Open Access Open Access  Restricted Access Subscription or Fee Access

Energy Efficiency Using Particle Swarm Optimization with Secured Based Malicious Node Detection and Routing in WSN

N. Senthil Kumar

Abstract


Recent years have witnessed an increasing interest in Wireless Sensor Networks (WSNs) for various applications such as environmental monitoring and military field surveillance. WSN have number of sensor nodes that communicate wirelessly and it deployed to gather data for various environments. The existing research has issue with security and energy efficient routing in WSN. To overcome these issues, in this research, the Cluster Head (CH) is selected using PSO algorithm based on the best objective function values. The CH node has capability of rapid packet delivery ratio and better lower energy consumption. The PSO algorithm is used to select the optimal node and increases effective routing procedure. The routing process is done by using AODV protocol in this research. This is used to provide efficient path discovery and provides fast packet transmission and response. The Secured based Malicious node Detection and Routing (SMDR) approach is proposed to improve secured data aggregation in WSN. Thus the proposed PSO-SMDR scheme provides superior performance rather than the existing approaches. The result concludes that the proposed PSO-SMDR approach has lower energy consumption, lower end to end delay, higher packet delivery ratio and higher network lifetime than the existing approaches.


Keywords


Energy Consumption, PSO, SMDR, AODV, WSN, Routing.

Full Text:

pdf

References


Liu Ming, Cao Jiannong, Chen Guihai, Wang Xiaomin. An energy-aware routing protocol in wireless sensor networks. Sensors (Basel) 2009;9(1):445e62.

Noor Alsaedi, Fazirulhisyam Hashim, A. Sali “Energy Trust System for Detecting Sybil Attack in Clustered Wireless Sensor Networks”, IEEE 2015.

P. Raghu Vamsi, Krishna Kant “A Light-weight Sybil Attack Detection Framework for Wireless Sensor Networks”, IEEE 2014.

K. Akkaya, M. Demirbas, and R. S. Aygun, “The impact of data aggregation on the performance of wireless sensor networks,” Wireless Communications and Mobile Computing, vol. 8, no. 2, pp. 171–193, 2008.

R. Rajagopalan and P. K. Varshney, “Data aggregation techniques in sensor networks: a survey,” IEEE Communications Surveys and Tutorials, vol. 8, no. 4, pp. 48–63, 2006.

P. Raghu Vamsi, Krishna Kant “Sybil Attack Detection using Sequential Hypothesis Testing in Wireless Sensor Networks”, ICSPCT 2014.

R. Amuthavalli, DR. R. S. Bhuvaneshwaran “Detection and Prevention of Sybil Attack in WSN Employing Random Password Comparison Method”, JATIT 2014, Vol. 67 No.1.

Zhang, Wei, Sajal K. Das, and Yonghe Liu. "A trust based framework for secure data aggregation in wireless sensor networks." Sensor and Ad Hoc Communications and Networks, 2006. SECON'06. 2006 3rd Annual IEEE Communications Society on. Vol. 1. IEEE, 2006.

Bao, Fenye, et al. "Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection."IEEE transactions on network and service management 9.2 (2012): 169-183.

Gopalakrishnan, S. and Ganeshkumar, P. 2014. Intrusion detection in mobile Adhoc Network using secure routing for attacker identification protocol. American Journal of Applied Sciences 11(8), 1391- 1397.

Renyong Wu, Xue Deng, Rongxing Lu, and Xuemin (Sherman) Shen 2015. Trust-Based Anomaly Detection in Emerging Sensor Networks. International Journal of Distributed Sensor Networks. 2015(363569), 1-14.

J.-L. Lu and F. Valois, “On the data dissemination in wsns,” in Wireless and Mobile Computing, Networking and Communications, 2007. WiMOB 2007. Third IEEE International Conference on, 2007, p. 58.

S. Yi, J. Heo, Y. Cho, J. Hong., PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks ELSEVIER Computer Communications 30 (2007) 2842–2852.

Cao, Xianghong, et al. "Cluster heads election analysis for multi-hop wireless sensor networks based on weighted graph and particle swarm optimization." Natural Computation, 2008. ICNC'08. Fourth International Conference on. Vol. 7. IEEE, 2008


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.