ENERGY-AWARE SECURITY ROUTING PROTOCOL FOR WSN IN BIG-DATA APPLICATIONS
PDF

How to Cite

Smys, S. 2019. “ENERGY-AWARE SECURITY ROUTING PROTOCOL FOR WSN IN BIG-DATA APPLICATIONS”. Journal of ISMAC 1 (1): 38-55. https://doi.org/10.36548/jismac.2019.1.004.

Keywords

— Wireless sensor networks
— Big-Data
— Energy efficiency
— Security
— Quality of service
Published: 30-06-2019

Abstract

The dense deployment of the wireless sensor networks has caused enormous data flow leading to a Big-Data generation. To enable a continuous transmission for the huge volume of data packets, it becomes necessary to readapt the routing protocol to facilitate the routing in handling the Big-data scenario. Since energy is the main constraint in the wireless sensor network, as the sensor are battery powered, and the routing methods consuming enormous of the energy for route discovery thereby reducing the network life time, many conventional methods were developed to address the problem of energy consumption with the, increased network latency, overhead, security issues and delay. So the paper proposes the energy-aware routing protocol that could handle the security issues, arising in the enormous data generation satisfying the QOS requirements. The node with substantial resources are selected to overcome the problems of energy consumption and the network life time handling the security issues , delay, network latency and the overhead problem. Further validation of the proposed method in the Network Simulator-3 is performed to evaluate the network latency, packet delivery ratio, throughput, power consumption, network lifetime and Cost.

References

  1. Yan, Jingjing, Mengchu Zhou, and Zhijun Ding. "Recent advances in energy-efficient routing protocols for wireless sensor networks: A review." IEEE Access 4 (2016): 5673-5686.
  2. Khan, Atta Ur Rehman, Sajjad A. Madani, Khizar Hayat, and Samee Ullah Khan. "Clustering‐based power‐controlled routing for mobile wireless sensor networks." International journal of communication systems 25, no. 4 (2012): 529-542.
  3. Dong, Mianxiong, Kaoru Ota, Laurence T. Yang, Shan Chang, Hongzi Zhu, and Zhenyu Zhou. "Mobile agent-based energy-aware and user-centric data collection in wireless sensor networks." Computer networks 74 (2014): 58-70.
  4. Puranikmath, Veena I., Sunil S. Harakannanavar, Satyendra Kumar, and Dattaprasad Torse. "Comprehensive Study of Data Aggregation Models, Challenges and Security Issues in Wireless Sensor Networks." International Journal of Computer Network and Information Security 11, no. 3 (2019): 30.
  5. Karlof, Chris, and David Wagner. "Secure routing in wireless sensor networks: Attacks and countermeasures." In Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003., pp. 113-127. IEEE, 2003.
  6. Nasser, Nidal, and Yunfeng Chen. "SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks." Computer communications 30, no. 11-12 (2007): 2401-2412.
  7. Pathan, Al-Sakib Khan, Hyung-Woo Lee, and Choong Seon Hong. "Security in wireless sensor networks: issues and challenges." In 2006 8th International Conference Advanced Communication Technology, vol. 2, pp. 6-pp. IEEE, 2006.
  8. Guleria, Kalpna, and Anil Kumar Verma. "Comprehensive review for energy efficient hierarchical routing protocols on wireless sensor networks." Wireless Networks 25, no. 3 (2019): 1159-1183.
  9. Ganesh, Subramanian, and Ramachandran Amutha. "Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms." Journal of Communications and Networks 15, no. 4 (2013): 422-429.
  10. Du, Xiaojiang, and Hsiao-Hwa Chen. "Security in wireless sensor networks." IEEE Wireless Communications 15, no. 4 (2008): 60-66.
  11. Liu, Anfeng, Zhongming Zheng, Chao Zhang, Zhigang Chen, and Xuemin Shen. "Secure and energy-efficient disjoint multipath routing for WSNs." IEEE Transactions on Vehicular Technology 61, no. 7 (2012): 3255-3265.
  12. Dhakne, Amol R., and P. N. Chatur. "Distributed trust based intrusion detection approach in wireless sensor network." In 2015 Communication, Control and Intelligent Systems (CCIS), pp. 96-101. IEEE, 2015.
  13. Amouri, Amar, Luis G. Jaimes, Raju Manthena, Salvatore D. Morgera, and Idalides J. Vergara-Laurens. "A simple scheme for pseudo clustering algorithm for cross layer intrusion detection in MANET." In 2015 7th IEEE Latin-American Conference on Communications (LATINCOM), pp. 1-6. IEEE, 2015.
  14. Takaishi, Daisuke, Hiroki Nishiyama, Nei Kato, and Ryu Miura. "Toward energy efficient big data gathering in densely distributed sensor networks." IEEE transactions on emerging topics in computing 2, no. 3 (2014): 388-397.
  15. Elhoseny, Mohamed, Xiaohui Yuan, Zhengtao Yu, Cunli Mao, Hamdy K. El-Minir, and Alaa Mohamed Riad. "Balancing energy consumption in heterogeneous wireless sensor networks using genetic algorithm." IEEE Communications Letters 19, no. 12 (2014): 2194-2197.
  16. Farouk, Ahmed, Josep Batle, M. Elhoseny, Mosayeb Naseri, Muzaffar Lone, Alex Fedorov, Majid Alkhambashi, Syed Hassan Ahmed, and M. Abdel-Aty. "Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states." Frontiers of Physics 13, no. 2 (2018): 130306.
  17. Elhoseny, Mohamed, and Aboul Ella Hassanien. "Secure Data Transmission in WSN: An Overview." In Dynamic Wireless Sensor Networks, pp. 115-143. Springer, Cham, 2019.
  18. Wang, Jin, Yu Gao, Wei Liu, Arun Kumar Sangaiah, and Hye-Jin Kim. "Energy Efficient Routing Algorithm with Mobile Sink Support for Wireless Sensor Networks." Sensors 19, no. 7 (2019): 1494.
  19. Rios, Lidice Garcia. "Big data infrastructure for analyzing data generated by wireless sensor networks." In 2014 IEEE International Congress on Big Data, pp. 816-823. IEEE, 2014.
  20. Fouad, Mohamed Mostafa, Nour E. Oweis, Tarek Gaber, Maamoun Ahmed, and Vaclav Snasel. "Data mining and fusion techniques for WSNs as a source of the big data." Procedia Computer Science 65 (2015): 778-786.