Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Secure and load-balanced routing protocol in wireless sensor network or disaster management

Distributed sensors are mainly used environment monitoring systems to monitor volcanic eruption, weather disaster, storm, tornadoes, hurricane, earthquake, and tsunami. The routing path of these networks is frequently affected by the presence of malicious and faulty nodes. The authors propose a secure, load-balanced routing (SLBR) protocol using wireless sensor networks for disaster management. The proposed protocol consists of a logical clustering technique and an efficient key management system. The improved moth-flame optimisation algorithm is used to compute the balanced clusters. The leader node is computed by the rank values with a tool of adaptive network-based fuzzy inference system. Then, the hybrid signcryption algorithm-based key management system for secure data transmission between the source node and destination node. The experimental result shows that the proposed SLBR protocol improves the security and balances the load compared to existing protocols.

References

    1. 1)
      • 29. Palani, U., Alamelumangai, V., Nachiappan, A.: ‘Hybrid routing and load balancing protocol for wireless sensor network’, Wirel. Netw., 2015, 22, (8), pp. 26592666.
    2. 2)
      • 27. Laxmi, P., Chilambuchelvan, A.: ‘GSR: geographic secured routing using SHA-3 algorithm for node and message authentication in wireless sensor networks’, Future Gener. Comput. Syst., 2017, 76, pp. 98105.
    3. 3)
      • 8. Sun, K., Ning, P., Wang, C.: ‘Secure and resilient clock synchronization in wireless sensor networks’, IEEE J. Sel. Areas Commun., 2006, 24, (2), pp. 395408.
    4. 4)
      • 9. Lou, W., Kwon, Y.: ‘H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks’, IEEE Trans. Veh. Technol., 2006, 55, (4), pp. 13201330.
    5. 5)
      • 13. Liu, A., Zheng, Z., Zhang, C., et al: ‘Secure and energy-efficient disjoint multipath routing for WSNs’, IEEE Trans. Veh. Technol., 2012, 61, (7), pp. 32553265.
    6. 6)
      • 14. Zhan, G., Shi, W., Deng, J.: ‘Design and implementation of TARF: a trust-aware routing framework for WSNs’, IEEE Trans. Dependable Secur. Comput., 2012, 9, (2), pp. 184197.
    7. 7)
      • 26. Oracevic, A., Akbas, S., Ozdemir, S.: ‘Secure and reliable object tracking in wireless sensor networks’, Comput. Secur., 2017, 70, pp. 307318.
    8. 8)
      • 16. Uluagac, A.S., Beyah, R.A., Copeland, J.: ‘Secure source-based loose synchronization (SOBAS) for wireless sensor networks’, IEEE Trans. Parallel Distrib. Syst., 2013, 24, (4), pp. 803813.
    9. 9)
      • 28. Sarma, H., Kar, A., Mall, R.: ‘A hierarchical and role based secure routing protocol for mobile wireless sensor networks’, Wirel. Pers. Commun., 2016, 90, (3), pp. 10671103.
    10. 10)
      • 5. Schurgers, C., Tsiatsis, V., Ganeriwal, S., et al: ‘Optimizing sensor networks in the energy-latency-density design space’, IEEE Trans. Mob. Comput., 2002, 1, (1), pp. 7080.
    11. 11)
      • 22. Ahmed, A., Bakar, K., Channa, M., et al: ‘A secure routing protocol with trust and energy awareness for wireless sensor network’, Mobile Netw. Appl., 2016, 21, (2), pp. 272285.
    12. 12)
      • 17. Saleem, K., Fisal, N., Al-Muhtadi, J.: ‘Empirical studies of bio-inspired self-organized secure autonomous routing protocol’, IEEE Sens. J., 2014, 14, (7), pp. 22322239.
    13. 13)
      • 2. Sohrabi, K., Gao, J., Ailawadhi, V., et al: ‘Protocols for self-organization of a wireless sensor network’, IEEE Pers. Commun., 2000, 7, (5), pp. 1627.
    14. 14)
      • 18. Duan, J., Gao, D., Yang, D., et al: ‘An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications’, IEEE Internet Things J., 2014, 1, (1), pp. 5869.
    15. 15)
      • 30. Mirjalili, S.: ‘Moth-flame optimization algorithm: a novel nature-inspired heuristic paradigm’, Knowl.-Based Syst., 2015, 89, pp. 228249.
    16. 16)
      • 11. Du, X., Guizani, M., Xiao, Y., et al: ‘Two tier secure routing protocol for heterogeneous sensor networks’, IEEE Trans. Wirel. Commun., 2007, 6, (9), pp. 33953401.
    17. 17)
      • 24. Liu, Y., Dong, M., Ota, K., et al: ‘Active trust: secure and trustable routing in wireless sensor networks’, IEEE Trans. Inf. Forensics Sec., 2016, 11, (9), pp. 20132027.
    18. 18)
      • 19. Senthil Kumaran, U., Ilango, P.: ‘Secure authentication and integrity techniques for randomized secured routing in WSN’, Wirel. Netw., 2014, 21, (2), pp. 443451.
    19. 19)
      • 10. Lazos, L., Poovendran, R.: ‘HiRLoc: high-resolution robust localization for wireless sensor networks’, IEEE J. Sel. Areas Commun., 2006, 24, (2), pp. 233246.
    20. 20)
      • 3. Fujieda, H., Horiike, Y., Yamarnoto, T., et al: ‘Errata: a wireless home network and its application’, IEEE Trans. Consum. Electron., 2000, 46, (3), pp. 920921.
    21. 21)
      • 6. Lindsey, S., Raghavendra, C., Sivalingam, K.: ‘Data gathering algorithms in sensor networks using energy metrics’, IEEE Trans. Parallel Distrib. Syst., 2002, 13, (9), pp. 924935.
    22. 22)
      • 15. Ganesh, S., Amutha, R.: ‘Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms’, J. Commun. Netw., 2013, 15, (4), pp. 422429.
    23. 23)
      • 20. Elhoseny, M., Elminir, H., Riad, A., et al: ‘A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption’, J. King Saudi Univ.-Comput. Inf. Sci., 2016, 28, (3), pp. 262275.
    24. 24)
      • 31. De Freitas, E.P., Heimfarth, T., Vinel, A., et al: ‘Cooperation among wirelessly connected static and mobile sensor nodes for surveillance applications’, Sensors, 2013, 13, (10), pp. 1290312928.
    25. 25)
      • 4. Schimetta, G., Dollinger, F., Weigel, R.: ‘A wireless pressure-measurement system using a SAW hybrid sensor’, IEEE Trans. Microw. Theory Tech., 2000, 48, (12), pp. 27302735.
    26. 26)
      • 7. Zhou, Y., Fang, Y.: ‘A two-layer key establishment scheme for wireless sensor networks’, IEEE Trans. Mob. Comput., 2007, 6, (9), pp. 10091020.
    27. 27)
      • 23. Qin, D., Yang, S., Jia, S., et al: ‘Research on trust sensing based secure routing mechanism for wireless sensor network’, IEEE Access, 2017, 5, pp. 95999609.
    28. 28)
      • 1. Gummalla, A.C.V., Limb, J.O.: ‘Wireless medium access control protocols’, IEEE Commun. Surv. Tutor,, 2000, 3, (2), pp. 215.
    29. 29)
      • 21. Marappan, P., Rodrigues, P.: ‘An energy efficient routing protocol for correlated data using CL-LEACH in WSN’, Wirel. Netw., 2015, 22, (4), pp. 14151423.
    30. 30)
      • 25. Razaque, A., Rizvi, S.: ‘Secure data aggregation using access control and authentication for wireless sensor networks’, Comput. Secur., 2017, 70, pp. 532545.
    31. 31)
      • 12. Murthy, S., D'Souza, R.J., Varaprasad, G.: ‘Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks’, IEEE Sens. J., 2012, 12, (10), pp. 29412949.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2018.5057
Loading

Related content

content/journals/10.1049/iet-ifs.2018.5057
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address