Abstract

Wireless Sensor Networks (WSNs) achieve much attention from various domains because of its easy maintenance, self-configuration, and scalability characteristics. It is comprised of small-sized sensors that interact with the Internet of Things (IoT) for observing and recording the physical conditions. The sensor nodes are autonomous and construct inter-communication topology with each other in an ad-hoc manner. However, the main restrictions of sensor nodes are their finite resources for energy management, data storage, transmission, and processing power. Different solutions have been addressed by researchers to overcome network performance due to bounded limitations of such battery-powered nodes, however, equalize the energy consumption and maintain the network throughput are the main research problems. Furthermore, due to the compromised nodes, the data is more prone to security vulnerabilities. Therefore, their security over the unpredictable network is other research concerns. Thus, the aim of this research article to propose a secure and energy-aware heuristic-based routing (SEHR) protocol for WSN to detect and prevent compromising data with efficient performance. Firstly, the proposed protocol makes use of an artificial intelligence-based heuristic analysis to accomplish a reliable, and intellectual learning scheme. Secondly, it protects the transmissions against adversary groups to attain security with the least complexity. Moreover, the route maintenance strategy is also achieved by using traffic exploration to reduce link failures and network dis-connectivity. The simulation results demonstrated the SEHR protocol improves the efficacy for network throughput by an average of 18%, packet drop ratio by 42%, end-to-end delay by 26%, energy consumption by 36%, faulty routes by 38%, network overhead by 44%, and computational overhead by 43% in dynamic scenarios as compared to existing work.

Highlights

  • The field of Wireless Sensor Network (WSN) [1]–[3] is exploring by a huge number of applications such as the military, healthcare, smart buildings, agriculture to observe and gathering the physical data

  • It is observed that the majority of the routing schemes heuristic-based fitness function but they do not consider scared constraint resources on the part of the sensor nodes in the selection of next-hop, which results in rapid energy consumption of the network field and compromised network lifetime

  • SIMULATION SETUP we present the simulation setup and experimental results of the secure and energy-aware heuristic-based routing (SEHR) protocol against SecTrustRPL [32], heuristic-based energy-efficient routing [40], and particle swarm optimization (PSO)-based routing [35] solutions

Read more

Summary

INTRODUCTION

The field of Wireless Sensor Network (WSN) [1]–[3] is exploring by a huge number of applications such as the military, healthcare, smart buildings, agriculture to observe and gathering the physical data. The low powered sensor nodes more prone to security threats due to their bounded constraints especially in terms of memory, battery, and processing power Such limitation significantly increases the chances of unauthorized access and compromised network confidentiality and integrity. In modern years, the secure and energy-efficient routing solution must be designed for IoT-based WSN for balancing the energy load and prevent the network data from prohibited access, being tempered with and expose to malicious nodes [20], [21]. The proposed work capable of dynamically sensing and isolating the malicious nodes during the data security phase, while on the other hand, it provides the strategy for route maintenance Both the energy-level alerts and traffic analysis between BS and their neighborhoods offer efficient load distribution and decrease the problem of network disjoining.

RELATED WORK
SECURING ROUTE DISCOVERY
ROUTE MAINTENANCE
SIMULATION SETUP
Findings
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.