International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Region Based Secured Data Transmission Protocol for Wireless Sensor Network

Author NameAuthor Details

Ashok Kumar R, R. Kannan

Ashok Kumar R[1]

R. Kannan[2]

[1]Department of Computer Science, SRMV College of Arts and Science, Coimbatore, Tamil Nadu, India

[2]Department of Computer Science, SRMV College of Arts and Science, Coimbatore, Tamil Nadu, India

Abstract

Outlier detection based on region is a very useful safety strategy for wireless sensor networks with a high number of scattered nodes. Developing a more effective outlier detection system in WSNs can ensure that data packets are successfully transmitted without loss or corruption. The Evolutionary Game-based Secured Clustering Protocol (EGSCP) has been created for the existing system. Those research approaches, however, failed to discover outlier activities when area leaders behave as malevolent nodes or are compromised by hackers. This is addressed in this work by introducing a novel mechanism for the reliable detection of outlier behaviors, namely Region-Based Secured Data Transmission Protocol (RSDTP). The proposed research approach ensures private rule sharing by introducing the Privacy position-aware Routing in Wireless Sensor Networks (WSNs) which use group public keys of intra-region leaders to create group signatures that are shared by all members of the region which also makes it impossible to know exact positions of area members. Thus, sharing private rules can be guaranteed while using group signatures. This study leverages Enhanced Adaptive Acknowledgment, which checks for the existence of hostile nodes before rule sharing, to enable secure rule sharing. This would take place during intraregional leaders' rule-sharing sessions. To optimize memory storage and address bandwidths/memory concerns, the rule set aggregations are executed in this study following secure rule set transfers between intra and inter-region leaders. NS2 simulations have been used for evaluations of the proposed Region-Based Secured Data Transmission Protocol (RSDTP) approach for attaining effective non-hazardous, safe, and reliable data transport processes.

Index Terms

Outlier Detection Based on Region

Data Transmission

Wireless Sensor Networks

Acknowledgment

Data Aggregation

Privacy

Memory Overhead

Reference

  1. 1.
    Tomi? I., Mccann J.A. A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols. IEEE Int. Things J. 2017;4:1910–1923.
  2. 2.
    Rawat P., Singh K.D., Chaouchi H., Bonnin J.M. Wireless sensor networks: a survey on recent developments and potential synergies. J. Supercomput. 2014;68:1–48.
  3. 3.
    Zhang Z., Mehmood A., Shu L., Huo Z., Zhang Y., Mukherjee M. A survey on Fault Diagnosis in Wireless Sensor Networks. IEEE 2016;6:11349–11364.
  4. 4.
    Qiu T., Qiao R., Wu D.O. EABS: An Event-Aware Backpressure Scheduling Scheme for Emergency Internet of Things. IEEE Trans. Mob. Comput. 2018;17:72–84.
  5. 5.
    Qiu T., Chen N., Li K., Atiquzzaman M., Zhao W. How can heterogeneous Internet of Things build our future: A survey. IEEE Commun. Surv. Tutorials. 2018;20:2011–2027.
  6. 6.
    Qiu T., Zheng K., Song H., Han M., Kantarci B. A local-optimization emergency scheduling scheme with self-recovery for smart grid. IEEE Trans. Ind. Inf. 2017;13:3195–3205.
  7. 7.
    Dhurgadevi M., Devi P.M. An Analysis of Energy Efficiency Improvement through Wireless Energy Transfer in Wireless Sensor Network. Wirel. Pers. Commun. 2018;98:3377–3391.
  8. 8.
    Chandola V., Banerjee A., Kumar V. Anomaly detection: A survey. ACM Comput. Surv. 2009;41:1–58. doi: 10.1145/1541880.1541882.
  9. 9.
    Butun, I., Morgera, S. D., &Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEEcommunications surveys & tutorials, 16(1), 266-282.
  10. 10.
    Chow, P., Rhee, W., Tehrani, A. M., &Goldburg, M. (2016). U.S. Patent No. 9,369,370. Washington, DC: U.S. Patent and Trademark Office.
  11. 11.
    Kenkre, P. S., Pai, A., &Colaco, L. (2015). Real-time intrusion detection and prevention system. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 405-411). Springer, Cham.
  12. 12.
    Krishnan, D. (2015). A distributed self-adaptive Intrusion Detection System for Mobile Ad-hoc Networks using tamper evident mobile agents. Procedia Computer Science, 46, 1203-1208.
  13. 13.
    Ahmadifard, N., Nabizadeh, H., &Abbaspour, M. (2014). ISEFF: An ID-based scalable and efficient distributed file sharing technique in vehicular ad hoc networks. Wireless personal communications, 75(2), 821-841.
  14. 14.
    Hadded, M., Muhlethaler, P., Laouiti, A., Zagrouba, R., &Saidane, L. A. (2015). TDMA-based MAC protocols for vehicular ad hoc networks: a survey, qualitative analysis, and open research issues. IEEE Communications Surveys & Tutorials, 17(4), 2461-2492.
  15. 15.
    Sharma, S. K., Kumar, R., Gangwar, A., &Pakhre, K. (2014). Routing protocols and security issues in MANET: A survey. International Journal of Emerging Technology and Advanced Engineering,(IJETAE), 4(4), 918-924.
  16. 16.
    Shaikh, F., & Parekh, C. (2017). A Review Paper on Intrusion Detection System in MANETs.
  17. 17.
    Lin, W. C., Ke, S. W., & Tsai, C. F. (2015). CANN: An intrusion detection system based on combining cluster centers and nearest neighbors. Knowledge-based systems, 78, 13-21.
  18. 18.
    Athavale, N., Deshpande, S., Chaudhary, V., Chavan, J., &Barde, S. S. (2017). Framework for Threat Analysis and Attack Modelling of Network Security Protocols. International Journal of Synthetic Emotions (IJSE), 8(2), 62-75.
  19. 19.
    Gai, K., Qiu, M., Tao, L., & Zhu, Y. (2016). Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks, 9(16), 3049-3058.
  20. 20.
    Mehrotra, A., Saxena, A., &Tolani, M. (2014). Performance comparison of different routing protocols for traffic monitoring application. International Journal of Computer Applications, 92(4).
  21. 21.
    Srivastava, V., Tripathi, S., & Singh, K. (2020). Energy efficient optimized rate based congestion control routing in wireless sensor network. Journal of Ambient Intelligence and Humanized Computing, 11(3), 1325-1338.
  22. 22.
    Kalnoor, G., &Agarkhed, J. (2016, March). QoS based multipath routing for intrusion detection of sinkhole attack in wireless sensor networks. In 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) (pp. 1-6). IEEE.
  23. 23.
    Thangaramya, K., Kulothungan, K., Gandhi, S. I., Selvi, M., Kumar, S. S., &Arputharaj, K. (2020). Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Computing, 24(21), 16483-16497.
  24. 24.
    Jan, M. A. (2016). Energy-efficient routing and secure communication in wireless sensor networks (Doctoral dissertation).
  25. 25.
    Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2020). QoS aware trust based routing algorithm for wireless sensor networks. Wireless Personal Communications, 110(4), 1637-1658.
  26. 26.
    Ahmed, A., Bakar, K. A., Channa, M. I., Haseeb, K., & Khan, A. W. (2016). A trust aware routing protocol for energy constrained wireless sensor network. Telecommunication Systems, 61(1), 123-140.
  27. 27.
    Latha, A., Prasanna, S., Hemalatha, S., &Sivakumar, B. (2019). A harmonized trust assisted energy efficient data aggregation scheme for distributed sensor networks. Cognitive Systems Research, 56, 14-22.
  28. 28.
    Beheshtiasl, A., &Ghaffari, A. (2019). Secure and trust-aware routing scheme in wireless sensor networks. Wireless Personal Communications, 107(4), 1799-1814.
  29. 29.
    Dhand, G., &Tyagi, S. S. (2019). SMEER: secure multi-tier energy efficient routing protocol for hierarchical wireless sensor networks. Wireless Personal Communications, 105(1), 17-35.
  30. 30.
    AlFarraj, O., AlZubi, A., &Tolba, A. (2018). Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 1-11.
  31. 31.
    V. Nagaraju, N. J. Kumar, A. M. Ali, T. B. R. Bapu and N. Partheeban, "Efficient Data Transmission Scheme using Modified Wireless Communication Protocol Design," 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), 2022, pp. 1-7, doi: 10.1109/ACCAI53970.2022.9752622.
  32. 32.
    Khot, P. S., &Naik, U. L. (2022). Cellular automata-based optimised routing for secure data transmission in wireless sensor networks. Journal of Experimental & Theoretical Artificial Intelligence, 34(3), 431-449.
SCOPUS
SCImago Journal & Country Rank