ECTMRA: Energy Conserving Trustworthy Multipath Routing Algorithm Based on Cuckoo Search Algorithm

被引:9
作者
Senthil, T. [1 ]
Kannapiran, B. [2 ]
机构
[1] Kalasalingam Univ, Elect & Commun Engn Dept, Krishnankoil, Tamil Nadu, India
[2] Kalasalingam Univ, Dept Instrumentat & Control Engn, Krishnankoil, Tamil Nadu, India
关键词
Wireless sensor networks; Network lifetime; Soft computing; Cuckoo search algorithm; Trust; Routing; SENSOR NETWORKS; EFFICIENT;
D O I
10.1007/s11277-016-3378-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Lifetime maximization is one of the serious research issues for energy constrained wireless sensor networks. There are several ways to achieve enhanced network lifespan. This paper presents a routing algorithm namely Energy Conserving Trustworthy Multipath Routing Algorithm (ECTMRA) based on Cuckoo search algorithm, which serves its purpose by overthrowing issues such as routing overhead, memory overhead, along with the increased energy conservation is presented. This work clubs three different techniques such as clustering based on Cuckoo search algorithm, trust and multipath routing techniques into a single approach. This maximizes the lifespan of the network with the least energy consumption. Besides this, ECTMRA shows improved packet delivery ratio, network lifespan and reduced end-to-end delay, routing overhead and energy consumption. The performance of the proposed algorithm is evaluated against existing approaches and the experimental results outperform the existing techniques.
引用
收藏
页码:2239 / 2258
页数:20
相关论文
共 28 条
[1]   Hybrid trust and reputation management for sensor networks [J].
Aivaloglou, Efthimia ;
Gritzalis, Stefanos .
WIRELESS NETWORKS, 2010, 16 (05) :1493-1510
[2]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[3]  
[Anonymous], J CHINA I COMMUNICAT
[4]  
[Anonymous], P 4 INT C COMM SYST
[5]  
[Anonymous], 2012, INT J DISTRIB SENSOR
[6]  
[Anonymous], 2006, INPROCEEDINGS 3
[7]  
Bacanin Nebojsa, 2011, European Computing Conference. Proceedings of the European Computing Conference (ECC '11), P245
[8]  
Bagheri T., 2011, Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT), P1340, DOI 10.1109/WICT.2011.6141443
[9]  
Crosby G. V., 2006, DSSNS 2006. Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems
[10]  
Ding P, 2005, LECT NOTES COMPUT SC, V3560, P322