Secure and Energy Efficient Routing in Wireless Multi-hop Clustered Networks Based on RSSI

  • Authors

    • Jatin Gupta Chitkara University
    • Anchal Kathuria Chitkara University
    • Jyotsna Sengupta Punjabi Universityi
    2018-03-25
    https://doi.org/10.14419/ijet.v7i2.10001
  • Vulnerability, RSSI, Multihop, Energy, Security, Cost function.
  • Today is an era of technology and computing. This technological revolution has created a need for anything and everything to be connected to each other in order to achieve a better communication and utilisation of resources. An isolated computer becomes an information island and may not be able to achieve the optimum use of power and resources. To connect computer systems, there are two options available: one is the installation of LAN (local area networking) cables which may be cumbersome at first but it ensures security and the other one is wireless media. Wireless networking, apart from being simple and efficient, poses serious challenges of security breach by rogue nodes and compromise in performance due to dynamic nature of mobile nodes. Extensive research has been carried out so far and several algorithms and protocols have been formulated to incorporate the location and energy aware characteristics for routing. The technique proposed in this paper considers various factors like energy, distance, vulnerability and battery power while propagating the packet information between the nodes in a sensor networks implementing the heterogeneity in terms of nodes. The ultimate aim is to enhance the longevity of the sensor network while ensuring the security of the network. This is achieved by considering RSSI (Received Signal Strength Indicator) factor in accord with other factors in a multi-hop routing. Extensive simulation results and analysis demonstrate that the proposed technique outperforms other security mechanisms and protocols in the literature in terms of energy awareness, security and routing efficiency.

  • References

    1. [1] D. Estrin, R. Govindan, J. Heidemann, and Satish Kumar. Next Century Challenges: Scalable Coordination in Sensor Networks. In Proceedings of Mobicom’ 99, 1999.

      [2] J. Kulik, W. Rabiner, and H. Balakrishnan. Adaptive Protocols for Information Dissemination in Wireless Sensor Networks. In Proceedings of Mobicom’ 99, 1999.

      [3] W. Mangione-Smith and P.S. Ghang. A Low Power Medium Access Control Protocol for Portable Multi-Media Systems.In Proceedings 3rd Intl. Workshop on Mobile Multimedia Communications. Princeton, NJ, Sept 25-27, 1996.

      [4] K. M. Sivalingam, M. B. Srivastava and P. Agrawal.Low Power Link and Access Protocols for Wireless Multimedia Networks. In Proceedings IEEE Vehicular Technology Conference VTC'97, May 1997.

      [5] M. Stemm, P. Gauthier, D. Harada and R. Katz.Reducing Power Consumption of Network Interfaces in Hand-Held Devices. In Proceedings 3rd Intl. Workshop on Mobile Multimedia Communications, Sept. 25-27, 1996, Princeton, NJ.

      [6] Z. Karakehayov, “Using REWARD to detect team blackhole attacks in wireless sensor networks,†in Proc. Real-World Wireless SensorNetworks’05, Jun. 2005.

      [7] X. Du and H. H. Chen, “Security in wireless sensor networks,†IEEE Wireless Communication, vol. 15, no. 4, pp. 60-66, Aug. 2008. https://doi.org/10.1109/MWC.2008.4599222.

      [8] V. C. Giruka, M. Singhal, J. Royalty, and S. Varanasi, “Security in wireless sensor networks,†Wireless Communication and Mobile Computing, vol. 8, no. 1, pp. 1-24, Jan. 2008. https://doi.org/10.1002/wcm.422.

      [9] D. R. Raymond and S. F. Midkiff, “Denial-of-service in wireless sensor networks: attacks and defenses,†IEEE Pervasive Computing, vol. 7, no. 1, pp. 74-81, Jan. 2008. https://doi.org/10.1109/MPRV.2008.6.

      [10] N. M. Khan, Z. Khalid, G. Ahmed, and M. Yasin. A robust routing strategy for wireless sensor networks.In Proc. of IEEE International Conference on Electrical Engg. (ICEE), pages1 {5, Lahore, Pakistan, April 2007. https://doi.org/10.1109/ICEE.2007.4287337.

      [11] Devi, V. S., & Hegde, N. P. (2016). Energy efficient multipath routing protocol for enhancing QoS and QoE in multimedia applications for MANETs. International Journal of Communication Networks and Information Security, 8(3), 158.

      [12] J. Chang and L.Tassiulas.Energy conserving routing in wireless ad-hoc networks.In Proc. IEEE INFOCOM, March 2000.

      [13] C. Chiasserini, I. Chlamtac, P. Monti, and A. Nucci. Energy efficient design of wireless ad hoc networks.In Proc. European Wireless, February 2002. https://doi.org/10.1007/3-540-47906-6_30.

      [14] Kamruzzaman, S. M., Fernando, X., & Jaseemuddin, M. (2016). Energy Aware Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks. International Journal of Communication Networks and Information Security, 8(3), 187.

      [15] Z. Khalid, G. Ahmed, N. M. Khan, and P. Vigneras real-time energy-aware routing strategy for wireless sensor networks. In Proc. Asia-Pacific Conference on Communications (APCC), Bangkok, Thailand, October 2007.

      [16] Khan, Noor M., Ihsan Ali, Zubair Khalid, Ghufran Ahmed, Rodica Ramer, and Alex A. Kavokin. "Quasi centralized clustering approach for an energy-efficient and vulnerability-aware routing in wireless sensor networks." In Proceedings of the 1st ACM international workshop on Heterogeneous sensor and actor networks, pp. 67-72. ACM, 2008 https://doi.org/10.1145/1374699.1374712.

      [17] Kaswan A, Nitesh K, Jana PK. Energy efficient path selection for mobile sink and data gathering in wireless sensor networks. AEU-International Journal of Electronics and Communications. 2017 Mar 31; 73:110-8. https://doi.org/10.1016/j.aeue.2016.12.005.

      [18] Jaichandran R, Raja JE, et al. Effective strategies and optimal solutions for hotspot problem in wireless sensor networks (WSN). 10th International Conference on Information Sciences Signal Processing and their Applications (ISSPA).IEEE; 2010. p. 389–92.

      [19] Singh R, Verma AK. Energy efficient cross layer based adaptive threshold routing protocol for WSN. AEU-International Journal of Electronics and Communications. 2017 Feb 28; 72:166-73. https://doi.org/10.1016/j.aeue.2016.12.001.

      [20] J. Deng, R. Han, and S. Mishra, “INSENS: Intrusion-tolerant routing for wireless sensor networks,†Computer Communications, vol. 29, no.2, pp. 216-230, Jan. 2006. https://doi.org/10.1016/j.comcom.2005.05.018.

      [21] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “Spins: Security protocols for sensor networks,†in Proc. ACM International Conference on Mobile Computing and Networking’01, Jul. 2001. https://doi.org/10.1145/381677.381696.

      [22] G. Mergen, Q. Zhao, and L. Tong. Sensor networks with mobile access: Energy and capacity consideration. IEEE Transactions on Communications, 54(11), November 2006. https://doi.org/10.1109/TCOMM.2006.884845.

      [23] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-efficient communication protocol for wsn. In Proc. 33rdHawaii International Conference on System Sciences, 2000.

      [24] Subramanian G, Amutha R. Efficient and secure routing protocol for wireless sensor networks using mine detection an extension of triple umpiring system for WSN. In Computing Technology and Information Management (ICCM), 2012 8th International Conference on 2012 Apr 24 (Vol. 1, pp. 141-145).IEEE.

      [25] Choi J. Secure multipath routing in wireless multihop networks based on erasure channel modeling. InWireless Advanced (WiAd), 2012 Jun 25 (pp. 6-10). IEEE.

      [26] M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin,“Wireless information-theoretic security,†IEEE Trans. Inf. Theory vol.54, no. 6, pp.2515-2534, June 2008. https://doi.org/10.1109/TIT.2008.921908.

      [27] Nagarathna, K., Kiran, Y. B., Mallapur, J. D., &, S. (2012, July). Trust based secured routing wireless multimedia sensor networks. In Computational Intelligence, Communication Systems and Networks (CICSyN), 2012 Fourth International Conference on (pp. 53-58). IEEE.

      [28] Y. Zou and K. Chakrabarty. Energy-aware target localization in wireless sensor networks.In Proc. First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003. https://doi.org/10.1109/PERCOM.2003.1192727.

      [29] T. N. Arvanitis, C. C. Constantinou, A. S. Stepanenko,Y. Sun, B. Liu, and K. Baughan. Network visualisation and analysis tool based on logical network abridgment. In Proc.Military Commun. Conf. (MilCom'05), volume 1, pages 106{112, October 2005. https://doi.org/10.1109/MILCOM.2005.1605672.

  • Downloads

  • How to Cite

    Gupta, J., Kathuria, A., & Sengupta, J. (2018). Secure and Energy Efficient Routing in Wireless Multi-hop Clustered Networks Based on RSSI. International Journal of Engineering & Technology, 7(2), 437-443. https://doi.org/10.14419/ijet.v7i2.10001