16 research outputs found

    Energy Balance Control and Security for Wireless Sensor Network by Using Cost-Aware Secure Routing protocol

    Get PDF
    Reliability, Energy balance and security are con?icting design issues for wireless sensor networks (WSNs) with non-replenishable energy resources. In this paper, we ?rst propose a novel secure and ef?cient Cost-Aware SEcure Routing (CASER) protocol to address these con?icting issues through two adjustable parameters: energy balance control (EBC) and probabilistic- based random walking. To solve this problem, we propose an ef?cient non-uniform energy deployment strategy to optimize the lifetime and message delivery ratio under the same energy resource and security requirement. We also provide a quantitative security analysis on the proposed routing protocol. For the non-uniform energy deployment, our analysis shows that we can increase the lifetime and the total number of messages that can be delivered by more than four times under the same assumption. We also demonstrate that the proposed CASER protocol can achieve a high message delivery ratio while preventing routing traceback attacks

    Review Paper on Reliability and Lifetime Optimization in Wireless Sensor Network

    Get PDF
    A wireless sensor network (WSN) is a computer network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations.[1] The development of wireless sensor networks was originally motivated by military applications such as battlefield surveillance. However, wireless sensor networks are now used in many civilian application areas, including environment and habitat monitoring, healthcare applications, home automation, and traffic control.[1

    ADVANCES OF MODERN SECURE COMMUNICATION TECHNIQUE AND ITS OPTIMIZATION IN WIRELESS SENSOR NETWORK

    Get PDF
    Routing is yet another very challenging design problem for WSNs. A correctly designed routing protocol shouldn't only ensure a higher message delivery ratio and occasional energy consumption for message delivery, but additionally balance the whole sensor network energy consumption, and therefore extend the sensor network lifetime Motivated because WSNs routing is frequently geography-based, we advise a geography-based safe and effective Cost-Aware Secure routing (CASER) protocol for WSNs without counting on flooding. CASER protocol has two major advantages: (i) It ensures balanced energy use of the whole sensor network so the duration of the WSNs could be maximized. (ii) CASER protocol supports multiple routing strategies in line with the routing needs, including fast/slow message delivery and secure message delivery to avoid routing trackback attacks and malicious traffic jamming attacks in WSNs. We advise a safe and effective Cost-Aware Secure Routing (CASER) protocol for WSNs. Within this protocol, cost-aware based routing strategies do apply to deal with the content delivery needs. Actually, the foe is infeasible to look for the previous hop source node through routing trackback analysis. Furthermore, the probability for that foe to get multiple messages in the same source node continuously is minimal for big sensor systems. The content is first transmitted to some randomly selected intermediate node within the sensor domain prior to the message has been given to a network mixing ring in which the messages from various directions are mixed... The quantitative security analysis demonstrates the suggested formula can safeguard the origin location information in the adversaries. Our extensive OPNET simulation results reveal that CASER can offer excellent energy balance and routing security. Our analysis and simulation results reveal that we are able to boost the lifetime and the amount of messages that may be delivered underneath the non-uniform energy deployment by greater than four occasions

    Secured System Layer Routing Protocols On Imperative Sensor Nodes

    Get PDF
    Sensor technology has shown tremendous development in the field of data environment like tracking and detection. The participating sensor nodes are prone to failure because of limited resources or limitations in security. The topology of the networks is highly dynamic in nature because of frequent failure of the sensor nodes. The Quality of Service (QoS) support to highly dynamic networks is one of the challenging tasks. In wireless sensor organize, security is a fundamental position in well-lit of its utilization in applications like monitoring, tracking, controlling, surveillance etc. Secure correspondence is greatly critical in conveying key data precisely and on the time through asset imperative sensor nodes. A 3 stage approach gives a secure message conveyance alternative to amplify the message conveyance proportion under antagonistic assaults. Firstly, we have outlined the system layer routing assaults on WSNs. Also, we have given a scientific categorization of secure routing protocols of WSNs. Thirdly, we have given a subjective correlation of existing secure routing protocols. The above quantitative secure investigation on the proposed routing convention in light of the criteria proposed

    Energy Efficiency and Traffic Pattern Discovery for Wireless Sensor Networks

    Get PDF
    Wireless Sensor Networks (WSNs) are regularly framed by the joint effort of the expansive measure of insignificant sensor nodes, which are associated through a wireless medium. In wireless sensor organize, security is a fundamental position in well-lit of its utilization in applications like monitoring, tracking, controlling, surveillance etc. Secure correspondence is greatly critical in conveying key data precisely and on the time through asset imperative sensor nodes. In this paper, our commitment is triple. Firstly, we have outlined the system layer routing assaults on WSNs. Also, we have given a scientific categorization of secure routing protocols of WSNs. Thirdly, we have given a subjective correlation of existing secure routing protocols. This situation is practically equivalent to conveying US Mail through USPS: express sends cost more than customary sends; be that as it may, sends can be conveyed quicker. The convention additionally gives a secure message conveyance alternative to amplify the message conveyance proportion under antagonistic assaults. What's more, we likewise give quantitative secure investigation on the proposed routing convention in light of the criteria proposed. In this way, unauthenticated individual can't get to the first information. By along these lines, the convention gives a secure message conveyance alternative to augment the message conveyance proportion under ill-disposed assaults

    Energy Proficient and Security Protocol for WSN: AODV

    Get PDF
    Wireless sensor network is extensively used technology now a day in real time application. It consists of a number of autonomous sensor nodes which are organized in various areas of interest to accumulate data and jointly convey that data back to a base station. But the sensor node has limited battery energy and it is also found that the WSN more vulnerable to severe kinds of security threats such as denial of service (DOS), Sybil, hello flood attack etc. In this, we proposed group communication using election algorithm to make the network most energy efficient and also make the network secure. The simulation of the proposed methodology is done between different network parameter such as PDR, end-to-end delay, throughput and energy consumption using the network simulator NS-2.34

    n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wireless Sensor Network

    Get PDF
    Security problems in Wireless Sensor Network (WSN) have been researched from more than a decade. There are various security approaches being evolving towards resisting various forms of attack using different methodologies. After reviewing the existing security approaches, it can be concluded that such security approaches are highly attack-specific and doesnt address various associated issues in WSN. It is essential for security approach to be computationally lightweight. Therefore, this paper presents a novel analytical modelling that is based on n-tier approach with a target to generate an optimized secret key that could ensure higher degree of security during the process of data aggregation in WSN. The study outcome shows that proposed system is computationally lightweight with good performance on reduced delay and reduced energy consumption. It also exhibits enhanced response time and good data delivery performance to balance the need of security and data forwarding performance in WSN

    Algorithmic Implementation of Load Balancing –in Wireless LAN

    Get PDF
    Intra domain traffic engineering (TE) has become an indispensable tool for Internet service providers (ISPs) to Optimize network performance and utilize network resources efficiently . Various explicitrouting TE methods were recently proposed and have been able to achieve high network performance. However, explicit routing has high complexity and requires large ternary content addressable memories (TCAMs) in the routers. Moreover, it is costly to deploy explicit routing in IP networks. In this paper, we present an approach, called generalized destination-based multipath routing (GDMR), to achieve the same high performance as explicit routing. The main contribution of this paper is that we prove that an arbitrary explicit routing can be converted to a loop-free destination-based routing without any performance penalty for a given traffic matrix. We present a systematic approach including a heuristic algorithm to realize GDMR. Extensive evaluation demonstrates the effectiveness and robustness of GDMR
    corecore