Skip to main content

Advertisement

Log in

SMEER: Secure Multi-tier Energy Efficient Routing Protocol for Hierarchical Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Energy consumption and the secure transmission are the increasing fields of research challenge in wireless sensor network (WSN) applications. Heterogeneous WSN is an efficient network strategy that has sensor nodes with different processing, memory power, and transmission capacity. In order to provide effective transmission for this type of network, clustering associated with secure routing is enabled to transfer the data packets safely to the endpoint. Data gathering and clustering help to group the network and control transmission overhead during data transmission. Hybridization of K-means clustering algorithm with Ant Lion Optimizer for grouping of nodes and optimal CH selection is utilized for better energy efficiency. Thus, a Miscegenation of Ant Lion optimizer within K-means for clustering and Spherical grid based multi-curve Elliptic curve cryptographic routing (MALOKSER) is determined for effective clustering and secure routing of data packets within time to the base station. The main aim of our work is to enhance network security and energy savage in the wireless network communication system. Elliptic curve cryptography with spherical grid multi-tier routing ensure secure transmission by encrypting the messages with two different keys and forward the packets in a spherical format. The performance is evaluated under metrics such as packet deliver ratio, minimum energy consumptions, communication overheads, throughput and end to end delay with the existing standards shows better results. This proves the proposed technique can actively reduce the energy utilization with an efficient and safe routing of data over the network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Afsar, M. M., & Tayarani-N, M. H. (2014). Clustering in sensor networks: A literature survey. Journal of Network and Computer Applications, 46, 198–226.

    Article  Google Scholar 

  2. Amgoth, T., & Jana, P. K. (2015). Energy-aware routing algorithm for wireless sensor networks. Computers and Electrical Engineering, 41, 357–367.

    Article  Google Scholar 

  3. Elhabyan, R. S., & Yagoub, M. C. (2015). Two-tier particle swarm optimization protocol for clustering and routing in wireless sensor network. Journal of Network and Computer Applications, 52, 116–128.

    Article  Google Scholar 

  4. Badi, A., Mahgoub, I., & Filippini, D. (Ed.). (2012). Emerging concepts in collective sensing. In Autonomous sensor networks (pp. 395–423). Berlin: Springer.

    Chapter  Google Scholar 

  5. Liu, Y. N., Wang, J., Du, H., & Zhang, L. (2010). Key sharing in hierarchical wireless sensor networks. In 2010 IEEE/IFIP 8th international conference on embedded and ubiquitous computing (EUC) (pp. 743–748). IEEE.

  6. Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2014). PASCCC: Priority-based application-specific congestion control clustering protocol. Computer Networks, 74, 92–102.

    Article  Google Scholar 

  7. Banerjee, I., Chanak, P., Rahaman, H., & Samanta, T. (2014). Effective fault detection and routing scheme for wireless sensor networks. Computers and Electrical Engineering, 40(2), 291–306.

    Article  Google Scholar 

  8. Pantazis, N. A., Nikolidakis, S. A., & Vergados, D. D. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Communications Surveys and Tutorials, 15(2), 551–591.

    Article  Google Scholar 

  9. Cheng, L., Niu, J., Cao, J., Das, S. K., & Gu, Y. (2014). QoS aware geographic opportunistic routing in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(7), 1864–1875.

    Article  Google Scholar 

  10. Chanak, P., Banerjee, I., & Sherratt, R. S. (2017). Energy-aware distributed routing algorithm to tolerate network failure in wireless sensor networks. Ad Hoc Networks, 56, 158–172.

    Article  Google Scholar 

  11. Anisi, M. H., Abdul-Salaam, G., Idris, M. Y. I., Wahab, A. W. A., & Ahmedy, I. (2017). Energy harvesting and battery power based routing in wireless sensor networks. Wireless Networks, 23(1), 249–266.

    Article  Google Scholar 

  12. Dong, Q., & Dargie, W. (2013). A survey on mobility and mobility-aware MAC protocols in wireless sensor networks. IEEE Communications Surveys and Tutorials, 15(1), 88–100.

    Article  Google Scholar 

  13. Hsueh, C. T., Wen, C. Y., & Ouyang, Y. C. (2012). Two-tier receiver-initiated secure scheme for hierarchical wireless sensor networks. In 2012 12th international conference on ITS telecommunications (ITST) (pp. 254–258). IEEE.

  14. Kuila, P., & Jana, P. K. (2014). Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach. Engineering Applications of Artificial Intelligence, 33, 127–140.

    Article  Google Scholar 

  15. Ehsan, S., & Hamdaoui, B. (2012). A survey on energy-efficient routing techniques with QoS assurances for wireless multimedia sensor networks. IEEE Communications Surveys and Tutorials, 14(2), 265–278.

    Article  Google Scholar 

  16. Hoang, D. C., Yadav, P., Kumar, R., & Panda, S. K. (2014). Real-time implementation of a harmony search algorithm-based clustering protocol for energy-efficient wireless sensor networks. IEEE Transactions on Industrial Informatics, 10(1), 774–783.

    Article  Google Scholar 

  17. Agrawal, C. G., & Kulkarni, J. B. (2014). Enhancing the security in WSN using three tier security architecture. International Journal of Innovative Research in Information Security (IJIRIS), 1, 40–47.

    Google Scholar 

  18. Devisri, S., & Balasubramaniam, C. (2013). Secure routing using trust based mechanism in wireless sensor networks (WSNs). International Journal of Scientific and Engineering Research, 4(2), 1–7.

    Google Scholar 

  19. Kavitha, T. V., Shruthi, B. S., & Scholar, P. G. (2016). Robust energy saving opportunistic routing (Ens_Or) algorithm for prolonging the lifetime of WSN. International Journal of Engineering Science and Computing, 6(6), 6680–6685.

    Google Scholar 

  20. Imrana, B. K., & Sri, G. M. (2016). Controlling residual energy of WSN with secure routing protocal. International Journal of Scientific Research, 4(8), 154–156.

    Google Scholar 

  21. Chris, K., & David, W. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.

    Google Scholar 

  22. Roy, S., Conti, M., Setia, S., & Jajodia, S. (2014). Secure data aggregation in wireless sensor networks: Filtering out the attacker’s impact. IEEE Transactions on Information Forensics and Security, 9(4), 681–694.

    Article  Google Scholar 

  23. Shim, K. A., & Park, C. M. (2015). A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2128–2139.

    Article  Google Scholar 

  24. Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.

    Article  Google Scholar 

  25. Elhoseny, M., Yuan, X., El-Minir, H. K., & Riad, A. M. (2016). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, 9(13), 2024–2031.

    Google Scholar 

  26. Sarma, H. K. D., Kar, A., & Mall, R. (2016). A hierarchical and role based secure routing protocol for mobile wireless sensor networks. Wireless Personal Communications, 90(3), 1067–1103.

    Article  Google Scholar 

  27. Dhunna, G. S., & Al-Anbagi, I. (2017). A low power cyber-attack detection and isolation mechanism for wireless sensor network. In Vehicular technology conference (VTC-Fall), 2017 IEEE 86th (pp. 1–5). IEEE.

  28. Singh, S., Malik, A., & Kumar, R. (2017). Energy efficient heterogeneous DEEC protocol for enhancing lifetime in WSNs. Engineering Science and Technology, an International Journal, 20(1), 345–353.

    Article  Google Scholar 

  29. Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2018). A Sybil attack detection scheme for a forest wildfire monitoring application. Future Generation Computer Systems, 80, 613–626.

    Article  Google Scholar 

  30. Yildiz, H. U., Ciftler, B. S., Tavli, B., Bicakci, K., & Incebacak, D. (2018). The impact of incomplete secure connectivity on the lifetime of wireless sensor networks. IEEE Systems Journal, 12(1), 1042–1046.

    Article  Google Scholar 

  31. Mirjalili, S. (2015). The ant lion optimizer. Advances in Engineering Software, 83, 80–98.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Geetika Dhand.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dhand, G., Tyagi, S.S. SMEER: Secure Multi-tier Energy Efficient Routing Protocol for Hierarchical Wireless Sensor Networks. Wireless Pers Commun 105, 17–35 (2019). https://doi.org/10.1007/s11277-018-6101-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-6101-y

Keywords

Navigation