Wireless Personal Communications

, Volume 96, Issue 3, pp 4781–4798 | Cite as

An Intelligent Energy Aware Secured Algorithm for Routing in Wireless Sensor Networks

Article

Abstract

Modern Wireless Sensor Networks (WSNs) requires special requirements in routing protocols because of nature of distribution and dynamic topology. The most important need for WSNs is energy efficient routing protocol that consumes optimal energy. It provides extension to the network’s life period. Nowadays a number of energy efficient routing protocols are proposed by various researchers in WSNs. However, security and energy efficiency in data collection and transmission in WSNs should be simultaneously considered for security challenges and to overcome limitation of WSNs. In this paper, we propose a new and effective routing protocol named, “Intelligent Energy Aware Secured Algorithm for Routing (IEASAR)” which is secure by using a Trust based approach and is Energy efficient at the same time. For this purpose, a new energy efficient protocol using Fuzzy C-means has been proposed in this paper. Moreover, a modified minimum spanning tree approach is applied here to identify the minimum distance path between the sender node and the destination node and hence an optimal and secured routing path is selected. Extensive simulations have been conducted in this work to verify the validity of our claims.

Keywords

Fuzzy C-means clustering WSNs Energy Aware Network lifetime Secured routing and IEASAR 

Notes

Acknowledgements

One of the authors K. Selvakumar is thankful to the UGC, New Delhi India, for funding through UGC-BSR fellowship to carry out this research work.

References

  1. 1.
    Liu, A., Zheng, Z., Zhang, C., Chen, Z., & Shen, X. (2012). Secure and energy-efficient disjoint multipath routing for WSNs. IEEE Transactions on Vehicular Technology, 61–7, 3255–3265.CrossRefGoogle Scholar
  2. 2.
    Maham, B., Hjørungnes, A., & Narasimhan, R. (2011). Energy-efficient space-time coded cooperation in outage-restricted multihop wireless networks. IEEE Transactions on Communications, 59–11, 3111–3121.CrossRefGoogle Scholar
  3. 3.
    Shu, T., Krunz, M., & Liu, S. (2010). Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Transactions on Mobile Computing, 9–7, 941–954.Google Scholar
  4. 4.
    Elhawary, M., & Haas, Z. J. (2011). Energy-efficient protocol for cooperative networks. IEEE/ACM Transactions on Networking, 19–2, 561–574.CrossRefGoogle Scholar
  5. 5.
    Zhu, J., & Wang, X. (2011). Model and protocol for energy-efficient routing over mobile ad hoc networks. IEEE Transactions on Mobile Computing, 10–11, 1546–1557.CrossRefGoogle Scholar
  6. 6.
    Jerusha, S., Kulothungan, K., & Kannan, A. (2012). Location aware cluster based routing in wireless sensor networks. International Journal of Computer & Communication Technology, 3–5, 1–6.Google Scholar
  7. 7.
    Vijayakumar, P., Bose, S., & Kannan, A. (2013). Centralized key distribution protocol using the greatest common divisor method. Computers & Mathematics with Applications, 65, 1360–1368.MathSciNetCrossRefMATHGoogle Scholar
  8. 8.
    Guo, S., & Yang, O. (2007). Energy-aware multicasting in wireless ad hoc networks: A survey and discussion. Computer Communications, 30–9, 2129–2148.CrossRefGoogle Scholar
  9. 9.
    Fan, Y.-C., & Chen, A. L. P. (2012). Energy efficient schemes for accuracy-guaranteed sensor data aggregation using scalable counting. IEEE Transactions on Knowledge and Data Engineering, 24–8, 1463–1477.CrossRefGoogle Scholar
  10. 10.
    Pantazis, N. A., Nikolidakis, S. A., & Vergados, D. D. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 15–2, 551–591.CrossRefGoogle Scholar
  11. 11.
    Xia, H., Jia, Z., Lei, J., Li, X., & Sha, E. H.-M. (2013). Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Computer Communications, 36, 1078–1093.CrossRefGoogle Scholar
  12. 12.
    Sun, Y. L., Yu, W., Han, Z., & Liu, K. J. R. (2006). Information theoretic framework of trust modeling evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24–2, 305–319.Google Scholar
  13. 13.
    Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET-Information Security, 4–4, 212–223.CrossRefGoogle Scholar
  14. 14.
    Xia, H., Jia, Z., Ju, L., & Zhu, Y. (2011). Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory. IET Wireless Sensor Systems, 1–4, 248–266.CrossRefGoogle Scholar
  15. 15.
    Bezdek, J. C. (1981). Pattern recognition with fuzzy objective function algorithms. New York, MA: Plenum Press.CrossRefMATHGoogle Scholar
  16. 16.
    Pal, N. R., Pal, K., Keller, J. M., & Bezdek, J. C. (2005). Possibilistic fuzzy c-means clustering algorithm. IEEE Transactions on Fuzzy Systems, 13–4, 517–530.CrossRefGoogle Scholar
  17. 17.
    Haider, T., & Yusuf, M. (2009). A fuzzy approach to energy optimized routing for wireless sensor networks. The International Arab Journal of Information Technology, 6–2, 179–188.Google Scholar
  18. 18.
    Erdem, A., & Gundem, T. I. (2014). M-FDBSCAN: A multicore density-based uncertain data clustering algorithm. Turkish Journal of Electrical Engineering & Computer Sciences, 22, 143–154.CrossRefGoogle Scholar
  19. 19.
    Hussain, K., Abdullah, A. H., Awan, K. M., Ahsan, F., & Hussain, A. (2013). Cluster head election schemes for WSN and MANET: A survey. World Applied Sciences Journal, 23–5, 611–620.Google Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  1. 1.Department of Information Science and Technology, CEG CampusAnna UniversityChennaiIndia
  2. 2.VIT UniversityVelloreIndia

Personalised recommendations