scholarly journals ENERGY EFFICIENT MULTI-TIER SUSTAINABLE SECURE ROUTING PROTOCOL FOR MOBILE WIRELESS SENSOR NETWORKS

2019 ◽  
Vol 01 (02) ◽  
pp. 87-102 ◽  
Author(s):  
Jennifer S. Raj ◽  
Smys S ◽  
Abul Bashar

The advanced progress in wireless communication pays attention on information of more sensitivity to be delivered to its destined end with numerous of restrains, such as reliableness, constancy, response time and safety. The advancements in digital gadgetry, the usage of unwired transceivers and microcontrollers has made viable the integration of sensing and computing device with transceivers and power units to form a single unit called sensor nodes, the enveloping of sensor nodes form wireless sensor nodes. Innumerable existing proposals have aimed at the energy efficient and secure transmission of data but have achieved any one at the cost of the other. Noting down the issues of the existing method this paper proposes an energy efficient multi-tier sustainable secure routing protocol (EEMSR) for mobile wireless sensor nodes which is a cohabit of multi-tier secure routing with an AL (Ant Lion) optimizer (CoMSR-ALO) along with the prime curve cryptography supported by the routing formed in spherical structure. This better encryption and decryption method takes the edge of power consumption and offers control over the utilization of energy which is difficult to be achieved when dispatching the pack and also avoids the intervention of the encroacher and improves the security and minimizes the deprivation caused due the information lost.

Sensors ◽  
2018 ◽  
Vol 18 (12) ◽  
pp. 4278 ◽  
Author(s):  
Muqeet Ahmad ◽  
Tianrui Li ◽  
Zahid Khan ◽  
Faisal Khurshid ◽  
Mushtaq Ahmad

In mobile wireless sensor network (MWSN), the lifetime of the network largely depends on energy efficient routing protocol. In the literature, cluster leader (CL) is selected based on remaining energy of mobile sensor nodes to enhance sensor network lifetime. In this study, a novel connectivity-based Low-Energy Adaptive Clustering Hierarchy-Mobile Energy Efficient and Connected (LEACH-MEEC) routing protocol was proposed, where CL is selected based on connectivity among neighboring nodes and the remaining energy of mobile sensor nodes. Consequently, it improves data delivery, network lifetime and balances the energy consumption. We studied various performance metrics including the number of alive nodes (NAN), remaining energy (RE) and packet delivery ratio (PDR). Our proposed LEACH-MEEC outperforms all other algorithms due to the connectivity metric. Moreover, the performance of mobility models was investigated through graphical and statistically tabulated results. The results show that Reference Point Group Mobility model (RPGM) is better than other mobility models.


Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


Author(s):  
Meng Yang ◽  
Donghyun Kim ◽  
Deying Li ◽  
Wenping Chen ◽  
Hongwei Du ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document