Abstract
Due to the advancement of information and communication technologies, the use of Internet of Things (IoT) devices has increased exponentially. In the development of IoT, wireless sensor networks (WSNs) perform a vital part and comprises of low-cost smart devices for information gathering. However, such smart devices have constraints in terms of computation, processing, memory and energy resources. Along with such constraints, one of the fundamental challenges for WSN is to achieve reliability with the security of transmitted data in a vulnerable environment against malicious nodes. This paper aims to develop an energy-efficient and secure routing protocol (ESR) for intrusion avoidance in IoT based on WSN to increase the network period and data trustworthiness. Firstly, the proposed protocol creates different energy-efficient clusters based on the intrinsic qualities of nodes. Secondly, based on the (k,n) threshold-based Shamir secret sharing scheme, the reliability and security of the sensory information among the base station (BS) and cluster head are achieved. The proposed security scheme presents a light-weight solution to cope with intrusions generated by malicious nodes. The experimental results using the network simulator (NS-2) demonstrate that the proposed routing protocol achieved improvement in terms of network lifetime as 37%, average end-to-end delay as 24%, packet delivery ratio as 30%, average communication cost as 29%, network overhead as 28% and the frequency of route re-discoveries as 38% when compared with the existing work under dynamic network topologies.
Highlights
Internet of Things (IoT) is a worldwide communication infrastructure that consists of different connectivity objects that impart networking, sensory and information processing tools [1,2,3,4]
The non-probabilistic methods give an improved performance as compared to traditional probabilistic methods, because of dynamic nature of sensor nodes [30,31,32,33,34], improving energy conservation and routing robustness are still open challenges for IoT based on wireless sensor networks (WSNs)
We evaluated the numerical results of efficient and secure routing protocol (ESR) protocol in the comparison of low energy adaptive clustering hierarchy (LEACH)-ER, LEACH-MAC and chain–chain based routing protocol (CCBRP)
Summary
Internet of Things (IoT) is a worldwide communication infrastructure that consists of different connectivity objects that impart networking, sensory and information processing tools [1,2,3,4]. The basic theme of IoT is to provide connectivity anywhere, of anything and anywhere between homogeneous objects. Radio-frequency identification (RFID) [5,6,7] is an initial technology for IoT that allows electromagnetic fields to transfer the identification data automatically towards the reader via wireless connectivity devices. Radio signal transponder (tag) and tag readers are the two main parts of RFID system. RFID tags encompass electronically stored information and people can classify, track and monitor the objects. The RFID tags are attached to any object for information gathering and monitoring the target location
Published Version (
Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have