Generic placeholder image

International Journal of Sensors, Wireless Communications and Control

Editor-in-Chief

ISSN (Print): 2210-3279
ISSN (Online): 2210-3287

Research Article

An Efficient Multipath Routing Protocol for Decentralized Wireless Sensor Networks for Mission and Safety-Critical Systems

Author(s): Olakanmi Oladayo Olufemi* and Adama Pamela

Volume 10, Issue 3, 2020

Page: [368 - 381] Pages: 14

DOI: 10.2174/2210327909666190531113558

Price: $65

Abstract

Background: Wireless Sensor Network (WSN) is a useful integral part of mission and safety-critical systems, whose failure may result in injury, loss of life, serious environmental damage and/or may result in the failure of some goal-directed activities. Its major challenges are reliability, and security related issues during data delivery. To mitigate these, the development of secure routing protocols, which are capable of optimum utilization of WSNs’ nodes resources for effective data delivery, has been one of the major research interests. However, most of the existing single path routing protocols for WSNs are not able to meet with up with the performance requirements of the mission and safety-critical systems. Meanwhile, a few that are multipath require high computational power, energy and their multiple paths are not ranked, this makes them unsuitable as routing protocol for WSNs in mission and safety-critical systems.

Objective: In this work, we propose a secure multipath routing protocol based on sectorisation and best neighbouring nodes selection models to meet up with the performance requirements of WSNs in the mission and safety-critical systems. The protocol is capable of providing optimal multiple ranked route paths for reliable data delivery.

Methods: A route management technique, using direct approach, is developed for selecting different optimal data paths for reliable data routing. Also, simple but efficient lightweight privacy preserving authentication scheme is proposed for the protocol to ensure security and privacy during data routing. Computational and security analysis were performed to ascertain its efficiency in terms of computational cost, energy consumption and security.

Results: The results showed that SMRP achieved better performance compared to the two stateof- the-art solutions in terms of end-to-end delay, energy consumption and data routing reliability.

Conclusion: The proposed protocol is suitable for wireless sensor network due to its low delay, low energy consumption and routing reliability metrics.

Keywords: Wireless sensor network, security, multipath, mission and safety-critical systems, protocols, sectorisation.

Graphical Abstract
[1]
Olakanmi O. Lightweigth security and privacy scheme for wireless body area network in E-health system. Int J Inf Secur Sci 2017; 6(3): 1-10.
[2]
Shazana M, Nor B, Laiha K, Ismail A. Survey of secure multipath routing protocols for WSNs. J Netw Comput Appl 2015; 55: 123-53.
[http://dx.doi.org/10.1016/j.jnca.2015.04.018]
[3]
Olakanmi O. A lightweight security and privacy-aware routing scheme for energy-constraint multi-hop wireless sensor networks. Int J Inform Comput Secur In press
[4]
Alan D, Chib-Hsueh L, Wen-Shyong H. A secure mutual trust scheme for wireless sensor network. 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE), Edinburgh, UK.
[5]
Murugaboopathi G, Khanaa V. Reliable Communications in Sensor Networks. J Eng Appl Sci (Asian Res Publ Netw) 2008; 3: 911-7.
[6]
Weibing G, Zhang M, Xiaolong Y, Jing L, Nan Z, Keping L. WARAS: An adaptive WSN multipath selection model inspired by metabolism behaviors of Escherichia coli 2015 IEEE/CIC International Conference on Communications in China (ICCC) . Shenzhen, China.
[7]
Monjul S, Uddipta K, Anwar H. Secure energy aware multi-path routing with key management in wireless sensor network. 2017 4th International Conference on Signal Processing and Integrated Networks (SPIN). Noida, India.
[8]
Sangdae K, Hyunchong C, Taehun Y, Cheonyong K. Low-cost multipath routing protocol by adapting opportunistic routing in wireless sensor networks. 2017 IEEE Wireless Communications and Networking Conference (WCNC). San Francisco, CA, USA.
[9]
Ferng HW, Dian R. A secure routing protocol for wireless sensor networks with consideration of energy efficiency. Proceedings of IEEE 12th International Conference on Networking Sensing and Control, Taiwan, China, 2012.
[10]
Kuei-Ying L, Pi-Chung W, Tzung-Pei H. A greedy algorithm in WSNs for maximum network lifetime and communication reliability. Proceedings of IEEE 12th International Conference on Networking Sensing and Control, Taiwan, China, 2015.
[11]
Suneet KG, Pratyay K, Prasanta J. Energy efficient multipath routng for wireless sensor network: A genetic algorithm approach. 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI). Jaipur, India.
[12]
Moonseong K, Euihoon J, Young-Cheoi B. Multipath energy aware routing protocol in wireless sensor networks. 5th International Conference on Networked Sensing Systems, Kanazawa, Japan 2008.
[http://dx.doi.org/10.1109/INSS.2008.4610913]
[13]
Yuan L, Guojun W, Weijia J, Sancheng P. Multipath based segment-by-segment routing protocol in MANETs. 9th International Conference for Young Computer Scientists. Hunan, China. 2008.
[14]
Rakesh M, Somanath T. Secure multicast routing algorithm for wireless mesh networks. J Comput Netw Commun 2016; 2016: 1-12.
[15]
Chandrasekaran V, Lalitha K, Anitha S. Secure energy aware multihop routing protocol for wireless sensor networks. Int J Adv Res Comput Sci 2013; 4(4): 91-100.
[16]
Ammar H, Xingfu W, Adili A, et al. Zone probability routing for wireless sensor networks. IEEE Trans Mobile Comput 2019; 18(3): 728-41.
[http://dx.doi.org/10.1109/TMC.2018.2839746]
[17]
Hawbani W. Load-Balanced Opportunistic Routing for Duty-Cycled Wireless Sensor Networks. IEEE Trans Mobile Comput 2017; 16(7): 1940-55.
[18]
Shiva M, Robert D, Golla V. Digital signature based secure node disjoint multipath routing protocol for wireless sensor networks. IEEE Sens J 2012; 12(10): 2941-9.
[19]
Marina MK, Das SR. On-demand multipath distance vector routing in Adhoc networks. Proceedings Ninth International Conference on Network Protocols. ICNP 2001, Riverside, CA, USA.
[20]
Hu S. A hierarchical key management scheme for wireless sensor network based on identity based encryption. IEEE International Conference on Computer and Communications, Chengdu, China, 2015.
[http://dx.doi.org/10.1109/CompComm.2015.7387601]
[21]
Olakanmi O, Dada A. An efficient point-to-point security solution for multi-hop routing in wireless sensor networks Special Issue on Wireless Sensor Network Security and Privacy
[22]
Wikipedia. CPU power dissipation 2003. Available at http://en-wikipedia.org/wiki/CPU-power-dissipation
[23]
Wander AS, Gura N, Eberle H, Gupta V, Shantz SC. Energy analysis of public-key cryptography for wireless sensor networks. Proceeding of 3rd IEEE International Conference on Pervasive Computing Communication. Kauai Island, HI, USA.
[24]
Kehinde OKI, Tajudeen O. Lin performance modelling of wireless sensor network. Deployment for Mission Critical Applications (Underground Deployment 16th Annual Mediterranean Adhoc Networking Workshop.
[25]
Mahesh M, Samir D. adhoc on-demand multipath distance vector routing. Wirel Commun Mob Comp 2006; 6(7): 969-88.
[26]
Muhammad A, Muhammad KA, Tariq U. A Facial-Expression Monitoring System for Improved Healthcare in Smart Cities. IEEE Access 2017; 5: 10871-81.
[http://dx.doi.org/10.1109/ACCESS.2017.2712788]
[27]
Trakadas P, Zahariadis T, Leligou HC, Voliotis S, Papadopoulos K. Analysing and time overhead of security mechanism in wireless sensor networks. 2008 15th International Conference on Systems, Signals and Image Processing. Bratislava, Slovakia.

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy