Energy Consumption Analysis of Secure and Clustered Wireless Sensor Network

Author(s):  
Ashim Pokharel ◽  
Ethiopia Nigussie

Due to limited energy resources, different design strategies have been proposed in order to achieve better energy efficiency in wireless sensor networks, and organizing sensor nodes into clusters and data aggregation are among such solutions. In this work, secure communication protocol is added to clustered wireless sensor network. Security is a very important requirement that keeps the overall system usable and reliable by protecting the information in the network from attackers. The proposed and implemented AES block cipher provides confidentiality to the communication between nodes and base station. The energy efficiency of LEACH clustered network and with added security is analyzed in detail. In LEACH clustering along with the implemented data aggregation technique 48% energy has been saved compared to not clustered and no aggregation network. The energy consumption overhead of the AES-based security is 9.14%. The implementation is done in Contiki and the simulation is carried out in Cooja emulator using sky motes.

Author(s):  
Ashim Pokharel ◽  
Ethiopia Nigussie

Due to limited energy resources, different design strategies have been proposed in order to achieve better energy efficiency in wireless sensor networks, and organizing sensor nodes into clusters and data aggregation are among such solutions. In this work, secure communication protocol is added to clustered wireless sensor network. Security is a very important requirement that keeps the overall system usable and reliable by protecting the information in the network from attackers. The proposed and implemented AES block cipher provides confidentiality to the communication between nodes and base station. The energy efficiency of LEACH clustered network and with added security is analyzed in detail. In LEACH clustering along with the implemented data aggregation technique 48% energy has been saved compared to not clustered and no aggregation network. The energy consumption overhead of the AES-based security is 9.14%. The implementation is done in Contiki and the simulation is carried out in Cooja emulator using sky motes.


2014 ◽  
Vol 2014 ◽  
pp. 1-7 ◽  
Author(s):  
Hedieh Sajedi ◽  
Zahra Saadati

In recent years, wireless sensor networks have been used for various applications such as environmental monitoring, military and medical applications. A wireless sensor network uses a large number of sensor nodes that continuously collect and send data from a specific region to a base station. Data from sensors are collected from the study area in the common scenario of sensor networks. Afterward, sensed data is sent to the base station. However, neighboring sensors often lead to redundancy of data. Transmission of redundant data to the base station consumes energy and produces traffic, because process is run in a large network. Data aggregation was proposed in order to reduce redundancy in data transformation and traffic. The most popular communication protocol in this field is cluster based data aggregation. Clustering causes energy balance, but sometimes energy consumption is not efficient due to the long distance between cluster heads and base station. In another communication protocol, which is based on a tree construction, because of the short distance between the sensors, energy consumption is low. In this data aggregation approach, since each sensor node is considered as one of the vertices of a tree, the depth of tree is usually high. In this paper, an efficient hierarchical hybrid approach for data aggregation is presented. It reduces energy consumption based on clustering and minimum spanning tree. The benefit of combining clustering and tree structure is reducing the disadvantages of previous structures. The proposed method firstly employs clustering algorithm and then a minimum spanning tree is constructed based on cluster heads. Our proposed method was compared to LEACH which is a well-known data aggregation method in terms of energy consumption and the amount of energy remaining in each sensor network lifetime. Simulation results indicate that our proposed method is more efficient than LEACH algorithm considering energy consumption.


Author(s):  
Md. Habibur Rahman ◽  
Md. Ibrahim Abdullah

The nodes within a cluster of Wireless Sensor Network deployed in adverse areas face the security threats of eavesdropping and capturing. The fundamental issue in wireless sensor network security is to initialize secure communication between sensor nodes by setting up secret keys between communicating nodes. Because of limited hardware capacity, conventional network cryptography is infeasible for sensor network. In this paper a key management technique is proposed for clustered sensor network that uses some cryptographic operation to generate secret keys. This key is updated in response to the message of cluster head or base station. The key update instructions are stored in each sensor nodes before deployed in sensor field. The updated secret key is used to communicate between nodes and cluster head.


2020 ◽  
Vol 12 (1) ◽  
pp. 205-224
Author(s):  
Anshu Kumar Dwivedi DUBEY

Purpose ”“ In the recent scenario, there are various issues related to wireless sensor networks such as clustering, routing, packet loss, network strength. The core functionality of primarily wireless sensor networks is sensor nodes that are randomly scattered over a specific area. The sensor senses the data and sends it to the base station. Energy consumption is an important issue in wireless sensor networks. Clustering and cluster head selection is an important method used to extend the lifetime of wireless sensor networks. The main goal of this research article is to reduce energy consumption using a clustering process such as CH determination, cluster formation, and data dissemination.   Methodology/approach/design ”“ The simulation in this paper was finished utilizing MATLAB programming methodology and the proposed technique is contrasted with the LEACH and MOD-LEACH protocols.   Findings ”“ The simulation results of this research show that the energy consumption and dead node ratio are improved of wireless sensor networks as compared to the LEACH and MOD-LEACH algorithms.   Originality/value ”“ In the wireless sensor network there are various constraints energy is one of them. In order to solve this problem use CH selection algorithms to reduce energy consumption and consequently increase network lifetime.


Author(s):  
Shashi Bhushan ◽  
Manoj Kumar ◽  
Pramod Kumar ◽  
Thompson Stephan ◽  
Achyut Shankar ◽  
...  

AbstractWireless sensor network (WSN) is used to sense the environment, collect the data, and further transmit it to the base station (BS) for analysis. A synchronized tree-based approach is an efficient approach to aggregate data from various sensor nodes in a WSN environment. However, achieving energy efficiency in such a tree formation is challenging. In this research work, an algorithm named fuzzy attribute-based joint integrated scheduling and tree formation (FAJIT) technique for tree formation and parent node selection using fuzzy logic in a heterogeneous network is proposed. FAJIT mainly focuses on addressing the parent node selection problem in the heterogeneous network for aggregating different types of data packets to improve energy efficiency. The selection of parent nodes is performed based on the candidate nodes with the minimum number of dynamic neighbors. Fuzzy logic is applied in the case of an equal number of dynamic neighbors. In the proposed technique, fuzzy logic is first applied to WSN, and then min–max normalization is used to retrieve normalized weights (membership values) for the given edges of the graph. This membership value is used to denote the degree to which an element belongs to a set. Therefore, the node with the minimum sum of all weights is considered as the parent node. The result of FAJIT is compared with the distributed algorithm for Integrated tree Construction and data Aggregation (DICA) on various parameters: average schedule length, energy consumption data interval, the total number of transmission slots, control overhead, and energy consumption in the control phase. The results demonstrate that the proposed algorithm is better in terms of energy efficiency.


Robust and efficient algorithms for routing and other process for a wireless sensor network are under active development due to technological advancements on wireless transmission systems. Each of the sensor nodes in a wireless sensor network either transmits or forwards the data packets to the base station. The main objective of the majority of the work in the literature is to save the energy consumption efficiently. The cluster based routing mechanism helps to achieve low energy consumption within the network. The network organizes its nodes as a cluster and selects a particular node as cluster head to manage the transmission within and between clusters. The majority of the clustering approach selects the cluster head using a thresholding based approach. Nodes having energy level higher than the threshold are the candidates for the cluster head selection. In the proposed approach the nodes remaining energy and the sum of distance between individual nodes to the cluster head node is considered. Optimal cluster head selection will help to increase the overall life time of the network. The distance between the sensor nodes is estimated using RSSI (Received Signal Strength Indicator) and other parameters measured from the physical layer. Experiments are conducted with simulation environment created with the NS-2 simulator and efficiency of the approach is analyzed in detail.


2022 ◽  
Vol 2022 ◽  
pp. 1-25
Author(s):  
Gang Liu ◽  
Zhaobin Liu ◽  
Victor S. Sheng ◽  
Liang Zhang ◽  
Yuanfeng Yang

In wireless sensor network (WSN), the energy of sensor nodes is limited. Designing efficient routing method for reducing energy consumption and extending the WSN’s lifetime is important. This paper proposes a novel energy-efficient, static scenario-oriented routing method of WSN based on edge computing named the NEER, in which WSN is divided into several areas according to the coverage of gateway (or base station), and each of the areas is regarded as an edge area network (EAN). Each edge area network is abstracted into a weighted undirected graph model combined with the residual energy of the sensor nodes. The base station (or a gateway) calculates the optimal energy consumption path for all sensor nodes within its coverage, and the nodes then perform data transmission through their suggested optimal paths. The proposed method is verified by the simulations, and the results show that the proposed method may consume about 37% less energy compared with the conventional WSN routing protocol and can also effectively extend the lifetime of WSN.


2019 ◽  
Vol 8 (2) ◽  
pp. 3366-3371

A Wireless Sensor Network is a set of sensor nodes that are integrated with a physical environment. This tiny sensor node capable of sensing physical phenomena and it can process the sense data. Sensor nodes radio range is short so they transfer data in a multihop manner to form network which will send network activities to base station. Data transmission consumes much more energy than computation. So to overcome this problem data aggregation technique can be useful. This approach reduces energy consumption by avoiding repeated data. Security in wireless sensor network is also one of the important issues. Some properties of a WSN make it more harmed by certain types of attackers, compared to traditional wired network. Furthermore, constrained devices create their own problems for wireless sensor network. As sensor node is powered by batteries and node required lot of energy to perform some complex computation. So it is important to prevent every node in computation process which will save energy to gain longer network life. The focus of this work is provides confidentiality protecting hierarchical concealed data aggregation for WSN using privacy homomorphism. End to End Homomorphic Paillier cryptoscheme is used to achieve proposed approach.


2018 ◽  
Vol 7 (2.27) ◽  
pp. 138
Author(s):  
Kamini Joshi ◽  
Sandeep Singh Kang

The wireless sensor network is the decentralized type of network which can sense information and pass it to base station. The energy consumption is the major issue of WSN due to small of sensor nodes and far deployment of the network. The clustering is the efficient approach to increase lifetime of the sensor network. In the approach of clustering cluster head are selected for the data aggregation. The fuzzy logic rules are derived based on node energy, distance to base station for the cluster head selection, which increase lifetime of sensor nodes in the existing system. In this research work, cache nodes are deployed in the network which reduce energy consumption of WSN. In the proposed approach cluster head send data to cache nodes and it will forward data to base station. The simulation is performed in MATLAB and proposed technique performs well in terms of number of packets transmitted, number of dead nodes, network lifetime, throughput and remaining energy.  


Author(s):  
D. CHARANYA ◽  
G. V. UMA

A Wireless Sensor Network is a collection of sensor nodes distributed into a network to monitor the environmental conditions and send the sensed data to the Base Station. Wireless Sensor Network is one of the rapidly developing area in which energy consumption is the most important aspect to be considered while tracking, monitoring, reporting and visualization of data. An Energy Efficient Prediction-based Clustering algorithm is proposed to track the moving object in wireless sensor network. This algorithm reduces the number of hops between transmitter and receiver nodes and also the number of transmitted packets. In this method, the sensor nodes are statically placed and clustered using LEACH-R algorithm. The Prediction based clustering algorithm is applied where few nodes are selected for tracking which uses the prediction mechanism to predict the next location of the moving object. The Current Location of the target is found using Trilateration algorithm. The Current Location or Predicted Location is sent to active Cluster Head from the leader node or the other node. Based on which node send the message to the Cluster Head, the Predicted or Current Location will be sent to the base station. In real time, the proposed work is applicable in traffic tracking and vehicle tracking. The experiment is carried out using Network Stimulator-2 environment. Simulation result shows that the proposed algorithm gives a better performance and reduces the energy consumption.


Sign in / Sign up

Export Citation Format

Share Document