Skip to main content
Erschienen in: Wireless Personal Communications 1/2015

01.03.2015

Multi-Objective Meta-Heuristic Approach for Energy-Efficient Secure Data Aggregation in Wireless Sensor Networks

verfasst von: M. Bala Krishna, M. N. Doja

Erschienen in: Wireless Personal Communications | Ausgabe 1/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Energy consumption in the sensor network is primarily due to the switching states of radio transceivers and long busy states of sensor nodes in the network. Data aggregation techniques reduce the number of transmissions and improve the bandwidth utilization. Secure data aggregation and energy-efficient routing protocols establish the secure channel, and reduce the communication overhead in the network. Multi-objective optimization methods based on the weighted sum method, the utility method and meta-heuristic search methods enhance the performance of meta-heuristic algorithms. This article proposes multi-objective meta-heuristic approach for energy-efficient secure data aggregation (MH-EESDA) protocol in wireless sensor networks. The proposed protocol uses divide-and-conquer approach to form the secure clusters and perform the secure data aggregation in energy-efficient route paths of the network. The protocol functions in three phases. In the first phase, the clusters are formed, in the second phase, the secure nodes are selected and in the third phase, energy-efficient data aggregation is performed across the secure route paths of the network. The sensor node energy and data aggregation rate are evaluated for (1) minimum degree of intrusions (2) threshold-based degree of intrusions and (3) maximum degree of intrusions in the network. Simulation results illustrate significant improvements in the proposed MH-EESDA protocol.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildiz, I. F., & Mehmet, C. V. (2010). Wireless Sensor Networks. Singapore: John Wiley & Sons Ltd, Markono Print Media Pte Ltd.CrossRef Akyildiz, I. F., & Mehmet, C. V. (2010). Wireless Sensor Networks. Singapore: John Wiley & Sons Ltd, Markono Print Media Pte Ltd.CrossRef
2.
Zurück zum Zitat Miloud, B., Yacine, C., Adlen, K., Abdelouahid, D., & Nadjib, B. (2014). Data aggregation scheduling algorithms in wireless sensor networks: Solutions and challenges. IEEE Communications Surveys & Tutorials, Third Quarter, 16(3), 1339–1368.CrossRef Miloud, B., Yacine, C., Adlen, K., Abdelouahid, D., & Nadjib, B. (2014). Data aggregation scheduling algorithms in wireless sensor networks: Solutions and challenges. IEEE Communications Surveys & Tutorials, Third Quarter, 16(3), 1339–1368.CrossRef
3.
Zurück zum Zitat Suat, O., & Yang, X. (2009). Secure data aggregation in wireless sensor networks: A comprehensive overview. Journal of Computer Networks, 53(12), 2022–2037.CrossRefMATH Suat, O., & Yang, X. (2009). Secure data aggregation in wireless sensor networks: A comprehensive overview. Journal of Computer Networks, 53(12), 2022–2037.CrossRefMATH
4.
Zurück zum Zitat Gonzalez, T. F. (2007). Handbook of approximation algorithms and metaheuristics. In Sahni, S. (Series Ed.), Computer and information science series. 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL, USA: Chapman & Hall/CRC, Taylor & Francis Group. Gonzalez, T. F. (2007). Handbook of approximation algorithms and metaheuristics. In Sahni, S. (Series Ed.), Computer and information science series. 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL, USA: Chapman & Hall/CRC, Taylor & Francis Group.
5.
Zurück zum Zitat El-Ghazali, T. (2009). Metaheuristics—from design to implementation. Hoboken, NJ: Wiley.MATH El-Ghazali, T. (2009). Metaheuristics—from design to implementation. Hoboken, NJ: Wiley.MATH
6.
Zurück zum Zitat Xin-She, Y. (2010). Engineering optimization—an introduction with metaheuristic applications. Hoboken, NJ: Wiley. Xin-She, Y. (2010). Engineering optimization—an introduction with metaheuristic applications. Hoboken, NJ: Wiley.
7.
Zurück zum Zitat Michel, G., & Jean-Yves, P. (2010). Handbook of metaheuristics. In Hillier, F. S. (Series Ed.), International series in operations research and management science (2nd ed., Vol. 146), Springer Science+Business Media, LLC, 233 Spring Street, New York, NY 10013, USA. Michel, G., & Jean-Yves, P. (2010). Handbook of metaheuristics. In Hillier, F. S. (Series Ed.), International series in operations research and management science (2nd ed., Vol. 146), Springer Science+Business Media, LLC, 233 Spring Street, New York, NY 10013, USA.
8.
Zurück zum Zitat Hasan, C., Suat, O., Prashant, N., Devasenapathy, M., & Ozgur, S. H. (2006). Energy-efficient secure pattern based data aggregation for wireless sensor networks. Journal of Computer Communications, 29(4), 446–455.CrossRef Hasan, C., Suat, O., Prashant, N., Devasenapathy, M., & Ozgur, S. H. (2006). Energy-efficient secure pattern based data aggregation for wireless sensor networks. Journal of Computer Communications, 29(4), 446–455.CrossRef
9.
Zurück zum Zitat Sankardas, R., Sanjeev, S., & Sushil, J. (2006). Attack resilient hierarchical data aggregation in sensor networks. In ACM fourth International workshop on security of ad hoc and sensor networks (SASN), Alexandria, Virginia, USA (pp. 71–82). Sankardas, R., Sanjeev, S., & Sushil, J. (2006). Attack resilient hierarchical data aggregation in sensor networks. In ACM fourth International workshop on security of ad hoc and sensor networks (SASN), Alexandria, Virginia, USA (pp. 71–82).
10.
Zurück zum Zitat Kui, W., Dennis, D., Bo, S., & Yang, X. (2007). Secure data aggregation without persistent cryptographic operations in wireless sensor networks. Journal of Ad Hoc Networks, 5(1), 100–111.CrossRef Kui, W., Dennis, D., Bo, S., & Yang, X. (2007). Secure data aggregation without persistent cryptographic operations in wireless sensor networks. Journal of Ad Hoc Networks, 5(1), 100–111.CrossRef
11.
Zurück zum Zitat Miloud, B., Noureddine, L., Abdelraouf, O., & Yacine, C. (2007). SEDAN: Secure and efficient protocol for data aggregation in wireless sensor networks. In IEEE thirty second International conference on local computer networks (LCN), Dublin, Ireland (pp. 1053–1060). Miloud, B., Noureddine, L., Abdelraouf, O., & Yacine, C. (2007). SEDAN: Secure and efficient protocol for data aggregation in wireless sensor networks. In IEEE thirty second International conference on local computer networks (LCN), Dublin, Ireland (pp. 1053–1060).
12.
Zurück zum Zitat Yi, Y., Xinran, W., Sencun, Z., & Guohong, C. (2008). SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. ACM Transactions on Information and System Security (TISSEC), 11(4), 18:1–18:43. Yi, Y., Xinran, W., Sencun, Z., & Guohong, C. (2008). SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. ACM Transactions on Information and System Security (TISSEC), 11(4), 18:1–18:43.
13.
Zurück zum Zitat Zhiqiang, R., Qiaoliang, L., & Sujun, L. (2008). A secure routing protocol for clustered sensor networks. In IEEE fourth International conference on wireless communications networking and mobile computing (WiCOM), Dalian, China (pp. 1–4). Zhiqiang, R., Qiaoliang, L., & Sujun, L. (2008). A secure routing protocol for clustered sensor networks. In IEEE fourth International conference on wireless communications networking and mobile computing (WiCOM), Dalian, China (pp. 1–4).
14.
Zurück zum Zitat Anthony, R., Karthik, L., & Ragunathan, R. (2008). SAMPL: A simple aggregation and message passing layer for sensor networks. In ACM fourth annual International conference on wireless internet (WICON), Maui, Hawaii, USA, Article 35. Anthony, R., Karthik, L., & Ragunathan, R. (2008). SAMPL: A simple aggregation and message passing layer for sensor networks. In ACM fourth annual International conference on wireless internet (WICON), Maui, Hawaii, USA, Article 35.
15.
Zurück zum Zitat Claude, C., Aldar, C.-F. C., Einar, M., & Gene, T. (2009). Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks, 5(3), 20:1–20:36. Claude, C., Aldar, C.-F. C., Einar, M., & Gene, T. (2009). Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks, 5(3), 20:1–20:36.
16.
Zurück zum Zitat Nike, G., Ruichuan, C., Zhuhua, C., Jianbin, H., & Zhong, C. (2009). A secure routing and aggregation protocol with low energy cost for sensor networks. In IEEE International symposium on information engineering and electronic commerce, Ternopil, Ukraine (pp. 79–84). Nike, G., Ruichuan, C., Zhuhua, C., Jianbin, H., & Zhong, C. (2009). A secure routing and aggregation protocol with low energy cost for sensor networks. In IEEE International symposium on information engineering and electronic commerce, Ternopil, Ukraine (pp. 79–84).
17.
Zurück zum Zitat Shu Qin, R., & Jong Sou, P. (2009). Fault-tolerance data aggregation for clustering wireless sensor network. Wireless Personal Communications, 51(1), 179–192.CrossRef Shu Qin, R., & Jong Sou, P. (2009). Fault-tolerance data aggregation for clustering wireless sensor network. Wireless Personal Communications, 51(1), 179–192.CrossRef
18.
Zurück zum Zitat Shih-I, H., Shiuhpyng, S., & Tygar, J. D. (2010). Secure encrypted-data aggregation for wireless sensor networks. Journal of Wireless Networks, 16(4), 915–927.CrossRef Shih-I, H., Shiuhpyng, S., & Tygar, J. D. (2010). Secure encrypted-data aggregation for wireless sensor networks. Journal of Wireless Networks, 16(4), 915–927.CrossRef
19.
Zurück zum Zitat Hongjuan, L., Kai, L., & Keqiu, L. (2011). Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Journal of Computer Communications, 34(4), 591–597.CrossRef Hongjuan, L., Kai, L., & Keqiu, L. (2011). Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Journal of Computer Communications, 34(4), 591–597.CrossRef
20.
Zurück zum Zitat Sabrina, S., Luigi Alfredo, G., Gennaro, B., & Alberto, C.-P. (2012). DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Journal of Systems and Software, 85(1), 152–166.CrossRef Sabrina, S., Luigi Alfredo, G., Gennaro, B., & Alberto, C.-P. (2012). DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Journal of Systems and Software, 85(1), 152–166.CrossRef
21.
Zurück zum Zitat Chien-Liang, F., Gruia-Catalin, R., & Chenyang, L. (2013). Adaptive service provisioning for enhanced energy efficiency and flexibility in wireless sensor networks. Journal of Science of Computer Programming, 78(2), 195–217.CrossRefMATH Chien-Liang, F., Gruia-Catalin, R., & Chenyang, L. (2013). Adaptive service provisioning for enhanced energy efficiency and flexibility in wireless sensor networks. Journal of Science of Computer Programming, 78(2), 195–217.CrossRefMATH
22.
Zurück zum Zitat Nikolaos, A. P., Stefanos, A. N., & Dimitrios, D. V. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Journal of Communications Surveys & Tutorials, Second Quarter, 15(2), 551–591.CrossRef Nikolaos, A. P., Stefanos, A. N., & Dimitrios, D. V. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Journal of Communications Surveys & Tutorials, Second Quarter, 15(2), 551–591.CrossRef
23.
Zurück zum Zitat Dnyaneshwar, M., Neeli Rashmi, P., & Ramjee, P. (2014). BECPA: Bandwidth efficient cluster based packet aggregation in wireless sensor network. Wireless Personal Communications, 76(3), 335–349.CrossRef Dnyaneshwar, M., Neeli Rashmi, P., & Ramjee, P. (2014). BECPA: Bandwidth efficient cluster based packet aggregation in wireless sensor network. Wireless Personal Communications, 76(3), 335–349.CrossRef
24.
Zurück zum Zitat Hongjuan, L., Keqiu, L., Wenyu, Q., & Ivan, S. (2014). Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor network. Future Generation Computer Systems, 37, 108–116.CrossRef Hongjuan, L., Keqiu, L., Wenyu, Q., & Ivan, S. (2014). Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor network. Future Generation Computer Systems, 37, 108–116.CrossRef
Metadaten
Titel
Multi-Objective Meta-Heuristic Approach for Energy-Efficient Secure Data Aggregation in Wireless Sensor Networks
verfasst von
M. Bala Krishna
M. N. Doja
Publikationsdatum
01.03.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-014-2114-3

Weitere Artikel der Ausgabe 1/2015

Wireless Personal Communications 1/2015 Zur Ausgabe

Neuer Inhalt