Significantly Extending the Network Lifetime by Using Secure and Energy Efficient Protocol

Authors

  • Vasanthi Kumari Chilamakuri  M.Tech, CSE Department, Vardhaman College of Engineering, Hyderabad, India
  • Prof Nageswara Rao Sirisala  Professor, CSE Department, Vardhaman College of Engineering, Hyderabad, India

Keywords:

Wireless Sensor Network, Sensor Node, Sensor Node life span, Network Security

Abstract

In wireless sensor networks, we have lots of problems during data transmission. We focused in this thesis security and sensor node energy consumption challenges which are major challenges in current wireless networks. But, uniform power deployment approach isn't always suitable to the prevailing wi-fi sensor nodes and on this paper we're providing a secure and power efficient protocol which is called Cost-Aware Secure Routing Protocol. By implementing this protocol, we can achieve the high message delivery ratio along with security. This proposed protocol will utilize two parameters such as 1) Energy Balance Control & 2) Secure random Walk. These two are used to beat the existing disputes such as security and network life span optimization.

References

  1. C.-C. Hung, K.-J.Lin, C.-C.Hsu, C.-F.Chou, and C.-J. Tu, “On enhancing community-life span using opportunistic routing in wi-fi sensor networks,” in Computer Communications and Networks (ICCCN), 2010 Proceedings of 19th International Conference on, Aug.2010, pp. 1–6.
  2. H. Zhang and H. Shen, “Balancing strength consumption to maximize community life span in information amassing sensor networks,” Parallel and Distributed Systems, IEEE Transactions on, vol. 20, no. 10, pp. 1526–1539, Oct. 2009.
  3. A. Pathan, H.-W. Lee, and C. Seon Hong, “Security in wireless sensor networks: troubles and demanding situations,” in The eighth International Conference on Advanced Communication Technology (ICACT), vol. 2, 2006, pp. 6 pp.–1048
  4. Y. Li, J. Ren, and J. Wu, “Quantitative size and layout of source-area privateness schemes for wireless sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 7, pp. 1302–1311, Jul.2012.
  5. Y. Li, J. Li, J. Ren, and J. Wu, “Providing hop-with the aid of-hop authentication and supply privacy in wireless sensor networks,” in Proc. IEEE Conf. Comput. Commun. Mini-Conf., Orlando, FL, USA, Mar. 2012, pp. 3071–3075.
  6. B. Karp and H. T. Kung, “GPSR: Greedy perimeter stateless routing for wireless networks,” in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw., New York, NY, USA, 2000, pp. 243–254.
  7. J. Li, J. Jannotti, D. S. J. De Couto, D. R. Karger, and R. Morris, “A scalable place carrier for geographic advert hoc routing,” in Proc.6th Annu. Int. Conf. Mobile Comput. Netw., 2000, pp. 120–one hundred thirty.
  8. Y. Li, J. Li, J. Ren, and J. Wu, “Providing hop-by-hop authentication and supply privateness in wireless sensor networks,” in IEEE INFOCOM 2012 Mini-Conference, Orlando, Florida, USA., March 25-30, 2012 2012.
  9. N. Bulusu, J. Heidemann, and D. Estrin, “Gps-much less low fee outside localization for terribly small gadgets,” Computer technology branch, University of Southern California, Tech. Rep. Technical report00-729, April 2000.
  10. Y. Yu, R. Govindan, and D. Estrin, “Geographical and strength-aware routing: A recursive facts dissemination protocol for wi-fi sensor networks,” UCLA Computer Science Department Technical Report, UCLACSD,May 2001.
  11. J.-H. Chang and L. Tassiulas, “Maximum life span routing in wi-fi sensor networks,” IEEE/ACM Trans. Netw., vol. 12, no. Four, pp. 609–619, Aug. 2004.
  12. H. Zhang and H. Shen, “Balancing energy intake to maximise network life span in information-collecting sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 10, pp. 1526–1539, Oct. 2009.
  13. F. Liu, C.-Y. Tsui, and Y. J. Zhang, “Joint routing and sleep scheduling for life span maximization of wireless sensor networks,” IEEE Trans. Wireless Commun., vol. Nine, no. 7, pp. 2258–2267, Jul. 2010.
  14. C.-C. Hung, K.-J. Lin, C.-C. Hsu, C.-F. Chou, and C.-J. Tu, “On enhancing community-life span using opportunistic routing in wi-fi sensor networks,” in Proc. Nineteenth Int. Conf. Comput. Commun. Netw., Aug. 2010, pp. 1–6.
  15. C. Ozturk, Y. Zhang, and W. Trappe, “Source-place privateness in strength-restricted sensor community routing,” in Proc. 2d ACM Workshop Security Ad Hoc Sens. Netw., 2004, pp. 88–93.
  16. Y. Li and J. Ren, “Preserving supply-vicinity privateness in wireless sensor networks,” in Proc. IEEE 6th Annu. Commun. Soc. Conf. Sens., Mesh Ad Hoc Commun. Netw., Rome, Italy, Jun. 2009, pp. 493–501.
  17. Y. Li and J. Ren, “Source-region privacy thru dynamic routing in wi-fi sensor networks,” in Proc. IEEE INFOCOM 2010, San Diego, CA, USA., Mar. 15–19, 2010. Pp. 1–9.
  18. M. Shao, Y. Yang, S. Zhu, and G. Cao, “Towards statistically sturdy source anonymity for sensor networks,” in Proc. IEEE twenty seventh Conf. Comput. Commun., Apr. 2008, pp. Fifty one–fifty five.
  19. P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, “Enhancing source-place privateness in sensor community routing,” in Proc. Twenty fifth IEEE Int. Conf. Distrib. Comput. Syst., Jun. 2005, pp. 599–608.W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks: Attack and defense strategies,” IEEE Netw., vol. 20, no. 3, pp. 41–47, May/Jun. 2006.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Vasanthi Kumari Chilamakuri, Prof Nageswara Rao Sirisala, " Significantly Extending the Network Lifetime by Using Secure and Energy Efficient Protocol, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 8, pp.293-298, November-December-2017.