Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

A Bioinspired Cost Aware Secure Routing Protocol for Wireless Sensor Network

Published on June 2016 by Dipawali Nerkar, Jagdish Pimple
National Conference on Recent Trends in Computer Science and Information Technology
Foundation of Computer Science USA
NCRTCSIT2016 - Number 1
June 2016
Authors: Dipawali Nerkar, Jagdish Pimple
e7939c34-32d8-41ab-8410-bb7b045ec316

Dipawali Nerkar, Jagdish Pimple . A Bioinspired Cost Aware Secure Routing Protocol for Wireless Sensor Network. National Conference on Recent Trends in Computer Science and Information Technology. NCRTCSIT2016, 1 (June 2016), 22-25.

@article{
author = { Dipawali Nerkar, Jagdish Pimple },
title = { A Bioinspired Cost Aware Secure Routing Protocol for Wireless Sensor Network },
journal = { National Conference on Recent Trends in Computer Science and Information Technology },
issue_date = { June 2016 },
volume = { NCRTCSIT2016 },
number = { 1 },
month = { June },
year = { 2016 },
issn = 0975-8887,
pages = { 22-25 },
numpages = 4,
url = { /proceedings/ncrtcsit2016/number1/25021-1645/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computer Science and Information Technology
%A Dipawali Nerkar
%A Jagdish Pimple
%T A Bioinspired Cost Aware Secure Routing Protocol for Wireless Sensor Network
%J National Conference on Recent Trends in Computer Science and Information Technology
%@ 0975-8887
%V NCRTCSIT2016
%N 1
%P 22-25
%D 2016
%I International Journal of Computer Applications
Abstract

In multi-hop wireless sensor networks (WSNs), Optimization and security are two different design issues with non-refill energy resources. In this paper, we first introduce secure and efficient Cost-Aware Secure Routing (CASER) protocol to point two different issues by two specifications: energy balance control and possibility based random walking. Then we find that the energy loss is randomly for the given network topology, which very much reduces the lifetime of the sensor networks. To overcome this problem, we introduce an efficient random energy deployment approach to increase the lifetime and message sending part in the similar energy source and security requirement. We also provide a computable security analysis on the proposed routing protocol. In this introduced CASER protocol which provides best deal between routing efficiency and energy balance, and significantly increases the lifetime of the sensor networks in all sides. For the random energy distribution, our analysis shows that we can increase the lifetime and the total number of messages that can be delivered by more than four times under the same assumption. In introduced CASER protocol, we show that it can produce a high message delivery ratio when secure routing from trace back attacks.

References
  1. Di Tang Tongtong Li Jian Ren and Jie Wu "Cost -Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks" IEEE Transactions on Parallel and Distributed Systems. 2015
  2. A. Abbasi, M. Youngish, and K. Akkaya, "Movement-assisted connectivity restoration in wireless sensor and actor networks," IEEE Trans. Parallel Distrib. Syst. , vol. 20, no. 9, pp. 1366-1379, Sep. 2009.
  3. G. Wang, G. Cao, and T. La Porta, "Movement-assisted sensor deployment," IEEE Trans. Mobile Comput. , vol. 5, no. 6, pp. 640–652 Jun. 2006.
  4. S. Yang, M. Li, and J. Wu, "Scan-based movement-assisted sensor deployment methods in wireless sensor networks," IEEE Trans. Parallel Distrib. Syst. , vol. 18, no. 8, pp. 1108–1121, Aug. 2007
  5. Z. Shen, Y. Chang, H. Jiang, Y. Wang, and Z. Yan,"A generic framework for optimal mobile sensor redeployment," IEEE Trans. Veh. Technol. ,vol. 59, no. 8, pp. 4043–4057, Oct. 2010.
  6. C. V. Swathi1, Mrs. Nagarathna2, "Energy Efficient Routing Protocol with Secure Hash Algorithm for Multi Hop WSN," International Journal of Research In Science & Engineering Volume: 1 Special Issue: 2
  7. B. Sireesha1, G. TagoreSai Prasad2, "an alternative secured and efficient routing strategy for wireless sensor networks" (IJETER), vol. 3 no. 6, (2015)
  8. Mrs. S. Gowsiga , Dr. P. Senthil Kumar " a review study of various routing protocols based on routing information update mechanism of mobile ad hoc networks" (IJERA) International Conference on Humming Bird ( 01st March 2014)
  9. Salonee Mishra and Binod Kumar Pattanayak "power aware routing in mobile ad hoc networks:a survey" vol. 8, no. 3, march 2013.
  10. Junmo Yang, Kazuya Sakai, Bonam Kim, Hiromi Okada, and Min-Te Sun "Cost-Aware Route Selection inWireless Mesh Networks"
  11. Anandhi. R, Dr. R. Manicka chezian "A Review on Geographic Routing in Wireless Sensor Network" Vol. 2, Issue 7, July 2014.
  12. Roshni M. Bhave, Prof. Vijay Bagdi "Recovery of Nodes Failure in Wireless Sensor Network Using CASER Protocol and DARA:Review" Volume: 3 Issue: 2
  13. Sajid Hussain, Abdul Wasey Matin, Obidul Islam Genetic Algorithm for Hierarchical Wireless Sensor Networks" journal of networks, vol. 2, no. 5, september 2007
  14. P. D. Khambre,S. S. Sambhare, P. S. Chavan1 "Secure Data in Wireless Sensor Network via AES(Advanced Encryption Standard)" Vol. 3 (2) , 2012,3588-3592
Index Terms

Computer Science
Information Sciences

Keywords

Wsns Caser Routing Security Energy Efficiency.