Abstract

Secured routing is the definite maneuvers in a wireless sensor network (WSN) for distributing data packets to the base station. However, attacker node outbreaks will occur throughout the routing process, exacerbating the wireless sensor network's functioning. As a result, a secure routing protocol is essential to ensure route fortification and the effectiveness of wireless sensor networks. For this reason, many studies have shown an interest in improving routing protocol security by adopting cryptographic structures and trust regulation methods. However, most secured routing protocols are dynamically awful in real-time scenarios, making it difficult to distinguish between unsecured routing node performances. In the same way, solutions for detecting and mitigating node attacks are still challenging. In this, Crypto Hash signature (CHS) token are generated for the flow accesses with a secret key belonging to each routing sensor node. The assessment metrics corresponding to average energy consumption, and throughput of token transactions is measured. Then the simulation performance of the proposed SDOR-CHS-SD method provide 18.46%, 8.37% and 26.77% higher token transactions throughput, when compared with existing method like SDOR-SSOA, SDOR-DSM and SDOR-RIL respectively.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call