An Intelligent Energy Aware Secured Algorithm for Routing in Wireless Sensor Networks
- 229 Downloads
- 1 Citations
Abstract
Modern Wireless Sensor Networks (WSNs) requires special requirements in routing protocols because of nature of distribution and dynamic topology. The most important need for WSNs is energy efficient routing protocol that consumes optimal energy. It provides extension to the network’s life period. Nowadays a number of energy efficient routing protocols are proposed by various researchers in WSNs. However, security and energy efficiency in data collection and transmission in WSNs should be simultaneously considered for security challenges and to overcome limitation of WSNs. In this paper, we propose a new and effective routing protocol named, “Intelligent Energy Aware Secured Algorithm for Routing (IEASAR)” which is secure by using a Trust based approach and is Energy efficient at the same time. For this purpose, a new energy efficient protocol using Fuzzy C-means has been proposed in this paper. Moreover, a modified minimum spanning tree approach is applied here to identify the minimum distance path between the sender node and the destination node and hence an optimal and secured routing path is selected. Extensive simulations have been conducted in this work to verify the validity of our claims.
Keywords
Fuzzy C-means clustering WSNs Energy Aware Network lifetime Secured routing and IEASARNotes
Acknowledgements
One of the authors K. Selvakumar is thankful to the UGC, New Delhi India, for funding through UGC-BSR fellowship to carry out this research work.
References
- 1.Liu, A., Zheng, Z., Zhang, C., Chen, Z., & Shen, X. (2012). Secure and energy-efficient disjoint multipath routing for WSNs. IEEE Transactions on Vehicular Technology, 61–7, 3255–3265.CrossRefGoogle Scholar
- 2.Maham, B., Hjørungnes, A., & Narasimhan, R. (2011). Energy-efficient space-time coded cooperation in outage-restricted multihop wireless networks. IEEE Transactions on Communications, 59–11, 3111–3121.CrossRefGoogle Scholar
- 3.Shu, T., Krunz, M., & Liu, S. (2010). Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Transactions on Mobile Computing, 9–7, 941–954.Google Scholar
- 4.Elhawary, M., & Haas, Z. J. (2011). Energy-efficient protocol for cooperative networks. IEEE/ACM Transactions on Networking, 19–2, 561–574.CrossRefGoogle Scholar
- 5.Zhu, J., & Wang, X. (2011). Model and protocol for energy-efficient routing over mobile ad hoc networks. IEEE Transactions on Mobile Computing, 10–11, 1546–1557.CrossRefGoogle Scholar
- 6.Jerusha, S., Kulothungan, K., & Kannan, A. (2012). Location aware cluster based routing in wireless sensor networks. International Journal of Computer & Communication Technology, 3–5, 1–6.Google Scholar
- 7.Vijayakumar, P., Bose, S., & Kannan, A. (2013). Centralized key distribution protocol using the greatest common divisor method. Computers & Mathematics with Applications, 65, 1360–1368.MathSciNetCrossRefMATHGoogle Scholar
- 8.Guo, S., & Yang, O. (2007). Energy-aware multicasting in wireless ad hoc networks: A survey and discussion. Computer Communications, 30–9, 2129–2148.CrossRefGoogle Scholar
- 9.Fan, Y.-C., & Chen, A. L. P. (2012). Energy efficient schemes for accuracy-guaranteed sensor data aggregation using scalable counting. IEEE Transactions on Knowledge and Data Engineering, 24–8, 1463–1477.CrossRefGoogle Scholar
- 10.Pantazis, N. A., Nikolidakis, S. A., & Vergados, D. D. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 15–2, 551–591.CrossRefGoogle Scholar
- 11.Xia, H., Jia, Z., Lei, J., Li, X., & Sha, E. H.-M. (2013). Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Computer Communications, 36, 1078–1093.CrossRefGoogle Scholar
- 12.Sun, Y. L., Yu, W., Han, Z., & Liu, K. J. R. (2006). Information theoretic framework of trust modeling evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24–2, 305–319.Google Scholar
- 13.Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET-Information Security, 4–4, 212–223.CrossRefGoogle Scholar
- 14.Xia, H., Jia, Z., Ju, L., & Zhu, Y. (2011). Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory. IET Wireless Sensor Systems, 1–4, 248–266.CrossRefGoogle Scholar
- 15.Bezdek, J. C. (1981). Pattern recognition with fuzzy objective function algorithms. New York, MA: Plenum Press.CrossRefMATHGoogle Scholar
- 16.Pal, N. R., Pal, K., Keller, J. M., & Bezdek, J. C. (2005). Possibilistic fuzzy c-means clustering algorithm. IEEE Transactions on Fuzzy Systems, 13–4, 517–530.CrossRefGoogle Scholar
- 17.Haider, T., & Yusuf, M. (2009). A fuzzy approach to energy optimized routing for wireless sensor networks. The International Arab Journal of Information Technology, 6–2, 179–188.Google Scholar
- 18.Erdem, A., & Gundem, T. I. (2014). M-FDBSCAN: A multicore density-based uncertain data clustering algorithm. Turkish Journal of Electrical Engineering & Computer Sciences, 22, 143–154.CrossRefGoogle Scholar
- 19.Hussain, K., Abdullah, A. H., Awan, K. M., Ahsan, F., & Hussain, A. (2013). Cluster head election schemes for WSN and MANET: A survey. World Applied Sciences Journal, 23–5, 611–620.Google Scholar