An Energy-Efficient and Secure Routing Protocol for Intrusion Avoidance in IoT-Based WSN

被引:56
作者
Haseeb, Khalid [1 ]
Almogren, Ahmad [2 ]
Islam, Naveed [1 ]
Din, Ikram Ud [3 ]
Jan, Zahoor [1 ]
机构
[1] Islamia Coll Peshawar, Peshawar 25000, Pakistan
[2] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Sci, Chair Cyber Secur, Riyadh 11633, Saudi Arabia
[3] Univ Haripur, Dept Informat Technol, Haripur 22620, Pakistan
关键词
Internet of Things; network lifetime; smart devices; intrusion defence; secure routing; WIRELESS SENSOR NETWORKS; CLUSTERING PROTOCOL; INTERNET; SCHEME; MANAGEMENT; ALGORITHM; LIFETIME; HYBRID;
D O I
10.3390/en12214174
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Due to the advancement of information and communication technologies, the use of Internet of Things (IoT) devices has increased exponentially. In the development of IoT, wireless sensor networks (WSNs) perform a vital part and comprises of low-cost smart devices for information gathering. However, such smart devices have constraints in terms of computation, processing, memory and energy resources. Along with such constraints, one of the fundamental challenges for WSN is to achieve reliability with the security of transmitted data in a vulnerable environment against malicious nodes. This paper aims to develop an energy-efficient and secure routing protocol (ESR) for intrusion avoidance in IoT based on WSN to increase the network period and data trustworthiness. Firstly, the proposed protocol creates different energy-efficient clusters based on the intrinsic qualities of nodes. Secondly, based on the (k,n) threshold-based Shamir secret sharing scheme, the reliability and security of the sensory information among the base station (BS) and cluster head are achieved. The proposed security scheme presents a light-weight solution to cope with intrusions generated by malicious nodes. The experimental results using the network simulator (NS-2) demonstrate that the proposed routing protocol achieved improvement in terms of network lifetime as 37%, average end-to-end delay as 24%, packet delivery ratio as 30%, average communication cost as 29%, network overhead as 28% and the frequency of route re-discoveries as 38% when compared with the existing work under dynamic network topologies.
引用
收藏
页数:18
相关论文
共 53 条
[31]  
Mehrani M, 2010, INT CONF ADV COMMUN, P580
[32]   Internet of things: Vision, applications and research challenges [J].
Miorandi, Daniele ;
Sicari, Sabrina ;
De Pellegrini, Francesco ;
Chlamtac, Imrich .
AD HOC NETWORKS, 2012, 10 (07) :1497-1516
[33]   A stable energy efficient clustering protocol for wireless sensor networks [J].
Mittal, Nitin ;
Singh, Urvinder ;
Sohi, Balwinder Singh .
WIRELESS NETWORKS, 2017, 23 (06) :1809-1821
[34]  
Muthuramalingam S., 2010, INT J COMPUTER ELECT, V2, P709, DOI DOI 10.7763/IJCEE.2010.V2.216
[35]   Cyberentity Security in the Internet of Things [J].
Ning, Huansheng ;
Liu, Hong ;
Yang, Laurence T. .
COMPUTER, 2013, 46 (04) :46-53
[36]  
Pereira R. M., 2015, P 14 INT C NETW BARC, P107
[37]   A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network [J].
Pirbhulal, Sandeep ;
Zhang, Heye ;
Alahi, Md Eshrat E. ;
Ghayvat, Hemant ;
Mukhopadhyay, Subhas Chandra ;
Zhang, Yuan-Ting ;
Wu, Wanqing .
SENSORS, 2017, 17 (01)
[38]   A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks [J].
Rani, Shalli ;
Talwar, Rajneesh ;
Malhotra, Jyoteesh ;
Ahmed, Syed Hassan ;
Sarkar, Mahasweta ;
Song, Houbing .
SENSORS, 2015, 15 (11) :28603-28626
[39]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[40]   Cost analysis of hybrid adaptive routing protocol for heterogeneous wireless sensor network [J].
Sharma, Nonita ;
Sharma, Ajay K. .
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2016, 41 (03) :283-288