Empowered AODV Protocol in Wireless Sensor Network using Three Variable RSA Cryptosystem

2020 ◽  
Vol 13 (4) ◽  
pp. 718-724
Author(s):  
Amit K. Agarwal ◽  
Munesh Chandra ◽  
S.S. Sarangdevot

Background: The Wireless Sensor Network (WSN) is a type of networks which primarily designed for the purpose of monitoring in remote areas. It consists of communicating nodes (called sensor's) which communicate each other to share their data and passing the information to the central node. In many applications like defence requires the secure communication of information. However, due to the numerous characteristics of WSN such as open shared communication channel, limited memory, and processing power of sensors, etc. these networks are vulnerable to various attacks such as black hole, gray hole, etc. Objective: The objective of the paper is to secure the AODV routing protocol in WSN using cryptography techniques. Methods: In this paper, the Ad hoc On-demand Distance Vector (AODV) routing protocol has been chosen for information routing because of their lightweight processing capability. To provide secure communication in WSN, the AODV routing protocol is secured by utilizing the RSA key generation algorithm. Here, RSA with three variables (three prime numbers) is employed instead of two variables. Results: The effectiveness of the proposed approach in handling black hole attack is being verified through the simulation results obtained from the experiments conducted using Network Simulator tool (NS2). The three popular performance metrics namely Average End-to-End Delay, Packet Delivery Ratio, and Average Throughput are used for evaluation purpose. These results are observed under different pose time and varying number of malicious nodes. Conclusion: In this paper, a new three variable RSA cryptosystem-based security model is proposed to protect the communication against the Black Hole (BH) attack in wireless sensor networks. The use of three variables instead of two variables allows our model to provide more security as compared to other methods. Simulation results obtained from the experiments carried out using NS2 tool evident the performance of the proposed model over original AODV and other previous models.

2011 ◽  
Vol 467-469 ◽  
pp. 325-330
Author(s):  
Feng Tian ◽  
Li Lei Fan ◽  
Xiao Ping Sun ◽  
Ai Min Yao ◽  
Hua Yan Liu

Energy balance of nodes in wireless sensor network is a difficult point. In this paper, analyze the performance of AODV routing protocol applied to the coal mine WSN environment which has less mobile nodes. Base on its characteristic of lacking of energy efficiency and optimal route selection considerations, an improvement of AODV routing protocol is carried out. Route discovery phase of the algorithm use a cost metric routing strategy, according to the energy level of nodes and the quality of links to calculate the routing cost, lower cost routing path will be selected. Between efficient routing and energy balance make an effective trade-off, improve the delivery rate of the network.


2013 ◽  
Vol 291-294 ◽  
pp. 2532-2536
Author(s):  
Han Hua Yang

Multi path routing protocol plays important part in the multi hop heterogeneous wireless sensor network. To get better performance, adaptive Wireless Senor Network Multi Path Routing Scheme (AMRH) is proposed, which is made up of three phrases: initial setup, route discovery and establishment, route maintenance. In the first phrase, every node gets the initial route table. In the second phrase, source node will find minimum-cost path among multiple paths. In the third phrase, route maintenance is conducted under adaptive mechanism. Simulation shows that AMRH scheme can prolong sensor network lifetime by 19.5%, increase data delivery ratio by 5.6%.


2021 ◽  
Author(s):  
Mandana Jafarian

Emergency situations in mines result in loss of precious human lives. In this thesis we discussed architecture of a Wireless Sensor Network (WSN) that can be deployed in mines, which takes care of severe geographical and environmental constraints found inside mines. The proposed architecture is a two-level hierarchy of small sized WSNs that employs a wireless Mesh network as the backbone connecting small sized WSNs scattered inside mines. We proposed a routing protocol for that WSN that is optimized for both emergency and non-emergency data routing. Since our main goal is to provide safety in the mining environment, the main consideration of the routing protocol is to provide reliability and reduce the end-to-end delay for vital emergency traffic while optimizing for network longevity for non-emergency traffic. We present a new cost-based routing protocol called MDML, which provides Minimum Delay and Maximum Lifetime routing for such networks. The proposed MDML routing defines separate cost metrics for emergency and non-emergency traffic. It finds the least-cost path for the reliable delay-constrained emergency traffic with regards to link error rate but also gives secondary consideration to nodes' residual energy. It is an energy efficient routing scheme for non-emergency or regular data traffic routing that maximizes the network lifetime. However, for emergency traffic energy efficiency is compromised to achieving minimal delay. Regular traffic is generated through periodic monitoring and is delay-insensitive. For regular traffic delivery, a shortest path routinig algorithm is employed which uses link costs that reflect both the communication energy consumption rates and the residual energy levels at the two end nodes. Simulation results show that using the proposed emergency routes reduces the end-to-end delay for emergency traffic. The effect of protocol update cycle on increasing the network lifetime is verified true simulation. MDML is also compared with a simulated non-MDML approach to compare the lifetime and delay performance. Simulation results have demonstrated the effectiveness of our approach.


2014 ◽  
Vol 573 ◽  
pp. 418-423
Author(s):  
S. Asha Latha ◽  
A. Sivabalan

Wireless sensor networks consist of a network of autonomous sensors that can reconfigure themselves so as to sense the environment in the most significant manner. However, a significant challenge in the practical application of these networks exists in credible authentication and network security. This paper proposes a secure authentication protocol which is considered as a pro-active method, where a user is strongly verified before accessing the data, it is the modified Adhoc On-Demand Distance vector (AODV) Routing protocol that provides many security principles to the user such as checking sequence number, IP address and threshold values. The performance of proposed algorithm is compared with the existing alogorithm based on the following parameters such as Throughput, End to End delay and packet delivery ratio. The results shows that the proposed protocol possesses many advantages against the popular black hole attack. This work has been carried out using NS2 software and the result obtained testifies the effectiveness of the proposed protocol. Keyword: Authentication protocol, AES security, AODV routing protocol, Black hole attack, Wireless sensor network (WSN).


Sign in / Sign up

Export Citation Format

Share Document