Abstract
Energy consumption and the secure transmission are the increasing fields of research challenge in wireless sensor network (WSN) applications. Heterogeneous WSN is an efficient network strategy that has sensor nodes with different processing, memory power, and transmission capacity. In order to provide effective transmission for this type of network, clustering associated with secure routing is enabled to transfer the data packets safely to the endpoint. Data gathering and clustering help to group the network and control transmission overhead during data transmission. Hybridization of K-means clustering algorithm with Ant Lion Optimizer for grouping of nodes and optimal CH selection is utilized for better energy efficiency. Thus, a Miscegenation of Ant Lion optimizer within K-means for clustering and Spherical grid based multi-curve Elliptic curve cryptographic routing (MALOKSER) is determined for effective clustering and secure routing of data packets within time to the base station. The main aim of our work is to enhance network security and energy savage in the wireless network communication system. Elliptic curve cryptography with spherical grid multi-tier routing ensure secure transmission by encrypting the messages with two different keys and forward the packets in a spherical format. The performance is evaluated under metrics such as packet deliver ratio, minimum energy consumptions, communication overheads, throughput and end to end delay with the existing standards shows better results. This proves the proposed technique can actively reduce the energy utilization with an efficient and safe routing of data over the network.
Similar content being viewed by others
References
Afsar, M. M., & Tayarani-N, M. H. (2014). Clustering in sensor networks: A literature survey. Journal of Network and Computer Applications, 46, 198–226.
Amgoth, T., & Jana, P. K. (2015). Energy-aware routing algorithm for wireless sensor networks. Computers and Electrical Engineering, 41, 357–367.
Elhabyan, R. S., & Yagoub, M. C. (2015). Two-tier particle swarm optimization protocol for clustering and routing in wireless sensor network. Journal of Network and Computer Applications, 52, 116–128.
Badi, A., Mahgoub, I., & Filippini, D. (Ed.). (2012). Emerging concepts in collective sensing. In Autonomous sensor networks (pp. 395–423). Berlin: Springer.
Liu, Y. N., Wang, J., Du, H., & Zhang, L. (2010). Key sharing in hierarchical wireless sensor networks. In 2010 IEEE/IFIP 8th international conference on embedded and ubiquitous computing (EUC) (pp. 743–748). IEEE.
Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2014). PASCCC: Priority-based application-specific congestion control clustering protocol. Computer Networks, 74, 92–102.
Banerjee, I., Chanak, P., Rahaman, H., & Samanta, T. (2014). Effective fault detection and routing scheme for wireless sensor networks. Computers and Electrical Engineering, 40(2), 291–306.
Pantazis, N. A., Nikolidakis, S. A., & Vergados, D. D. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Communications Surveys and Tutorials, 15(2), 551–591.
Cheng, L., Niu, J., Cao, J., Das, S. K., & Gu, Y. (2014). QoS aware geographic opportunistic routing in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(7), 1864–1875.
Chanak, P., Banerjee, I., & Sherratt, R. S. (2017). Energy-aware distributed routing algorithm to tolerate network failure in wireless sensor networks. Ad Hoc Networks, 56, 158–172.
Anisi, M. H., Abdul-Salaam, G., Idris, M. Y. I., Wahab, A. W. A., & Ahmedy, I. (2017). Energy harvesting and battery power based routing in wireless sensor networks. Wireless Networks, 23(1), 249–266.
Dong, Q., & Dargie, W. (2013). A survey on mobility and mobility-aware MAC protocols in wireless sensor networks. IEEE Communications Surveys and Tutorials, 15(1), 88–100.
Hsueh, C. T., Wen, C. Y., & Ouyang, Y. C. (2012). Two-tier receiver-initiated secure scheme for hierarchical wireless sensor networks. In 2012 12th international conference on ITS telecommunications (ITST) (pp. 254–258). IEEE.
Kuila, P., & Jana, P. K. (2014). Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach. Engineering Applications of Artificial Intelligence, 33, 127–140.
Ehsan, S., & Hamdaoui, B. (2012). A survey on energy-efficient routing techniques with QoS assurances for wireless multimedia sensor networks. IEEE Communications Surveys and Tutorials, 14(2), 265–278.
Hoang, D. C., Yadav, P., Kumar, R., & Panda, S. K. (2014). Real-time implementation of a harmony search algorithm-based clustering protocol for energy-efficient wireless sensor networks. IEEE Transactions on Industrial Informatics, 10(1), 774–783.
Agrawal, C. G., & Kulkarni, J. B. (2014). Enhancing the security in WSN using three tier security architecture. International Journal of Innovative Research in Information Security (IJIRIS), 1, 40–47.
Devisri, S., & Balasubramaniam, C. (2013). Secure routing using trust based mechanism in wireless sensor networks (WSNs). International Journal of Scientific and Engineering Research, 4(2), 1–7.
Kavitha, T. V., Shruthi, B. S., & Scholar, P. G. (2016). Robust energy saving opportunistic routing (Ens_Or) algorithm for prolonging the lifetime of WSN. International Journal of Engineering Science and Computing, 6(6), 6680–6685.
Imrana, B. K., & Sri, G. M. (2016). Controlling residual energy of WSN with secure routing protocal. International Journal of Scientific Research, 4(8), 154–156.
Chris, K., & David, W. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.
Roy, S., Conti, M., Setia, S., & Jajodia, S. (2014). Secure data aggregation in wireless sensor networks: Filtering out the attacker’s impact. IEEE Transactions on Information Forensics and Security, 9(4), 681–694.
Shim, K. A., & Park, C. M. (2015). A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2128–2139.
Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.
Elhoseny, M., Yuan, X., El-Minir, H. K., & Riad, A. M. (2016). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, 9(13), 2024–2031.
Sarma, H. K. D., Kar, A., & Mall, R. (2016). A hierarchical and role based secure routing protocol for mobile wireless sensor networks. Wireless Personal Communications, 90(3), 1067–1103.
Dhunna, G. S., & Al-Anbagi, I. (2017). A low power cyber-attack detection and isolation mechanism for wireless sensor network. In Vehicular technology conference (VTC-Fall), 2017 IEEE 86th (pp. 1–5). IEEE.
Singh, S., Malik, A., & Kumar, R. (2017). Energy efficient heterogeneous DEEC protocol for enhancing lifetime in WSNs. Engineering Science and Technology, an International Journal, 20(1), 345–353.
Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2018). A Sybil attack detection scheme for a forest wildfire monitoring application. Future Generation Computer Systems, 80, 613–626.
Yildiz, H. U., Ciftler, B. S., Tavli, B., Bicakci, K., & Incebacak, D. (2018). The impact of incomplete secure connectivity on the lifetime of wireless sensor networks. IEEE Systems Journal, 12(1), 1042–1046.
Mirjalili, S. (2015). The ant lion optimizer. Advances in Engineering Software, 83, 80–98.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Dhand, G., Tyagi, S.S. SMEER: Secure Multi-tier Energy Efficient Routing Protocol for Hierarchical Wireless Sensor Networks. Wireless Pers Commun 105, 17–35 (2019). https://doi.org/10.1007/s11277-018-6101-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-018-6101-y