ADVANCES OF MODERN SECURE COMMUNICATION TECHNIQUE AND ITS OPTIMIZATION IN WIRELESS SENSOR NETWORK

Abstract

Routing is yet another very challenging design problem for WSNs. A correctly designed routing protocol shouldn't only ensure a higher message delivery ratio and occasional energy consumption for message delivery, but additionally balance the whole sensor network energy consumption, and therefore extend the sensor network lifetime Motivated because WSNs routing is frequently geography-based, we advise a geography-based safe and effective Cost-Aware Secure routing (CASER) protocol for WSNs without counting on flooding. CASER protocol has two major advantages: (i) It ensures balanced energy use of the whole sensor network so the duration of the WSNs could be maximized. (ii) CASER protocol supports multiple routing strategies in line with the routing needs, including fast/slow message delivery and secure message delivery to avoid routing trackback attacks and malicious traffic jamming attacks in WSNs. We advise a safe and effective Cost-Aware Secure Routing (CASER) protocol for WSNs. Within this protocol, cost-aware based routing strategies do apply to deal with the content delivery needs. Actually, the foe is infeasible to look for the previous hop source node through routing trackback analysis. Furthermore, the probability for that foe to get multiple messages in the same source node continuously is minimal for big sensor systems. The content is first transmitted to some randomly selected intermediate node within the sensor domain prior to the message has been given to a network mixing ring in which the messages from various directions are mixed... The quantitative security analysis demonstrates the suggested formula can safeguard the origin location information in the adversaries. Our extensive OPNET simulation results reveal that CASER can offer excellent energy balance and routing security. Our analysis and simulation results reveal that we are able to boost the lifetime and the amount of messages that may be delivered underneath the non-uniform energy deployment by greater than four occasions

    Similar works