Novel hybridized crow whale optimization and QoS based bipartite coverage routing for secure data transmission in wireless sensor networks

2021 ◽  
pp. 1-15
Author(s):  
Shahana Gajala Qureshi ◽  
Shishir Kumar Shandilya

WSN (Wireless Sensor Network) is a network of devices which can transfer the data collected from an examined field via wireless links. Thus secure data transmission is required for accurate transfer of data from source to destination as data passes through various intermediate nodes. The study intends to perform shortest, secure path routing on the basis of trust through novel Hybridized Crow Whale Optimization (H-CWO) and QoS based bipartite Coverage Routing (QOS-CR) as well as to analyze the system’s performance. Nodes are randomly deployed in the network area. Initially, a trust metric formation is implemented via novel H-CWO and the authenticated nodes are selected. Then through the secure routing protocol, Cluster head (CH) is selected to perform clustering. Neighbourhood hop prediction is executed to determine the shortest path routing and secure data transfer is performed through novel QOS-CR. The proposed system is analyzed by comparing it with various existing methods in terms of delay, throughput, energy and alive nodes. The results attained from comparative analysis revealed the efficiency of the proposed system. The proposed novel H-CWO and QOS-CR exhibited minimum delay, high throughput, energy and maximum alive nodes thereby ensuring safe transmission of data from source node to destination node.

10.29007/cchb ◽  
2018 ◽  
Author(s):  
Jignesh Joshi ◽  
Dr. Jagdish Rathod ◽  
Dr. Kinita Wandra

This paper proposes energy efficient LEACH protocol for secure data transmission for wireless networks. The proposed work uses Networks Simulator – NS2.27 for the simulation of cluster based routing protocol LEACH in wireless sensor network. The work is to enhance the performance of LEACH in terms of energy saving and secure data transmission. Instead of random selection of Cluster Head (CH) the selection method is based on residual energy and vicinity of the node. With this hybrid approach, the node, which is eligible for the CH, will become cluster head and it enhances the performance of traditional LEACH. Traditional LAECH does not support secure data transmission and authentication of nodes in the clusters. By adding security between CH and CM using XOR function and key management, secure data transmission and authentication is carried out for selected application where security is the most important aspect. The proposed LEACH enhances lifetime of the wireless sensor network with security.


Many researches have been proposed for efficiency of data transmission from sensor nodes to sink node for energy efficiency in wireless sensor networks. Among them, cluster-based methods have been preferred In this study, we used the angle formed with the sink node and the distance of the cluster members to calculate the probability of cluster head. Each sensor node sends measurement values to header candidates, and the header candidate node measures the probability value of the header with the value received from its candidate member nodes. To construct the cluster members, the data transfer direction is considered. We consider angle, distance, and direction as cluster header possibility value. Experimental results show that data transmission is proceeding in the direction of going to the sink node. We calculated and displayed the header possibility value of the neighbor nodes of the sensor node and confirmed the candidates of the cluster header for data transfer as the value. In this study, residual energy amount of each sensor node is not considered. In the next study, we calculate the value considering the residual energy amount of the node when measuring the header possibility value of the cluster.


2019 ◽  
Vol 8 (3) ◽  
pp. 8810-8814

The open idea of the remote medium abandons it powerless against deliberate impedance assaults, normally alluded to as sticking. This deliberate impedance with remote transmissions can be utilized as a platform for mounting Denialof-Service assaults on remote systems. Normally, sticking has been tended to under an outside danger demonstrate. Be that as it may, enemies with inner information of convention determinations and system insider facts can dispatch lowexertion sticking assaults that are hard to recognize and counter. In this work, we address the issue of particular sticking assaults in remote systems. In these assaults, the foe is dynamic just for a brief timeframe, specifically focusing on messages of high significance. We represent the benefits of particular sticking as far as system execution corruption and foe exertion by introducing two contextual investigations; a specific assault on TCP and one on navigation. We demonstrate that specific sticking assaults can be propelled by performing continuous bundle arrangement at the physical layer. To alleviate these assaults, we create three plans that avoid continuous parcel arrangement by joining cryptographic natives with physical-layer traits. We break down the security of our techniques and assess their computational and correspondence overhead


2020 ◽  
Vol 2020 ◽  
pp. 1-17
Author(s):  
Hwanseok Yang

MANET is utilized in many fields because of its advantage in quickly establishing networks. The network will perform well if mobile nodes trust each other and act cooperatively. However, dynamic topology characteristics and frequent connection failures by the movement of nodes make routing difficult and cause vulnerability to be easily exposed. Therefore, the routing provided in the MANET should have security features that can reduce the damage to various attacks. For this, in this paper, it is proposed for a trust evaluation method of nodes using cluster structure and a secure data transmission technique through key exchange without CA. The proposed technique adopted a hierarchical structure to enhance the efficiency of the reliability evaluation of nodes. The reliability measurement reflects the quality of packets as well as the number of packets and the measured reliability is maintained by the trust management node. The integrity of the data transmission is improved through key exchange without CA between the nodes. In order to increase the efficiency of routing, anomaly nodes are detected by DSN checking of nodes that generate excessive traffic on the path when data is transmitted. The proposed technique in this paper can maintain stably the network performance even in the presence of malicious nodes because it ensures reliability evaluation for nodes and the path setting between nodes and secure data transmission. The superior performance of the proposed trust-based model security routing technique was confirmed through comparative experiments for packet delivery ratio, end-to-end delay time, the number of control packets, network throughput, and average path length.


Sign in / Sign up

Export Citation Format

Share Document