An Energy-Efficient and Secure Routing Protocol for Intrusion Avoidance in IoT-Based WSN

被引:56
作者
Haseeb, Khalid [1 ]
Almogren, Ahmad [2 ]
Islam, Naveed [1 ]
Din, Ikram Ud [3 ]
Jan, Zahoor [1 ]
机构
[1] Islamia Coll Peshawar, Peshawar 25000, Pakistan
[2] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Sci, Chair Cyber Secur, Riyadh 11633, Saudi Arabia
[3] Univ Haripur, Dept Informat Technol, Haripur 22620, Pakistan
关键词
Internet of Things; network lifetime; smart devices; intrusion defence; secure routing; WIRELESS SENSOR NETWORKS; CLUSTERING PROTOCOL; INTERNET; SCHEME; MANAGEMENT; ALGORITHM; LIFETIME; HYBRID;
D O I
10.3390/en12214174
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Due to the advancement of information and communication technologies, the use of Internet of Things (IoT) devices has increased exponentially. In the development of IoT, wireless sensor networks (WSNs) perform a vital part and comprises of low-cost smart devices for information gathering. However, such smart devices have constraints in terms of computation, processing, memory and energy resources. Along with such constraints, one of the fundamental challenges for WSN is to achieve reliability with the security of transmitted data in a vulnerable environment against malicious nodes. This paper aims to develop an energy-efficient and secure routing protocol (ESR) for intrusion avoidance in IoT based on WSN to increase the network period and data trustworthiness. Firstly, the proposed protocol creates different energy-efficient clusters based on the intrinsic qualities of nodes. Secondly, based on the (k,n) threshold-based Shamir secret sharing scheme, the reliability and security of the sensory information among the base station (BS) and cluster head are achieved. The proposed security scheme presents a light-weight solution to cope with intrusions generated by malicious nodes. The experimental results using the network simulator (NS-2) demonstrate that the proposed routing protocol achieved improvement in terms of network lifetime as 37%, average end-to-end delay as 24%, packet delivery ratio as 30%, average communication cost as 29%, network overhead as 28% and the frequency of route re-discoveries as 38% when compared with the existing work under dynamic network topologies.
引用
收藏
页数:18
相关论文
共 53 条
[1]  
Abdulsalam H. M., 2010, Proceedings 2010 10th IEEE International Conference on Data Mining Workshops (ICDMW 2010), P1, DOI 10.1109/ICDMW.2010.28
[2]   Mobile Sink-Based Adaptive Immune Energy-Efficient Clustering Protocol for Improving the Lifetime and Stability Period of Wireless Sensor Networks [J].
Abo-Zahhad, Mohammed ;
Ahmed, Sabah M. ;
Sabor, Nabil ;
Sasaki, Shigenobu .
IEEE SENSORS JOURNAL, 2015, 15 (08) :4576-4586
[3]  
[Anonymous], 2011, INT J COMPUT SCI ISS
[4]  
[Anonymous], 2012, Introduction to network simulator NS2
[5]   LEACH-MAC: a new cluster head selection algorithm for Wireless Sensor Networks [J].
Batra, Payal Khurana ;
Kant, Krishna .
WIRELESS NETWORKS, 2016, 22 (01) :49-60
[6]  
Bednarczyk W., 2013, UNIVERS J COMM UNNET, V1, P88, DOI [10.13189/ujcn.2013.010302, DOI 10.13189/UJCN.2013.010302]
[7]  
Bian XX, 2008, 2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, P916
[8]  
Chauhan N, 2011, COMM COM INF SC, V142, P147
[9]   An unequal cluster-based routing protocol in wireless sensor networks [J].
Chen, Guihai ;
Li, Chengfa ;
Ye, Mao ;
Wu, Jie .
WIRELESS NETWORKS, 2009, 15 (02) :193-207
[10]   Intelligent Energy Competency Multipath Routing in WANET [J].
Das, Santosh Kumar ;
Tripathi, Sachin ;
Burnwal, A. P. .
INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 :535-543