Advertisement

SMEER: Secure Multi-tier Energy Efficient Routing Protocol for Hierarchical Wireless Sensor Networks

  • Geetika DhandEmail author
  • S. S. Tyagi
Article
  • 28 Downloads

Abstract

Energy consumption and the secure transmission are the increasing fields of research challenge in wireless sensor network (WSN) applications. Heterogeneous WSN is an efficient network strategy that has sensor nodes with different processing, memory power, and transmission capacity. In order to provide effective transmission for this type of network, clustering associated with secure routing is enabled to transfer the data packets safely to the endpoint. Data gathering and clustering help to group the network and control transmission overhead during data transmission. Hybridization of K-means clustering algorithm with Ant Lion Optimizer for grouping of nodes and optimal CH selection is utilized for better energy efficiency. Thus, a Miscegenation of Ant Lion optimizer within K-means for clustering and Spherical grid based multi-curve Elliptic curve cryptographic routing (MALOKSER) is determined for effective clustering and secure routing of data packets within time to the base station. The main aim of our work is to enhance network security and energy savage in the wireless network communication system. Elliptic curve cryptography with spherical grid multi-tier routing ensure secure transmission by encrypting the messages with two different keys and forward the packets in a spherical format. The performance is evaluated under metrics such as packet deliver ratio, minimum energy consumptions, communication overheads, throughput and end to end delay with the existing standards shows better results. This proves the proposed technique can actively reduce the energy utilization with an efficient and safe routing of data over the network.

Keywords

Wireless sensor networks Ant lion optimizer K-means clustering algorithm Elliptic curve cryptographic Security enhancement Key generation 

Notes

References

  1. 1.
    Afsar, M. M., & Tayarani-N, M. H. (2014). Clustering in sensor networks: A literature survey. Journal of Network and Computer Applications, 46, 198–226.CrossRefGoogle Scholar
  2. 2.
    Amgoth, T., & Jana, P. K. (2015). Energy-aware routing algorithm for wireless sensor networks. Computers and Electrical Engineering, 41, 357–367.CrossRefGoogle Scholar
  3. 3.
    Elhabyan, R. S., & Yagoub, M. C. (2015). Two-tier particle swarm optimization protocol for clustering and routing in wireless sensor network. Journal of Network and Computer Applications, 52, 116–128.CrossRefGoogle Scholar
  4. 4.
    Badi, A., Mahgoub, I., & Filippini, D. (Ed.). (2012). Emerging concepts in collective sensing. In Autonomous sensor networks (pp. 395–423). Berlin: Springer.CrossRefGoogle Scholar
  5. 5.
    Liu, Y. N., Wang, J., Du, H., & Zhang, L. (2010). Key sharing in hierarchical wireless sensor networks. In 2010 IEEE/IFIP 8th international conference on embedded and ubiquitous computing (EUC) (pp. 743–748). IEEE.Google Scholar
  6. 6.
    Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2014). PASCCC: Priority-based application-specific congestion control clustering protocol. Computer Networks, 74, 92–102.CrossRefGoogle Scholar
  7. 7.
    Banerjee, I., Chanak, P., Rahaman, H., & Samanta, T. (2014). Effective fault detection and routing scheme for wireless sensor networks. Computers and Electrical Engineering, 40(2), 291–306.CrossRefGoogle Scholar
  8. 8.
    Pantazis, N. A., Nikolidakis, S. A., & Vergados, D. D. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Communications Surveys and Tutorials, 15(2), 551–591.CrossRefGoogle Scholar
  9. 9.
    Cheng, L., Niu, J., Cao, J., Das, S. K., & Gu, Y. (2014). QoS aware geographic opportunistic routing in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(7), 1864–1875.CrossRefGoogle Scholar
  10. 10.
    Chanak, P., Banerjee, I., & Sherratt, R. S. (2017). Energy-aware distributed routing algorithm to tolerate network failure in wireless sensor networks. Ad Hoc Networks, 56, 158–172.CrossRefGoogle Scholar
  11. 11.
    Anisi, M. H., Abdul-Salaam, G., Idris, M. Y. I., Wahab, A. W. A., & Ahmedy, I. (2017). Energy harvesting and battery power based routing in wireless sensor networks. Wireless Networks, 23(1), 249–266.CrossRefGoogle Scholar
  12. 12.
    Dong, Q., & Dargie, W. (2013). A survey on mobility and mobility-aware MAC protocols in wireless sensor networks. IEEE Communications Surveys and Tutorials, 15(1), 88–100.CrossRefGoogle Scholar
  13. 13.
    Hsueh, C. T., Wen, C. Y., & Ouyang, Y. C. (2012). Two-tier receiver-initiated secure scheme for hierarchical wireless sensor networks. In 2012 12th international conference on ITS telecommunications (ITST) (pp. 254–258). IEEE.Google Scholar
  14. 14.
    Kuila, P., & Jana, P. K. (2014). Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach. Engineering Applications of Artificial Intelligence, 33, 127–140.CrossRefGoogle Scholar
  15. 15.
    Ehsan, S., & Hamdaoui, B. (2012). A survey on energy-efficient routing techniques with QoS assurances for wireless multimedia sensor networks. IEEE Communications Surveys and Tutorials, 14(2), 265–278.CrossRefGoogle Scholar
  16. 16.
    Hoang, D. C., Yadav, P., Kumar, R., & Panda, S. K. (2014). Real-time implementation of a harmony search algorithm-based clustering protocol for energy-efficient wireless sensor networks. IEEE Transactions on Industrial Informatics, 10(1), 774–783.CrossRefGoogle Scholar
  17. 17.
    Agrawal, C. G., & Kulkarni, J. B. (2014). Enhancing the security in WSN using three tier security architecture. International Journal of Innovative Research in Information Security (IJIRIS), 1, 40–47.Google Scholar
  18. 18.
    Devisri, S., & Balasubramaniam, C. (2013). Secure routing using trust based mechanism in wireless sensor networks (WSNs). International Journal of Scientific and Engineering Research, 4(2), 1–7.Google Scholar
  19. 19.
    Kavitha, T. V., Shruthi, B. S., & Scholar, P. G. (2016). Robust energy saving opportunistic routing (Ens_Or) algorithm for prolonging the lifetime of WSN. International Journal of Engineering Science and Computing, 6(6), 6680–6685.Google Scholar
  20. 20.
    Imrana, B. K., & Sri, G. M. (2016). Controlling residual energy of WSN with secure routing protocal. International Journal of Scientific Research, 4(8), 154–156.Google Scholar
  21. 21.
    Chris, K., & David, W. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.Google Scholar
  22. 22.
    Roy, S., Conti, M., Setia, S., & Jajodia, S. (2014). Secure data aggregation in wireless sensor networks: Filtering out the attacker’s impact. IEEE Transactions on Information Forensics and Security, 9(4), 681–694.CrossRefGoogle Scholar
  23. 23.
    Shim, K. A., & Park, C. M. (2015). A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2128–2139.CrossRefGoogle Scholar
  24. 24.
    Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.CrossRefGoogle Scholar
  25. 25.
    Elhoseny, M., Yuan, X., El-Minir, H. K., & Riad, A. M. (2016). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, 9(13), 2024–2031.Google Scholar
  26. 26.
    Sarma, H. K. D., Kar, A., & Mall, R. (2016). A hierarchical and role based secure routing protocol for mobile wireless sensor networks. Wireless Personal Communications, 90(3), 1067–1103.CrossRefGoogle Scholar
  27. 27.
    Dhunna, G. S., & Al-Anbagi, I. (2017). A low power cyber-attack detection and isolation mechanism for wireless sensor network. In Vehicular technology conference (VTC-Fall), 2017 IEEE 86th (pp. 1–5). IEEE.Google Scholar
  28. 28.
    Singh, S., Malik, A., & Kumar, R. (2017). Energy efficient heterogeneous DEEC protocol for enhancing lifetime in WSNs. Engineering Science and Technology, an International Journal, 20(1), 345–353.CrossRefGoogle Scholar
  29. 29.
    Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2018). A Sybil attack detection scheme for a forest wildfire monitoring application. Future Generation Computer Systems, 80, 613–626.CrossRefGoogle Scholar
  30. 30.
    Yildiz, H. U., Ciftler, B. S., Tavli, B., Bicakci, K., & Incebacak, D. (2018). The impact of incomplete secure connectivity on the lifetime of wireless sensor networks. IEEE Systems Journal, 12(1), 1042–1046.CrossRefGoogle Scholar
  31. 31.
    Mirjalili, S. (2015). The ant lion optimizer. Advances in Engineering Software, 83, 80–98.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.CSEManav Rachna International Institute of Research and StudiesFaridabadIndia

Personalised recommendations