An Efficient Trust-Based Routing Model for Clustered-Based Hetrogeneous Wireless Sensor Network

Author(s):  
Gousia Thaniyath

Wireless sensor networks (WSN) play a very important role in providing real-time data access for big data and IoT application. The open deployment, energy constraint, and lack of centralized administration makes WSN very vulnerable to various kinds of malicious attacks. In WSN, identifying malicious sensor device and eliminating their sensed information play very important roles for mission critical applications. Standard cryptography and authentication schemes cannot be directly used in WSN because of the resource constraint nature of sensor devices. Thus, energy efficient and low latency methodology is required for minimizing the impact of malicious sensor devices. This paper presents a secure and load balanced routing (SLBR) scheme for heterogeneous clustered-based WSN. SLBR present better trust-based security metric that overcomes the problem when sensor keep oscillating for good to bad state and vice versa, and also balance load among CH. Thus, they aid in achieving better security, packet transmission, and energy efficiency performance. Experiments are conducted to evaluate the performance of proposed SLBR model over existing trust-based routing model, namely exponential cat swarm optimization (ECSO). The result attained shows SLBR models attain better performance than ECSO in terms of energy efficiency (i.e., network lifetime considering first sensor device death and total sensor device death), communication overhead, throughput, packet processing latency, malicious sensor device misclassification rate, and identification.

2015 ◽  
Vol 2015 ◽  
pp. 1-13 ◽  
Author(s):  
Seokhoon Kim ◽  
Hangki Joh ◽  
Seungjun Choi ◽  
Intae Ryoo

This paper presents a novel and sustainable medium access control (MAC) scheme for wireless sensor network (WSN) systems that process high-dimensional aggregated data. Based on a preamble signal and buffer threshold analysis, it maximizes the energy efficiency of the wireless sensor devices which have limited energy resources. The proposed group management MAC (GM-MAC) approach not only sets the buffer threshold value of a sensor device to be reciprocal to the preamble signal but also sets a transmittable group value to each sensor device by using the preamble signal of the sink node. The primary difference between the previous and the proposed approach is that existing state-of-the-art schemes use duty cycle and sleep mode to save energy consumption of individual sensor devices, whereas the proposed scheme employs the group management MAC scheme for sensor devices to maximize the overall energy efficiency of the whole WSN systems by minimizing the energy consumption of sensor devices located near the sink node. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of active time of sensor devices, transmission delay, control overhead, and energy consumption. Therefore, the proposed scheme is suitable for sensor devices in a variety of wireless sensor networking environments with high-dimensional data aggregate.


Author(s):  
Basavaraj G.N ◽  
Jaidhar C.D

<span>Wireless sensor network (WSN) has attained wide adoption across various sectors and is considered to be key component of future real-time application such as BigData, Internet of things (IoT) etc. The modern application requires low latency and scalable real-time data access considering heterogeneous network. However, provisioning low latency real-time data access incurs energy overhead among sensor device. Clustering technique aided in providing scalability and minimizing energy consumption among sensor device. However, it incurs energy overhead among cluster head and sensor device closer to sink. To address, many optimization technique is been presented in recent time for optimal cluster selection. However, these technique are designed considering homogenous network. To address, this work presented Low Latency and Energy Efficient Routing (LLEER) design for heterogeneous WSN. The LLEER adopts multi-objective function such as</span><span>connectivity, connection time, radio signal strength, coverage time, and network traffic for cluster head and hop node selection. Experiment are conducted to evaluate LLEER design shows significant performance improvement over state-of-art model in terms of network lifetime considering total node death, first node death, and loss of connectivity, communication overhead, and packet transmission latency. Proposed LLEER brings a good trade-off between energy efficiency, and latency requirement of future real-time application.<span>   </span></span>


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Wenting Li ◽  
Bin Li ◽  
Yiming Zhao ◽  
Ping Wang ◽  
Fushan Wei

Nowadays wireless sensor networks (WSNs) have drawn great attention from both industrial world and academic community. To facilitate real-time data access for external users from the sensor nodes directly, password-based authentication has become the prevalent authentication mechanism in the past decades. In this work, we investigate three foremost protocols in the area of password-based user authentication scheme for WSNs. Firstly, we analyze an efficient and anonymous protocol and demonstrate that though this protocol is equipped with a formal proof, it actually has several security loopholes been overlooked, such that it cannot resist against smart card loss attack and violate forward secrecy. Secondly, we scrutinize a lightweight protocol and point out that it cannot achieve the claimed security goal of forward secrecy, as well as suffering from user anonymity violation attack and offline password guessing attack. Thirdly, we find that an anonymous scheme fails to preserve two critical properties of forward secrecy and user friendliness. In addition, by adopting the “perfect forward secrecy (PFS)” principle, we provide several effective countermeasures to remedy the identified weaknesses. To test the necessity and effectiveness of our suggestions, we conduct a comparison of 10 representative schemes in terms of the underlying cryptographic primitives used for realizing forward secrecy.


2017 ◽  
Vol 2 (1) ◽  
Author(s):  
Palak Aggarwal ◽  
Santosh Kumar ◽  
Neha Garg ◽  
Sumeshwar Singh

Energy and security are very important issues in Wireless Sensor Networks (WSN) which need to be handled. These issues are interrelated because of limited energy there are some restrictions on implementation of security. Insider packet drop attack is one of the dangerous attacks for wireless sensor network that causes a heavy damage to WSN functionalities by dropping packets. It becomes necessary to identify such attack for secure routing of data in WSN. To detect this attack, trust mechanism has been proven as a successful technique. In this mechanism, each node verifies the trustworthiness of its neighbor node before packet transmission so that packets can only be transmitted to trustworthy nodes. But there is a problem of False Alarm with such trust-aware scheme. False alarm occurs when a good node’s trust value goes down due to natural packet dropping and being eliminated from the routing paths. This wastes network’s resources that further shortens network lifetime. In this paper, we have proposed a system for identification and recovery of false alarms (IRFA) which is the optimization of existing trust based system. But security solution needs to be energy efficient due to scarcity of energy resources in WSN. To provide energy efficiency, we have implemented proposed IRFA system in cluster based environment which detects insider packet drop attackers in an energy efficient manner. We have conducted OMNET++ simulation and results demonstrate that the proposed system performance is better than existing trust-based system in terms of packet delivery rate and energy efficiency which improves network lifetime.


2019 ◽  
Vol 887 ◽  
pp. 641-649
Author(s):  
Matthias Schuss ◽  
Farhang Tahmasebi ◽  
Ardeshir Mahdavi

Buildings are responsible for a major amount of the annual energy consumption. A detailed recording and evaluation of building data could provide a deeper understanding of building operation schemes and the corresponding performance. This could help building owners and operators to evaluate and better understand the actual situation. Based on this (real-time) data an optimized operation scheme can be designed and implemented for future time steps. Additionally, a more detailed understanding of the impact of previous building systems interactions will be possible. The building automation industry and the related service provider sector are actually providing proprietary solutions for data logging, visualization and energy optimization. Such solutions are regularly integrated into their own specific software of the used proprietary building management solutions. As an alternative, we suggest an Internet of Things (IoT) and web services inspired concept for the implementation of a generic web service for building diagnostics. Our suggestion encompasses a holistic performance evaluation that considers both the energy consumptions and delivered building service. In this contribution, a general design of a web service based solution is presented and the future possibilities for data access from various sources are discussed. Furthermore, details of actually developed and demonstratively implemented software components for data preprocessing are presented. Data processing examples for different types of data are included and highlight the potential of such web-based approaches. Moreover, possibilities for improved building control by the use of web services for operation schedule generation or model predictive control are illustrated and critically debated.


2018 ◽  
Vol 7 (4.35) ◽  
pp. 609 ◽  
Author(s):  
Hidayah Sulaiman ◽  
Asma Magaireh ◽  
Rohaini Ramli

With the ever increasing cost of investing in technological innovations and the amount of patient data to be processed on daily basis, healthcare organizations are in dire need for solutions that could provide easy access and better management of real time data with lower cost.  The emerging trend of organizations optimizing cost in investing less on physical hardware has brought about the use of cloud computing technology in various industries including healthcare.  The use of cloud computing technology has brought better efficiency in providing real time data access, bigger storage capacity and reduction of cost in terms of maintenance. Although numerous benefits have been publicized for organizations to adopt the technology, nevertheless the rate of adoption is still at is infancy. Hence, this study explores factors that may affect the adoption of cloud-based technology particularly within the healthcare context. A quantitative study was conducted through the distribution of survey in Jordanian healthcare facilities. The survey was conducted to gauge the understanding of cloud-based EHR concepts identified through literature and validate the factors that could potentially provide an impact towards the cloud-based EHR adoption. The theoretical underpinnings of Technology-Organization-Environment (TOE) were investigated in studying the impact towards the adoption of cloud-based EHR. Results indicate that Technology-Organization-Environment factors such as privacy, reliability, security, top management support, organizational readiness, competition and regulatory environment are critical factors towards the adoption of cloud technology within a healthcare setting.


2019 ◽  
Vol 17 (9) ◽  
pp. 733-738
Author(s):  
Yong-Qiang Zhou ◽  
Lei Dai ◽  
Suo-Ping Li

In this paper, we research the performance of direct and non-direct multiple relays cooperative truncated automatic repeat request (D/ND-MRCT-ARQ) protocols in wireless sensor networks (WSNs). We propose a method that named discrete time Markov chain (DTMC) with N + 2 states, which could obtain the throughput formulas of D/ND-MRCT-ARQ protocols. Furthermore, we solve the mathematical expressions of the average transmission delay of both protocols by truncating the number of packet retransmission. In addition, we derive energy efficiency formulas of both protocols under considering the different power consumption of each node. Simulation results demonstrate that the proposed D-MRCT-ARQ protocol achieve higher throughput and energy efficiency while fewer average packet transmission delay, as compared with the ND-MRCT-ARQ protocol.


Sign in / Sign up

Export Citation Format

Share Document