Generic placeholder image

International Journal of Sensors, Wireless Communications and Control

Editor-in-Chief

ISSN (Print): 2210-3279
ISSN (Online): 2210-3287

Research Article

A Secure and Energy-Aware Routing Protocol for Optimal Routing in Mobile Wireless Sensor Networks (MWSNs)

Author(s): Olakanmi Oladayo* and Abbas Ashraf

Volume 9, Issue 4, 2019

Page: [507 - 520] Pages: 14

DOI: 10.2174/2210327909666181217105028

Price: $65

Abstract

Background and Objective: Mobile Wireless Sensor Network (MWSN) is a specialized wireless network made up of large number of mobile sensors, where each sensor is capable of changing its location, relaying data to either the base station or neighbouring nodes. MWSN has emerged as a useful integral part of modern communication systems; however, its major performance challenges are lack of data delivery assurance due to mobility of its sensors, low computational power of its nodes, and some security related issues.

Methods: Most of the existing WSN routing protocols are for non-mobile sensors and require considerably high computational power. Thus, not suitable for energy-constraint WSN with mobile sensors. Therefore, there is need for a secure protocol for MWSN with mechanisms that take into account the limited resources of the nodes and dynamism of its nodes’ locations.

Results: In this paper, an efficient routing protocol for MWSN is proposed, not to only improve data delivery but to ensure reliability. This protocol is capable of selecting optimal multi-hop route among available routes for the source node and securely hops the data to the destination nodes through intermediary nodes. Formal and informal security analysis of the routing protocol is done to ascertain the required security level of the protocol. In addition, computational cost analysis is done to evaluate the computational cost of the protocol.

Conclusion: The analysis results showed that the proposed protocol was secure and required low computational cost

Keywords: Authentication, mobile sensors, routing protocols, security, wireless sensor network, base station.

Graphical Abstract
[1]
Oladayo O, Adama P, Abbas A. A review on secure routing protocol for wireless sensor networks. Int J Sensor Wireless Comm Contl 2017; 7(20): 79-92.
[2]
Mohammed O, Petros N, Jung-Shian L. Security in wireless sensor network. J Security Comm 2009; 2(2): 101-3.
[3]
Huei W, Dian R. A secure routing protocol for wireless sensor networks with consideration of energy efficiency. In: IEEE Conf. University of Science and Technology: Taiwan 2012; pp. 224-32.
[4]
Xiaojiang D, Mohsen GYX, Hsiao H. C. wo Tier secure routing protocol for heterogeneous sensor networks. IEEE Trans Wirel Commun 2007; 6(9): 3395-401.
[5]
Getsy SDS. Routing in mobile wireless sensor networks: A survey. J Telecomm Syst 2014; 57(1): 51-79.
[6]
Alan D, Chih-Hsueh L, Wen-Shyong H. A secure mutual trust scheme for wireless sensor networks. In: IEEE 26th International Symposium on Industrial Electronics (ISIE), 2017; pp. 1369-75.
[7]
Islam SH, Biswas GP. An improved pairing free identity based on authenticated key agreement protocol based on ECC. In: Proc Int Conf Commun Tech Syst Des. 2012; pp. 499-507.
[8]
Jeevan K, Sachin T, Rajesh K. Routing protocol for wireless sensor networks using swarm intelligence- ACO with ECPSOA. InInt Conf Info Tech. ICIT 2006; pp. 23-7.
[9]
Sneha K, Prasad B. An efficient hand-off optimization based RPL routing protocol for optimal route selection in mobility enabled LLNs. InInt Conf Global Trends Signal Process. Info Comput Commun 2016; pp. 130-7.
[10]
Yongchang Y, Yichan S. An energy efficiency chain based routing protocol in wireless sensor network. InInt Conf Comp Appli Syst Model. ICCASM: Taiyuan, China 2010; pp. 486-9.
[11]
Vijayalakshmi K, Martin J, Manickam L. Mobisink- intelligent mobility pattern based routing protocol for efficient data gathering in large scale wireless sensor networks. In Int Conf Contrl, Instrument, Comm Computat Tech (ICCICCT) Kumaracoil, India 2017; pp. 21-5.
[12]
Shantal DBV. An outlier detection scheme for wireless sensor networks In 5th Int Wireless Netw Embedded Syst. WECON: Rajpura, India 2016; pp. 1-6.
[13]
Fodor K, Vidacs A. Efficient routing to mobile sinks in wireless sensor networks. In: 2nd Int Workshop on Perform Contrl in WSN (PWSN) Texas, USA 2007; pp. 1-7.
[14]
Asma M, Rabiaa E, Abdelhamid H. Ridha. Cross layer based rotuing protocol for wireless sensor networks using fuzzy logic module. In 13th Int Conf Wireless Commun Mobile Comput (IWCMC) Valencia, Spain 2017; pp. 764-9.
[15]
Sowmya BS. energy efficient and secure cluster based routing protocol (LEACH) for wireless sensor networks. In 2nd Int Conf Sci, Tech Manag (ICSTM) New Delhi, India 2015; pp. 672-83.
[16]
Oladayo O, Ashraf A. Mobility and energy prediction models: approach towards effective route management in mobile wireless sensor networks. Commun Adv Electr 2019.
[17]
Hamed B, Saman B, Shahaboddin S, Anthony C. Graphy in wireless sensor networks. J Math Computat Applic 2018; 23(14): 1-15.
[18]
Heinzelman WB, Chrandrakasan AP, Balakrishnan H. Energy efficient communication protocol for microsensor network Paper Pre-Sci. HICSS 2000; pp. 1-16.
[19]
Oladayo O. A lightweight seciurity and privacy aware routing scheme for energy constraint multi-hop wireless sensor network. Int J Info Comp Secur 2018.
[20]
Huang L, Jie L, Hisao K. A secure routing protocol for cluster based wireless sensor network using ID-based digital signature. In IEEE Global Telecomm Conf GLOBECOM Miami, USA 2010; pp. 1-5.
[21]
Chin-Ling C, Shih TF, Yu-Ting T, De-Kui L. A bilinear pairing based dynamic key management and authentication for wireless sensor networks. J Sens 2015; 2015(1): 1-14.
[22]
Burrow M, Abadi M, Needham R. A logic of authentication. ACM Trans Comput Syst 1990; 8(1): 18-36.
[23]
Hu S. A hierarchical key management scheme for wireless sensor networks based on identity based encryption. In IEEE Int Conf Comp Commun Chengdu 2015; pp. 384-9.
[24]
Pairing-based cryptography library. [Online]. Available from: http://crypto.stanford.edu/pbc/
[25]
Zhang Y, Liu W, Lou W, Fang Y. Location based security mechanism in wireless sensor networks. IEEE J Sel Areas Comm 2006; 24(2): 247-60.
[26]
Tom H, Falah A. Location aware sensor routing protocol for mobile wireless sensor networks J Inst Eng Tech (IET). Wireless Sensor Syst 2016; pp. 1-9.

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy