Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 4/2021

16.04.2021

A probability based energy competent cluster based secured ch selection routing EC2SR protocol for smart dust

verfasst von: D. Rajesh, D. Giji Kiruba

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Smart Dust consists of several wireless mobile smart dust nodes which animatedly broadcast information amongst themselves without dependence of basestation. Smart Dust is more susceptible to diverse types of attacks and protect network because of its uniqueness of mobility in air and energetic in the environment. Interruption means any irregular action that challenge to compromise reliability, privacy and accessibility of resources. A novel, dynamic energy efficient cluster based secure routing identifies these challenges while discovering exact routing and identifying malicious in smart dust node. Design is structured as a dynamic hierarchy in which information is broadcasted among source to destination without any loss. To increase communication, more effectively dynamic hierarchy is reconfigured by inclusion of clustering techniques. Cluster heads are selected based on residual energy and change in topology. Proposed protocol is used for securing data and routing tactic will broadcasting. Simulation of energy efficient cluster based secured routing protocol is carried out by NS2. This routing protocol provides enhanced energy efficiency, secured clustering, enlarges the lifetime of network, enhances deliverance ratio, delay and diminishes packet loss.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhao F, Xu Y, Xu Y (2012) " Improved-LEACH routing communication protocol for a wireless sensor network”, International Journal of Distributed Sensor Networks Zhao F, Xu Y, Xu Y (2012) " Improved-LEACH routing communication protocol for a wireless sensor network”, International Journal of Distributed Sensor Networks
2.
Zurück zum Zitat Mohindru V, Singh Y (2016) Efficient-Approach for Securing Message Communication in Wireless Sensor Networks from Node Clone Attack. Indian Journal of Science and Technology 9(32):1–7CrossRef Mohindru V, Singh Y (2016) Efficient-Approach for Securing Message Communication in Wireless Sensor Networks from Node Clone Attack. Indian Journal of Science and Technology 9(32):1–7CrossRef
3.
Zurück zum Zitat Lyu C, Gu D, Zhang X, Sun S, Zhang Y, Pande A (2015) SGOR-Secure and scalable geographic opportunistic routing with received signal strength in WSNs. Computer Communications 59:37–51CrossRef Lyu C, Gu D, Zhang X, Sun S, Zhang Y, Pande A (2015) SGOR-Secure and scalable geographic opportunistic routing with received signal strength in WSNs. Computer Communications 59:37–51CrossRef
4.
Zurück zum Zitat Yao L, Man Y, Huang Z, Deng J, Wang X (2016) Secure Routing based on Social Similarity in Opportunistic Networks. IEEE Transactions on Wireless Communications 15(1):594–605CrossRef Yao L, Man Y, Huang Z, Deng J, Wang X (2016) Secure Routing based on Social Similarity in Opportunistic Networks. IEEE Transactions on Wireless Communications 15(1):594–605CrossRef
5.
Zurück zum Zitat Zhou Y, Tan X, He X, Qin G, Xi H (2010) Secure Opportunistic Routing for Wireless Multi-Hop Networks Using LPG and Digital Signature. Information Assurance and Security Letters 1(2010):18–23 Zhou Y, Tan X, He X, Qin G, Xi H (2010) Secure Opportunistic Routing for Wireless Multi-Hop Networks Using LPG and Digital Signature. Information Assurance and Security Letters 1(2010):18–23
8.
Zurück zum Zitat Jaisankar N, Saravanan R, Swam K (2010) A Novel Security Approach for Detecting Black Hole Attack in MANET. Communications in Computer and Information Science 70:217–223CrossRef Jaisankar N, Saravanan R, Swam K (2010) A Novel Security Approach for Detecting Black Hole Attack in MANET. Communications in Computer and Information Science 70:217–223CrossRef
9.
Zurück zum Zitat Jayalaskshmi B, Neelima M (2012) “Maximizing Wireless Sensor Network lifetime through Cluster head selection using Hit sets”, International Journal of computer Science, Issue, vol.9 issue 2 no.3 Jayalaskshmi B, Neelima M (2012) “Maximizing Wireless Sensor Network lifetime through Cluster head selection using Hit sets”, International Journal of computer Science, Issue, vol.9 issue 2 no.3
10.
Zurück zum Zitat Pattani KM, Chauhan PJ (2015) “Spin Protocol For Wireless Sensor Network”, International Journal Of Advance Research In Engineering, Science & Technology(Ijarest),Volume 2 ,Issue 5 Pattani KM, Chauhan PJ (2015) “Spin Protocol For Wireless Sensor Network”, International Journal Of Advance Research In Engineering, Science & Technology(Ijarest),Volume 2 ,Issue 5
11.
Zurück zum Zitat Li T, Ruan F, Fan Z, Wang J, Kim J-U (2015) An improved-PEGASIS routing protocol based on neural network and ant Colony algorithm. International Journal of Future Generation Communication and Networking 8(6):149–160CrossRef Li T, Ruan F, Fan Z, Wang J, Kim J-U (2015) An improved-PEGASIS routing protocol based on neural network and ant Colony algorithm. International Journal of Future Generation Communication and Networking 8(6):149–160CrossRef
12.
Zurück zum Zitat Hirani PK, Singh M (2015) Improved-LEACH Protocol using vice Cluster in Wireless Sensor Networks. International Journal of Innovative Computer Science & Engineering 2(3):30–34 Hirani PK, Singh M (2015) Improved-LEACH Protocol using vice Cluster in Wireless Sensor Networks. International Journal of Innovative Computer Science & Engineering 2(3):30–34
13.
Zurück zum Zitat Vinodh Kumar S, Pal A (2013) Assisted-Leach (A-Leach) energy efficient routing protocol for wireless sensor networks. International Journal of Computer and Communication Engineering 2(4):420–424CrossRef Vinodh Kumar S, Pal A (2013) Assisted-Leach (A-Leach) energy efficient routing protocol for wireless sensor networks. International Journal of Computer and Communication Engineering 2(4):420–424CrossRef
14.
Zurück zum Zitat Rajesh D, Jaya T (2019) “Exploration on cluster related energy proficient routing in Mobile wireless sensor network”, international journal of innovative technology and exploring engineering (IJITEE), Volume-8, Issue-4 Rajesh D, Jaya T (2019) “Exploration on cluster related energy proficient routing in Mobile wireless sensor network”, international journal of innovative technology and exploring engineering (IJITEE), Volume-8, Issue-4
15.
Zurück zum Zitat Panigrahi L (2019) “A trust based clustering routing scheme to enhance the security of WSNs, international journal of innovative technology and exploring engineering (IJITEE) ISSN: 2278–3075, Volume-8 Issue-9 Panigrahi L (2019) “A trust based clustering routing scheme to enhance the security of WSNs, international journal of innovative technology and exploring engineering (IJITEE) ISSN: 2278–3075, Volume-8 Issue-9
16.
Zurück zum Zitat Rahayu TM, Lee S, Lee H (2015) “A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation”, Sensors 2015 Rahayu TM, Lee S, Lee H (2015) “A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation”, Sensors 2015
17.
Zurück zum Zitat Parvathavarthini A, Dhenakaran SS (2013) An Overview Of Routing Protocols In Mobile Ad-Hoc Networks. International Journal of Advanced Research in Computer Science and Software Engg 3(2):251–259 Parvathavarthini A, Dhenakaran SS (2013) An Overview Of Routing Protocols In Mobile Ad-Hoc Networks. International Journal of Advanced Research in Computer Science and Software Engg 3(2):251–259
18.
Zurück zum Zitat Sengaliappan M, Marimuthu A (2014) Improved General Self-Organized Tree-Based Routing Protocol for Wireless Sensor, Journal of Theoretical and Applied Information Technology, vol. 68, no. 1 Sengaliappan M, Marimuthu A (2014) Improved General Self-Organized Tree-Based Routing Protocol for Wireless Sensor, Journal of Theoretical and Applied Information Technology, vol. 68, no. 1
19.
Zurück zum Zitat Suganya R, Shanthi R (2012) “Fuzzy C-Means Algorithm-A Review”, International Journal of Scientific and Research Publications, vol. 2, no. 11 Suganya R, Shanthi R (2012) “Fuzzy C-Means Algorithm-A Review”, International Journal of Scientific and Research Publications, vol. 2, no. 11
20.
Zurück zum Zitat Hamidouche R, Aliouat Z, Gueroui AM (2018) Genetic algorithm for improving the lifetime and QoS of wireless sensor networks. Wireless personal communication 101:2313CrossRef Hamidouche R, Aliouat Z, Gueroui AM (2018) Genetic algorithm for improving the lifetime and QoS of wireless sensor networks. Wireless personal communication 101:2313CrossRef
21.
Zurück zum Zitat Rajesh D, Jaya T (2020) A mathematical model for energy efficient secured CH clustering protocol for Mobile wireless sensor network. Wireless Pers Commun 112:421–438CrossRef Rajesh D, Jaya T (2020) A mathematical model for energy efficient secured CH clustering protocol for Mobile wireless sensor network. Wireless Pers Commun 112:421–438CrossRef
Metadaten
Titel
A probability based energy competent cluster based secured ch selection routing EC2SR protocol for smart dust
verfasst von
D. Rajesh
D. Giji Kiruba
Publikationsdatum
16.04.2021
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 4/2021
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-021-01144-z

Weitere Artikel der Ausgabe 4/2021

Peer-to-Peer Networking and Applications 4/2021 Zur Ausgabe