," J. Comput. Sci., vol. 8, no. 11, pp. 1780-1787, Nov. 2012.   DOI
15 N. Bradai, L. Chaari, and L. Kamoun, "A Comprehensive Overview of Wireless Body Area Networks (WBAN)," Int. J. E-Health Med. Commun., vol. 2, no. 3, pp. 1-30, Jul. 2011.
16 M. Masdari and S. Ahmadzadeh, "Comprehensive analysis of the authentication methods in wireless body area networks," Secur. Commun. Networks, vol. 9, no. 17, pp. 4777-4803, Nov. 2016.   DOI
17 S. Sankaran, M. Husain, and R. Sridhar, "IDKEYMAN: An Identity-Based Key Management Scheme for Wireless Ad Hoc Body Area Networks," in Proc. of 5th Annu. Symp. Inf. Assur., 2009.
18 D. M. Barakah and M. Ammad-uddin, "A Survey of Challenges and Applications of Wireless Body Area Network (WBAN) and Role of a Virtual Doctor Server in Existing Architecture," in Proc. of 2012 Third International Conference on Intelligent Systems Modelling and Simulation, pp. 214-219, Feb. 2012.
19 S. Saleem, S. Ullah, and H. Seon Yoo, "On the Security Issues in Wireless Body Area Networks," vol. 3, 2009.
20 K. K. Khaing and K. M. M. Aung, "Secured Key Distribution Scheme for Cryptographic Key Management System," in Proc. of 2010 International Conference on Availability, Reliability and Security, pp. 481-486, Feb. 2010.
21 D. Satish kumar, N. Nagarajan, and A. Taher Azar, "An Improved Key Management Scheme with High Security in Wireless Sensor Networks," Mobile Ad-Hoc and Sensor Networks. MSN 2007. Lecture Notes in Computer Science, pp. 249-264, 2014.
22 N. Bradai, S. Belhaj, L. Chaari, and L. Kamoun, "Study of medium access mechanisms under IEEE 802.15.6 standard," in Proc. of 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011), pp. 1-6, Oct. 2011.
23 J. Govindasamy and S. Punniakody, "A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack," J. Electr. Syst. Inf. Technol., vol. 5, no. 3, pp. 735-744, Dec. 2018.   DOI
24 M. Khabbazian, H. Mercier, and V. K. Bhargava, "Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks," IEEE Trans. Wirel. Commun., vol. 8, no. 2, pp. 736-745, Feb. 2009.   DOI
25 N. Sharma, B. M. Singh, and K. Singh, "QoS-based energy-efficient protocols for wireless sensor network," Sustain. Comput. Informatics Syst., vol. 30, p. 100425, Jun. 2021.   DOI
26 H. Lin, J. Ma, J. Hu, and K. Yang, "PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks," EURASIP J. Wirel. Commun. Netw., vol. 2012, no. 1, p. 69, Dec. 2012.   DOI
27 M. Sbeiti, N. Goddemeier, D. Behnke, and C. Wietfeld, "PASER: Secure and Efficient Routing Approach for Airborne Mesh Networks," IEEE Trans. Wirel. Commun., vol. 15, no. 3, pp. 1950-1964, Mar. 2016.   DOI
28 H. Lin, J. Hu, L. Xu, Y. Tian, L. Liu, and S. Blakeway, "A trustworthy and energy-aware routing protocol in software-defined wireless mesh networks," Comput. Electr. Eng., vol. 64, pp. 407-419, Nov. 2017.   DOI
29 M. A. Adnan, M. A. Razzaque, M. A. Abedin, S. M. Salim Reza, and M. R. Hussein, "A Novel Cuckoo Search Based Clustering Algorithm for Wireless Sensor Networks," pp. 621-634, 2016.
30 B. Baisakh, "A Review of Energy Efficient Dynamic Source Routing Protocol for Mobile Ad Hoc Networks," Int. J. Comput. Appl., vol. 68, no. 20, pp. 6-15, Apr. 2013.   DOI
31 S. Nikoletseas and P. Spirakis, "Probabilistic Distributed Algorithms for Energy Efficient Routing and Tracking in Wireless Sensor Networks," Algorithms, vol. 2, no. 1, pp. 121-157, Feb. 2009.   DOI
32 A. Alemdar and M. Ibnkahla, "Wireless sensor networks: Applications and challenges," in Proc. of 2007 9th International Symposium on Signal Processing and Its Applications, pp. 1-6, Feb. 2007.
33 D. Mehta and S. Saxena, "MCH-EOR: Multi-objective Cluster Head Based Energy-aware Optimized Routing algorithm in Wireless Sensor Networks," Sustain. Comput. Informatics Syst., vol. 28, p. 100406, Dec. 2020.   DOI
34 S. N. Ramli and R. Ahmad, "Surveying the Wireless Body Area Network in the realm of wireless communication," in Proc. of 2011 7th International Conference on Information Assurance and Security (IAS), pp. 58-61, Dec. 2011.
35 S. Dhanalakshmi and M. Sathiya, "An Improved Ant Based Routing Technique in WSN with High Security," no. September, pp. 1771-1778, 2015.
36 D. Srinath, V. Subedha, and S. Venkatraman, "ACO based mobile agent for secured key management in manet," ARPN J. Eng. Appl. Sci., vol. 10, no. 11, pp. 4877-4881, 2015.
37 S. Ganesh, "Efficient and Secure Routing Protocol for WSN-A Thesis," 2017.
38 T. Rahayu, S.-G. Lee, and H.-J. Lee, "A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation," Sensors, vol. 15, no. 7, pp. 15127-15158, Jun. 2015.   DOI
39 Z. Sun, M. Wei, Z. Zhang, and G. Qu, "Secure Routing Protocol based on Multi-objective Antcolony-optimization for wireless sensor networks," Appl. Soft Comput., vol. 77, pp. 366-375, Apr. 2019.   DOI
40 P. C. S. Rao, P. K. Jana, and H. Banka, "A particle swarm optimization based energy efficient cluster head selection algorithm for wireless sensor networks," Wirel. Networks, vol. 23, no. 7, pp. 2005-2020, Oct. 2017.   DOI
41 R. S. Y. Elhabyan and M. C. E. Yagoub, "Two-tier particle swarm optimization protocol for clustering and routing in wireless sensor network," J. Netw. Comput. Appl., vol. 52, pp. 116-128, Jun. 2015.   DOI
42 H.-H. Liu, J.-J. Su, and C.-F. Chou, "On Energy-Efficient Straight-Line Routing Protocol for Wireless Sensor Networks," IEEE Syst. J., vol. 11, no. 4, pp. 2374-2382, Dec. 2017.   DOI
43 T. Amgoth and P. K. Jana, "Energy-aware routing algorithm for wireless sensor networks," Comput. Electr. Eng., vol. 41, pp. 357-367, Jan. 2015.   DOI
44 W. Zhang, G. Han, Y. Feng, and J. Lloret, "IRPL: An energy efficient routing protocol for wireless sensor networks," J. Syst. Archit., vol. 75, pp. 35-49, Apr. 2017.   DOI
45 S. B. Lande and S. Z. Kawale, "Energy Efficient Routing Protocol for Wireless Sensor Networks," in Proc. of 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN), pp. 77-81, Dec. 2016.
46 K. A. Darabkh, N. J. Al-Maaitah, I. F. Jafar, and A. F. Khalifeh, "EA-CRP: A Novel Energy-aware Clustering and Routing Protocol in Wireless Sensor Networks," Comput. Electr. Eng., vol. 72, pp. 702-718, Nov. 2018.   DOI
47 S. Nikolidakis, D. Kandris, D. Vergados, and C. Douligeris, "Energy Efficient Routing in Wireless Sensor Networks Through Balanced Clustering," Algorithms, vol. 6, no. 1, pp. 29-42, Jan. 2013.   DOI
48 P. Khatri, "Using identity and trust with key management for achieving security in Ad hoc Networks," in Proc. of 2014 IEEE International Advance Computing Conference (IACC), pp. 271-275, Feb. 2014.
49 S. Sridhar, R. Baskaran, R. Anitha, R. Sankar, "Proficient and secured routing in MANET based on trust and energy supported AODV," Appl. Math. Inf. Sci., vol. 11, no. 3, pp. 807-817, 2017.   DOI
50 G. P. Gupta and S. Jha, "Integrated clustering and routing protocol for wireless sensor networks using Cuckoo and Harmony Search based metaheuristic techniques," Eng. Appl. Artif. Intell., vol. 68, pp. 101-109, Feb. 2018.   DOI
51 Z. Jin, Y. Jian-Ping, Z. Si-Wang, L. Ya-Ping, and L. Guang, "A Survey on Position-Based Routing Algorithms in Wireless Sensor Networks," Algorithms, vol. 2, no. 1, pp. 158-182, Feb. 2009.   DOI
52 F. Bao, I.-R. Chen, M. Chang, and J.-H. Cho, "Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection," IEEE Trans. Netw. Serv. Manag., vol. 9, no. 2, pp. 169-183, Jun. 2012.   DOI
53 R. Sujee and K. E. Kannammal, "Energy efficient adaptive clustering protocol based on genetic algorithm and genetic algorithm inter cluster communication for wireless sensor networks," in Proc. of 2017 International Conference on Computer Communication and Informatics (ICCCI), pp. 1-6, Jan. 2017,
54 K. Muthukumaran, K. Chitra, and C.Selvakumar, "An energy efficient clustering scheme using multilevel routing for wireless sensor network," Comput. Electr. Eng., vol. 69, pp. 642-652, Jul. 2018.   DOI