Skip to main content

2019 | OriginalPaper | Buchkapitel

DSP-IR: Delay Sensitive Protocol for Intelligent Routing with Medium Access Control

verfasst von : A. C. Yogeesh, Shantakumar B. Patil, Premajyothi Patil, H. R. Roopashree

Erschienen in: Cybernetics and Algorithms in Intelligent Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The wireless sensor network has been positioned itself from a complete network system to a sub-net of future internet namely Internet of Things, where a communications among anything to anything is possible. The extensible use of wireless sensor network makes it more risky if the security threats are not handled wisely. The conventional methods adopted for securing the WSN vulnerability based attacks introduces delay, which brings congestion in the routing flow as well as influence the quality of service. The proposed DSP-IR is a secure routing algorithm to handle security with delay sensitivity. The DSP-IR framework evaluates MAC protocols including S-MAC, Q-MAC and IH-MAC along with RSA, AES and DSP-IR encrypt process. For all the three combinations performance evaluation is done by simulating the model to know the behavior of residual energy, energy consumption and average packet delay with varying interval of message arrival time and it is found that the proposed IH-MAC with DSP-IR exhibits better performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
6.
Zurück zum Zitat Lin, C., Wu, G., Yu, C.W., Yao, L.: Maximizing destructiveness of node capture attack in wireless sensor networks. J. Supercomput. 71(8), 3181–3212 (2015)CrossRef Lin, C., Wu, G., Yu, C.W., Yao, L.: Maximizing destructiveness of node capture attack in wireless sensor networks. J. Supercomput. 71(8), 3181–3212 (2015)CrossRef
7.
Zurück zum Zitat Buch, D., Jinwala, D.: Detection of wormhole attacks in wireless sensor network. In: 3rd International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2011), Bangalore, pp. 7–14 (2011) Buch, D., Jinwala, D.: Detection of wormhole attacks in wireless sensor network. In: 3rd International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2011), Bangalore, pp. 7–14 (2011)
8.
Zurück zum Zitat Basan, A., Basan, E., Makarevich, O.: A trust evaluation method for active attack counteraction in wireless sensor networks. In: 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Nanjing, China, pp. 369–372 (2017) Basan, A., Basan, E., Makarevich, O.: A trust evaluation method for active attack counteraction in wireless sensor networks. In: 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Nanjing, China, pp. 369–372 (2017)
10.
Zurück zum Zitat Jedidi, A., Mohammad, A.: History trust routing algorithm to improve efficiency and security in wireless sensor network. In: 2017 14th International Multi-Conference on Systems, Signals & Devices (SSD), Marrakech, pp. 750–754 (2017) Jedidi, A., Mohammad, A.: History trust routing algorithm to improve efficiency and security in wireless sensor network. In: 2017 14th International Multi-Conference on Systems, Signals & Devices (SSD), Marrakech, pp. 750–754 (2017)
11.
Zurück zum Zitat Qin, D., Yang, S., Jia, S., Zhang, Y., Ma, J., Ding, Q.: Research on trust sensing based secure routing mechanism for wireless sensor network. IEEE Access 5, 9599–9609 (2017)CrossRef Qin, D., Yang, S., Jia, S., Zhang, Y., Ma, J., Ding, Q.: Research on trust sensing based secure routing mechanism for wireless sensor network. IEEE Access 5, 9599–9609 (2017)CrossRef
18.
Zurück zum Zitat Yogeesh, A.C., Patil, S.B., Patil, P.: A survey on energy efficient, secure routing protocols for wireless sensor networks. Int. J. Eng. Comput. Sci. 5(8), 17702–17709 (2016). ISSN 2319-7242 Yogeesh, A.C., Patil, S.B., Patil, P.: A survey on energy efficient, secure routing protocols for wireless sensor networks. Int. J. Eng. Comput. Sci. 5(8), 17702–17709 (2016). ISSN 2319-7242
19.
Zurück zum Zitat Yogeesh, A.C., Patil, S.B., Patil, P.: FEESR: framework for energy efficient secured routing in heterogeneous sensor network. In: 2016 International Conference on Circuits, Controls, Communications and Computing (I4C), Bangalore, pp. 1–7 (2016) Yogeesh, A.C., Patil, S.B., Patil, P.: FEESR: framework for energy efficient secured routing in heterogeneous sensor network. In: 2016 International Conference on Circuits, Controls, Communications and Computing (I4C), Bangalore, pp. 1–7 (2016)
20.
Zurück zum Zitat Biswas, K., Muthukkumarasamy, V., Wu, X.W., Singh, K.: Performance evaluation of block ciphers for wireless sensor networks. In: Choudhary, R., Mandal, J., Auluck, N., Nagarajaram, H. (eds.) Advanced Computing and Communication Technologies. Advances in Intelligent Systems and Computing, vol. 452. Springer, Singapore (2016) Biswas, K., Muthukkumarasamy, V., Wu, X.W., Singh, K.: Performance evaluation of block ciphers for wireless sensor networks. In: Choudhary, R., Mandal, J., Auluck, N., Nagarajaram, H. (eds.) Advanced Computing and Communication Technologies. Advances in Intelligent Systems and Computing, vol. 452. Springer, Singapore (2016)
21.
Zurück zum Zitat Bandirmali, N., Erturk, I., Ceken, C.: Securing data transfer in delay-sensitive and energy-aware WSNs using the scalable encryption algorithm. In: 2009 4th International Symposium on Wireless Pervasive Computing, Melbourne, VIC, pp. 1–6 (2009). https://doi.org/10.1109/iswpc.2009.4800606 Bandirmali, N., Erturk, I., Ceken, C.: Securing data transfer in delay-sensitive and energy-aware WSNs using the scalable encryption algorithm. In: 2009 4th International Symposium on Wireless Pervasive Computing, Melbourne, VIC, pp. 1–6 (2009). https://​doi.​org/​10.​1109/​iswpc.​2009.​4800606
22.
Zurück zum Zitat Shi, Y., Wang, J., Fang, X., Gu, S., Dong, L.: Modelling and control of S-MAC based wireless sensor networks control system with network-induced delay in industrial. In: 2017 4th International Conference on Information Science and Control Engineering (ICISCE), Changsha, pp. 1539–1544 (2017). https://doi.org/10.1109/icisce.2017.321 Shi, Y., Wang, J., Fang, X., Gu, S., Dong, L.: Modelling and control of S-MAC based wireless sensor networks control system with network-induced delay in industrial. In: 2017 4th International Conference on Information Science and Control Engineering (ICISCE), Changsha, pp. 1539–1544 (2017). https://​doi.​org/​10.​1109/​icisce.​2017.​321
24.
Zurück zum Zitat Ceken, C.: An energy efficient and delay sensitive centralized MAC protocol for wireless sensor networks. Comput. Stand. Interfaces 30(1), 20–31 (2008)CrossRef Ceken, C.: An energy efficient and delay sensitive centralized MAC protocol for wireless sensor networks. Comput. Stand. Interfaces 30(1), 20–31 (2008)CrossRef
Metadaten
Titel
DSP-IR: Delay Sensitive Protocol for Intelligent Routing with Medium Access Control
verfasst von
A. C. Yogeesh
Shantakumar B. Patil
Premajyothi Patil
H. R. Roopashree
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-91192-2_39