scholarly journals FEBSRA: Fuzzy Trust Based Energy Aware Balanced Secure Routing Algorithm for Secured Communications in WSNs

Author(s):  
Anitha R ◽  
Tapas Bapu B R ◽  
Kuppusamy P G ◽  
Partheeban N ◽  
Sasikumar A N

Abstract Energy efficiency is playing major role in the design of a sensor network for improving the network lifetime and the trust is also important for providing the security to the data communication process. Delay is also major challenge today due to the enormous volume of network users. For overcoming all these issues, many researchers have been developed energy efficient security mechanisms for fulfilling the requirements. Even though, they are not able to satisfy the current requirements and users in terms of energy consumption, delay and security. For this purpose, this paper propose a new algorithm called Fuzzy Trust Based Energy Aware Balanced Secure Routing Algorithm (FEBSRA) which is able to provide the effective delay constrained secured routing algorithm which uses the fuzzy logic is a form of many-valued logic in which the truth values of variables may be any real number between 0 and 1 both inclusive for making final decision over sensor nodes with the consideration of number of hops between the source and destination nodes, energy level of the nodes and the trust scores. Moreover, a new trust model is also introduced new formulae for calculating the trust scores with the consideration of energy level of the communication delay which is calculated by using number of hops used for the specific communication. The experimental results of the proposed secured routing algorithm demonstrated that the performance in terms of energy consumption, less delay and high throughput with security is better when compared to the existing systems.

Wireless Sensor Networks (WSN) consists of a large amount of nodes connected in a self-directed manner. The most important problems in WSN are Energy, Routing, Security, etc., price of the sensor nodes and renovation of these networks is reasonable. The sensor node tools included a radio transceiver with an antenna and an energy source, usually a battery. WSN compute the environmental conditions such as temperature, sound, pollution levels, etc., WSN built the network with the help of nodes. A sensor community consists of many detection stations known as sensor nodes, every of which is small, light-weight and portable. Nodes are linked separately. Each node is linked into the sensors. In recent years WSN has grow to be an essential function in real world. The data’s are sent from end to end multiple nodes and gateways, the data’s are connected to other networks such as wireless Ethernet. MGEAR is the existing mechanism. It works with the routing and energy consumption. The principal problem of this work is choosing cluster head, and the selection is based on base station, so the manner is consumes energy. In this paper, develop the novel based hybrid protocol Low Energy Aware Gateway (LEAG). We used Zigbee techniques to reduce energy consumption and routing. Gateway is used to minimize the energy consumption and data is send to the base station. Nodes are used to transmit the data into the cluster head, it transmit the data into gateway and gateway compress and aggregate the data then sent to the base station. Simulation result shows our proposed mechanism consumes less energy, increased throughput, packet delivery ration and secure routing when compared to existing mechanism (MGEAR).


2021 ◽  
Author(s):  
Michael Ryan Sahai

Message security in multi-hop infrastructure-less networks such as Mobile Ad Hoc Net- works has proven to be a challenging task. A number of trust-based secure routing protocols has recently been introduced comprising of the traditional route discovery phase and a data transmission phase. In the latter, the action of relaying the data from one mobile node to another relies on the peculiarity of the wireless transmission medium as well as the capability of the source nodes to keep their energy level at an acceptable and reasonable level, posing another concern which is that of energy efficiency. This thesis proposes an Energy-Aware Trust Based Multi-path secured routing scheme (E-TBM) for MANETs, based on the dynamic source routing protocol (DSR). Results show that the E-TBM scheme outperforms the Trust Based Multi-path (TBM) secured routing scheme [1], chosen as a benchmark, in terms of energy consumption of the selected routing paths, number of dead nodes, trust compromise and route selection time, chosen as performance metrics.


Author(s):  
Kummathi Chenna Reddy ◽  
Geetha D. Devanagavi ◽  
Thippeswamy M. N.

Wireless sensor networks are typically operated on batteries. Therefore, in order to prolong network lifetime, an energy efficient routing algorithm is required. In this paper, an energy-aware routing protocol for the co-operative MIMO scheme in WSNs (EARPC) is presented. It is based on an improved cluster head selection method that considers the remaining energy level of a node and recent energy consumption of all nodes. This means that sensor nodes with lower energy levels are less likely to be chosen as cluster heads. Next, based on the cooperative node selection in each cluster, a virtual MIMO array is created, reducing uneven distribution of clusters. Simulation results show that the proposed routing protocol may reduce energy consumption and improve network lifetime compared with the LEACH protocol


2019 ◽  
Vol 105 (4) ◽  
pp. 1475-1490 ◽  
Author(s):  
M. Selvi ◽  
K. Thangaramya ◽  
Sannasi Ganapathy ◽  
K. Kulothungan ◽  
H. Khannah Nehemiah ◽  
...  

2013 ◽  
Vol 325-326 ◽  
pp. 1032-1036
Author(s):  
Li Quan Chen

Multi-path routing is an important routing method for wireless sensor networks, which can ensure the reliability of data transmission, balance the consumption of nodes energy, meet the network service quality, etc. But it cant effectively resist the attacks from malicious node.This paper proposes a secure multipath routing algorithm based on trust model, which can effectively achieve the secure routing of wireless sensor network. The algorithm make trust evaluation for cluster head nodes, and use nodes trust value to measure the reliability of next hop node, then calculate the number of multipath that meet the expected secure requirement, so as to build the trust multipath routing. The simulation results show that the algorithm can effectively reduce the consumption of energy, prolong the lifetime of network, and ensure the routing security of wireless sensor network.


2021 ◽  
Author(s):  
Michael Ryan Sahai

Message security in multi-hop infrastructure-less networks such as Mobile Ad Hoc Net- works has proven to be a challenging task. A number of trust-based secure routing protocols has recently been introduced comprising of the traditional route discovery phase and a data transmission phase. In the latter, the action of relaying the data from one mobile node to another relies on the peculiarity of the wireless transmission medium as well as the capability of the source nodes to keep their energy level at an acceptable and reasonable level, posing another concern which is that of energy efficiency. This thesis proposes an Energy-Aware Trust Based Multi-path secured routing scheme (E-TBM) for MANETs, based on the dynamic source routing protocol (DSR). Results show that the E-TBM scheme outperforms the Trust Based Multi-path (TBM) secured routing scheme [1], chosen as a benchmark, in terms of energy consumption of the selected routing paths, number of dead nodes, trust compromise and route selection time, chosen as performance metrics.


2015 ◽  
Vol 764-765 ◽  
pp. 827-831
Author(s):  
Yung Fa Huang ◽  
Tan Hsu Tan ◽  
Yau Der Wang ◽  
Young Long Chen ◽  
Neng Chung Wang

In this paper, we propose an improved routing algorithm to prolong network lifetime of wireless sensor networks (WSNs) by combining the shortest hop routing tree (SHORT) algorithm and the, turn off redundant node (TORN) MAC layer protocol to cross layer SHORTORN scheme. Moreover, to prolong the lifetime of the first node death (FND) in networks, the rate of energy consumption should be balanced for all nodes. Therefore, this paper further proposes a load balancing SHORTORN scheme by combining the weight and energy-aware, called energy-aware weight-based SHORTORN (EWSHORTORN). The proposed EWSHORTORN algorithm lets more nodes share the load of the leader and balances the opportunity of data relaying to all nodes. The proposed load balancing scheme allocates energy consumption load to be more uniformly among all nodes, thus the FNL can be prolonged evidently. Simulation results show that the proposed EWSHORTORN outperforms the SHORT scheme with double lifetime of FND.Keywords: wireless sensor networks, network lifetime, cross layer protocol, load balance.


2020 ◽  
Vol 14 ◽  
Author(s):  
M. Sivaram ◽  
V. Porkodi ◽  
Amin Salih Mohammed ◽  
S. Anbu Karuppusamy

Background: With the advent of IoT, the deployment of batteries with a limited lifetime in remote areas is a major concern. In certain conditions, the network lifetime gets restricted due to limited battery constraints. Subsequently, the collaborative approaches for key facilities help to reduce the constraint demands of the current security protocols. Aim: This work covers and combines a wide range of concepts linked by IoT based on security and energy efficiency. Specifically, this study examines the WSN energy efficiency problem in IoT and security for the management of threats in IoT through collaborative approaches and finally outlines the future. The concept of energy-efficient key protocols which clearly cover heterogeneous IoT communications among peers with different resources has been developed. Because of the low capacity of sensor nodes, energy efficiency in WSNs has been an important concern. Methods: Hence, in this paper, we present an algorithm for Artificial Bee Colony (ABC) which reviews security and energy consumption to discuss their constraints in the IoT scenarios. Results: The results of a detailed experimental assessment are analyzed in terms of communication cost, energy consumption and security, which prove the relevance of a proposed ABC approach and a key establishment. Conclusion: The validation of DTLS-ABC consists of designing an inter-node cooperation trust model for the creation of a trusted community of elements that are mutually supportive. Initial attempts to design the key methods for management are appropriate individual IoT devices. This gives the system designers, an option that considers the question of scalability.


Sign in / Sign up

Export Citation Format

Share Document