Skip to main content
Top

2019 | OriginalPaper | Chapter

DSP-IR: Delay Sensitive Protocol for Intelligent Routing with Medium Access Control

Authors : A. C. Yogeesh, Shantakumar B. Patil, Premajyothi Patil, H. R. Roopashree

Published in: Cybernetics and Algorithms in Intelligent Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The wireless sensor network has been positioned itself from a complete network system to a sub-net of future internet namely Internet of Things, where a communications among anything to anything is possible. The extensible use of wireless sensor network makes it more risky if the security threats are not handled wisely. The conventional methods adopted for securing the WSN vulnerability based attacks introduces delay, which brings congestion in the routing flow as well as influence the quality of service. The proposed DSP-IR is a secure routing algorithm to handle security with delay sensitivity. The DSP-IR framework evaluates MAC protocols including S-MAC, Q-MAC and IH-MAC along with RSA, AES and DSP-IR encrypt process. For all the three combinations performance evaluation is done by simulating the model to know the behavior of residual energy, energy consumption and average packet delay with varying interval of message arrival time and it is found that the proposed IH-MAC with DSP-IR exhibits better performance.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
6.
go back to reference Lin, C., Wu, G., Yu, C.W., Yao, L.: Maximizing destructiveness of node capture attack in wireless sensor networks. J. Supercomput. 71(8), 3181–3212 (2015)CrossRef Lin, C., Wu, G., Yu, C.W., Yao, L.: Maximizing destructiveness of node capture attack in wireless sensor networks. J. Supercomput. 71(8), 3181–3212 (2015)CrossRef
7.
go back to reference Buch, D., Jinwala, D.: Detection of wormhole attacks in wireless sensor network. In: 3rd International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2011), Bangalore, pp. 7–14 (2011) Buch, D., Jinwala, D.: Detection of wormhole attacks in wireless sensor network. In: 3rd International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2011), Bangalore, pp. 7–14 (2011)
8.
go back to reference Basan, A., Basan, E., Makarevich, O.: A trust evaluation method for active attack counteraction in wireless sensor networks. In: 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Nanjing, China, pp. 369–372 (2017) Basan, A., Basan, E., Makarevich, O.: A trust evaluation method for active attack counteraction in wireless sensor networks. In: 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Nanjing, China, pp. 369–372 (2017)
10.
go back to reference Jedidi, A., Mohammad, A.: History trust routing algorithm to improve efficiency and security in wireless sensor network. In: 2017 14th International Multi-Conference on Systems, Signals & Devices (SSD), Marrakech, pp. 750–754 (2017) Jedidi, A., Mohammad, A.: History trust routing algorithm to improve efficiency and security in wireless sensor network. In: 2017 14th International Multi-Conference on Systems, Signals & Devices (SSD), Marrakech, pp. 750–754 (2017)
11.
go back to reference Qin, D., Yang, S., Jia, S., Zhang, Y., Ma, J., Ding, Q.: Research on trust sensing based secure routing mechanism for wireless sensor network. IEEE Access 5, 9599–9609 (2017)CrossRef Qin, D., Yang, S., Jia, S., Zhang, Y., Ma, J., Ding, Q.: Research on trust sensing based secure routing mechanism for wireless sensor network. IEEE Access 5, 9599–9609 (2017)CrossRef
18.
go back to reference Yogeesh, A.C., Patil, S.B., Patil, P.: A survey on energy efficient, secure routing protocols for wireless sensor networks. Int. J. Eng. Comput. Sci. 5(8), 17702–17709 (2016). ISSN 2319-7242 Yogeesh, A.C., Patil, S.B., Patil, P.: A survey on energy efficient, secure routing protocols for wireless sensor networks. Int. J. Eng. Comput. Sci. 5(8), 17702–17709 (2016). ISSN 2319-7242
19.
go back to reference Yogeesh, A.C., Patil, S.B., Patil, P.: FEESR: framework for energy efficient secured routing in heterogeneous sensor network. In: 2016 International Conference on Circuits, Controls, Communications and Computing (I4C), Bangalore, pp. 1–7 (2016) Yogeesh, A.C., Patil, S.B., Patil, P.: FEESR: framework for energy efficient secured routing in heterogeneous sensor network. In: 2016 International Conference on Circuits, Controls, Communications and Computing (I4C), Bangalore, pp. 1–7 (2016)
20.
go back to reference Biswas, K., Muthukkumarasamy, V., Wu, X.W., Singh, K.: Performance evaluation of block ciphers for wireless sensor networks. In: Choudhary, R., Mandal, J., Auluck, N., Nagarajaram, H. (eds.) Advanced Computing and Communication Technologies. Advances in Intelligent Systems and Computing, vol. 452. Springer, Singapore (2016) Biswas, K., Muthukkumarasamy, V., Wu, X.W., Singh, K.: Performance evaluation of block ciphers for wireless sensor networks. In: Choudhary, R., Mandal, J., Auluck, N., Nagarajaram, H. (eds.) Advanced Computing and Communication Technologies. Advances in Intelligent Systems and Computing, vol. 452. Springer, Singapore (2016)
21.
22.
go back to reference Shi, Y., Wang, J., Fang, X., Gu, S., Dong, L.: Modelling and control of S-MAC based wireless sensor networks control system with network-induced delay in industrial. In: 2017 4th International Conference on Information Science and Control Engineering (ICISCE), Changsha, pp. 1539–1544 (2017). https://doi.org/10.1109/icisce.2017.321 Shi, Y., Wang, J., Fang, X., Gu, S., Dong, L.: Modelling and control of S-MAC based wireless sensor networks control system with network-induced delay in industrial. In: 2017 4th International Conference on Information Science and Control Engineering (ICISCE), Changsha, pp. 1539–1544 (2017). https://​doi.​org/​10.​1109/​icisce.​2017.​321
24.
go back to reference Ceken, C.: An energy efficient and delay sensitive centralized MAC protocol for wireless sensor networks. Comput. Stand. Interfaces 30(1), 20–31 (2008)CrossRef Ceken, C.: An energy efficient and delay sensitive centralized MAC protocol for wireless sensor networks. Comput. Stand. Interfaces 30(1), 20–31 (2008)CrossRef
Metadata
Title
DSP-IR: Delay Sensitive Protocol for Intelligent Routing with Medium Access Control
Authors
A. C. Yogeesh
Shantakumar B. Patil
Premajyothi Patil
H. R. Roopashree
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-319-91192-2_39

Premium Partner