224 research outputs found

    Secure and Reliable Routing Protocol for Transmission Data in Wireless Sensor Mesh Networks

    Get PDF
    Abstract Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical attacks. In general, security threats are classified depending on the layers. Physical, Transport, Network, Data link, and the Application layer. Sensor nodes can be placed in an unfriendly environments and it has lower power energy, computation and bandwidth, are exposed to a failure, and the WSN topology dynamically unstable. The recent wireless sensor protocols are intended for data communication transmission energy consumption. Therefore, many do not consider the security in WSN as much as they should and it might be vulnerable to attacks. Standard crypto systems methods aim to protect the authentication and integrity of data packets during the transmission stage between senders and receivers. In this dissertation we present Adel which is a novel routing protocol for exchanging data through wireless sensor mesh networks using Ant Colony Optimization (ACO) algorithm. Adel enhances security level during data transmission between sender party and receiver party in wireless network environment. Once the sensor nodes are deployed in a network, they need to inform their location and their data related to the security for the further communication in the network. For that purpose, ii an efficient mechanism is implemented in order to perform better communication among sensor nodes. Adel generates dynamic routing table using ACO algorithm with all the necessary information from network nodes after being deployed. Adel works with minimum routing restrictions and exploits the advantages of the three multicast routing styles, unicast, path, and mesh based. Since it takes a routing decision with a minimum number of nodes using the shortest path between the sender and the receiver nodes, Adel is applicable in static networks. Four essential performance metrics in mesh networks, network security analysis, network latency time, network packets drop, network delivery ratio, and network throughput are evaluated. Adel routing protocol has met the most important security requirements such as authorization, authentication, confidentiality, and integrity. It also grantees the absence of the cycle path problem in the network.This research reports the implementation and the performance of the proposed protocol using network simulator NS-2. The seven main parameters are considered for evaluation all experiments are security trust, packets drop, energy consumption, throughput, end to end delay and packet delivery ratio. The results show that the proposed system can significantly enhance the network security and connectivity level compared to other routing protocols. Yet, as expected, it did not do so well in energy consumption since our main goal was to provide higher level of security and connectivit

    A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems

    Get PDF
    Mobility management has been a long-standing issue in mobile wireless sensor networks and especially in the context of cyber physical systems its implications are immense. This paper presents a critical analysis of the current approaches to mobility management by evaluating them against a set of criteria which are essentially inherent characteristics of such systems on which these approaches are expected to provide acceptable performance. We summarize these characteristics by using a quadruple set of metrics. Additionally, using this set we classify the various approaches to mobility management that are discussed in this paper. Finally, the paper concludes by reviewing the main findings and providing suggestions that will be helpful to guide future research efforts in the area. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Muhammad Imran” is provided in this record*

    A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems

    Get PDF
    Mobility management has been a long-standing issue in mobile wireless sensor networks and especially in the context of cyber physical systems; its implications are immense. This paper presents a critical analysis of the current approaches to mobility management by evaluating them against a set of criteria which are essentially inherent characteristics of such systems on which these approaches are expected to provide acceptable performance. We summarize these characteristics by using a quadruple set of metrics. Additionally, using this set we classify the various approaches to mobility management that are discussed in this paper. Finally, the paper concludes by reviewing the main findings and providing suggestions that will be helpful to guide future research efforts in the area

    REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs

    Get PDF
    Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency. The existing research has serious drawbacks when using public-key mechanisms such as digital signature algorithms. In this paper, we propose Reliable and Efficient Integrity Scheme for Data Collection in HWSN (REISCH) to alleviate these problems by using secure and lightweight signature algorithms. The results of the performance analysis indicate that our scheme provides high efficiency in data integration between sensors and server (saves more than 24% of alive sensors compared to traditional algorithms). Additionally, we use Automated Validation of Internet Security Protocols and Applications (AVISPA) to validate the security procedures in our scheme. Security analysis results confirm that REISCH is safe against some well-known attacks

    Optimisation of Mobile Communication Networks - OMCO NET

    Get PDF
    The mini conference “Optimisation of Mobile Communication Networks” focuses on advanced methods for search and optimisation applied to wireless communication networks. It is sponsored by Research & Enterprise Fund Southampton Solent University. The conference strives to widen knowledge on advanced search methods capable of optimisation of wireless communications networks. The aim is to provide a forum for exchange of recent knowledge, new ideas and trends in this progressive and challenging area. The conference will popularise new successful approaches on resolving hard tasks such as minimisation of transmit power, cooperative and optimal routing

    Hybridization of Energy Optimization Technique for Cluster Based Routing using Various Computational Intelligence Methods in WSN

    Get PDF
    Approaches in WSN technology has determined by opportunity of tiny and inexpensive sensor nodes with adequacy of sensing multiple kinds of information processing and wireless communication. Network lifetime and energy efficiency are major indexes of WSN. Several clustering techniques are intended to extend the network lifetime but whereas there is an issue of incompetent Cluster Head (CH) election. To overcome this issue, an Integration of Novel Memetic and Brain Storm Optimization approach with Levy Distribution (IoNM-BSOLyD) has been proposed for clustering using fitness function. In the meanwhile, election of CH is done by utilizing fitness function, which incorporates following amplitude such as energy, distance to adjacent nodes, distance to BS, and network load. After clustering, routing techniques decides the detecting and pursuing the route in WSN. In this proposed work, a Water Wave Optimization with Hill Climbing technique (WWO-HCg) is introduced for routing purpose. This proposed methodology deals with ternary QoS aspect such as network delay, energy consumption, packet delivery ratio, network lifetime and security to select optimal path and enhance QoS as well. This proposed protocol provides better performance result than other contemporary protocols

    Research routing and MAC based on LEACH and S-MAC for energy efficiency and QoS in wireless sensor network

    Get PDF
    The wireless sensor is a micro-embedded device with weak data processing capability and small storage space. These nodes need to complete complex jobs, including data monitoring, acquisition and conversion, and data processing. Energy efficiency should be considered as one of the important aspects of the Wireless Sensor Network (WSN) throughout architecture and protocol design. At the same time, supporting Quality of Service (QoS) in WSNs is a research field, because the time-sensitive and important information is expected for the transmitting to to the sink node immediately. The thesis is supported by the projects entitled “The information and control system for preventing forest fires”, and “The Erhai information management system”, funded by the Chinese Government. Energy consumption and QoS are two main objectives of the projects. The thesis discusses the two aspects in route and Media Access Control (MAC). For energy efficiency, the research is based on Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. LEACH is a benchmark clustering routing protocol which imposes upon cluster heads to complete a lot of aggregation and relay of messages to the base-station. However, there are limitations in LEACH. LEACH does not suit a wide area in clustering strategy and multi-hop routing. Moreover, routing protocols only focus on one factor, combining the clustering strategy and multi-hop routing mechanism were not considered in routing protocol for performance of network. QoS is supported by the MAC and routing protocol. Sensor MAC(S-MAC) makes the use of the periodically monitoring / sleeping mechanism, as well as collision and crosstalk avoidance mechanism. The mechanism reduces energy costs. Meanwhile, it supports good scalability and avoids the collision. However, the protocols do not take the differentiated services. For supporting QoS,A new route protocol needs to be designed and realized on embed platforms, which has WIFI mode and a Linux operation system to apply on the actual system. This research project was conducted as following the steps: A new protocol called RBLEACH is proposed to solve cluster on a widely scale based on LEACH. The area is divided into a few areas, where LEACH is improved to alter the selecting function in each area. RBLEACH creates routes selected by using a new algorithm to optimize the performance of the network. A new clustering method that has been developed to use several factors is PS-ACO-LEACH. The factors include the residual energy of the cluster head and Euclidean distances between cluster members and a cluster head. It can optimally solve fitness function and maintain a load balance in between the cluster head nodes, a cluster head and the base station. Based on the “Ant Colony” algorithm and transition of probability, a new routing protocol was created by “Pheromone” to find the optimal path of cluster heads to the base station. This protocol can reduce energy consumption of cluster heads and unbalanced energy consumption. Simulations prove that the improved protocol can enhance the performance of the network, including lifetime and energy conservation. Additionally, Multi Index Adaptive Routing Algorithm (MIA-QR) was designed based on network delay, packet loss rate and signal strength for QoS. The protocol is achieved by VC on an embedded Linux system. The MIA-QR is tested and verified by experiment and the protocol is to support QoS. Finally, an improved protocol (SMAC -SD) for wireless sensor networks is proposed, in order to solve the problem of S-MAC protocol that consider either service differentiation or ensure quality of service. According to service differentiation, SMAC-SD adopts an access mechanism based on different priorities including the adjustment of priority mechanisms of channel access probability, channel multi-request mechanisms and the configuring of waiting queues with different priorities and RTS backoff for different service, which makes the important service receive high channel access probability, ensuring the transmission quality of the important service. The simulation results show that the improved protocol is able to gain amount of important service and shortens the delay at the same time. Meanwhile, it improves the performance of the network effectivel

    A Review of Various Swarm Intelligence Based Routing Protocols for Iot

    Get PDF
    The paper provides insight into various swarm intelligence based routing protocols for Internet of Things (IoT), which are currently available for the Mobile Ad-hoc networks (MANETs) and wireless sensor networks (WSNs). There are several issues which are limiting the growth of Internet of Things. These include the reliability, link failures, routing, heterogeneity etc. The MANETs and WSNs routing issues impose almost same requirements for IoT routing mechanism. The recent work of the worldwide researchers is focused on this area. protocols are based on the principles of swarm intelligence. The swarm intelligence is applied to achieve the optimality and the efficiency in solving the complex, multi-hop and dynamic requirements of the wireless networks. The application of the ACO technique tries to provide answers to many routing issues. Using the swarm intelligence and ant colony optimization principles, it has been seen that, the protocols’ efficiency definitely increases and also provides more scope for the development of more robust, reliable and efficient routing protocols for the IoT. As the various standard protocols available for MANETs and WSNs are not reliable enough, the paper finds the need of some efficient routing algorithms for IoT

    Swarm Intelligence-Based Bio-Inspired Framework for Wireless Sensor Networks

    Get PDF
    Wireless Sensor Networks (WSNs) are gaining immense popularity as a result of their wide potential applications in industry, military, and academia such as military surveillance, agricultural monitoring, industrial automation, and smart homes. Currently, WSN has garnered tremendous significance as it is has become the core component of the Internet of Things (IOT) area. Modern-day applications need a high level of security and quick response mechanism to deal with the emerging data trends where the response is measured in terms of latency, throughput, and scalability. Further, critical security issues need to be considered due to various types of threats and attacks WSNs are exposed to as they are deployed in harsh and hostile environments unattended in most of the mission critical applications. The fact that a complex sensor network consisting of simple computing units has similarities with specific animal communities, whose members are often very simple but produce together more sophisticated and capable entities. Thus, from an algorithmic viewpoint, bio-inspired framework such as swarm intelligence technology may provide valuable alternative to solve the large scale optimization problems that occur in wireless sensor networks. Self-organization, on the other hand, can be useful for distributed control and management tasks. In this chapter, swarm intelligence and social insects-based approaches developed to deal with a bio-inspired networking framework are presented. The proposed approaches are designed to tackle the challenges and issues in the WSN field such as large scale networking, dynamic nature, resource constraints, and the need for infrastructure-less and autonomous operation having the capabilities of self-organization and survivability. This chapter covers three phases of the research work carried out toward building a framework. First phase involves development of SIBER-XLP model, Swarm Intelligence Based Efficient Routing protocol for WSN with Improved Pheromone Update Model, and Optimal Forwarder Selection Function which chooses an optimal path from source to the sink to forward the packets with the sole objective to improve the network lifetime by balancing the energy among the nodes in the network and at the same time selecting good quality links along the path to guarantee that node energy is not wasted due to frequent retransmissions. The second phase of the work develops a SIBER-DELTA model, which represents Swarm Intelligence Based Efficient Routing protocol for WSN taking into account Distance, Energy, Link Quality, and Trust Awareness. WSNs are prone to behavior related attacks due to the misbehavior of nodes in forwarding the packets. Hence, trust aware routing is important not only to protect the information but also to protect network performance from degradation and protect network resources from undue consumption. Finally, third phase of the work involves the development of SIBER-DELTAKE hybrid model, an improved ACO-KM-ECC trust aware routing protocol based on ant colony optimization technique using K-Medoids (KM) algorithm for the formation of clusters with Elliptical Curve Cryptography (ECC). KM yields efficiency in setting up a cluster head and ECC mechanism enables secure routing with key generation and management. This model takes into account various critical parameters like distance, energy, link quality, and trust awareness to discover efficient routing
    corecore