[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content

Advertisement

Log in

An Improved IDAF-FIT Clustering Based ASLPP-RR Routing with Secure Data Aggregation in Wireless Sensor Network

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

In recent years, Wireless Sensor Network (WSN) became a key technology for monitoring and tracking applications in a wide application range. Still, an energy-efficient data gathering protocol has become the most challenging issue. This is because each sensor node in the network is equipped with limited energy resources. To achieve better energy efficiency, better network communication, and minimized delay, clustering is introduced. Therefore, the clustering-based techniques for data gathering play a vital role in terms of energy-saving and increasing the lifetime of the network due to cluster head election and data aggregation. In this proposed methodology, the Integration of Distributed Autonomous Fashion with Fuzzy If-then Rules (IDAF-FIT) algorithm is proposed for clustering, and also the Cluster Head (CH) is elected in the meanwhile. After that, to transmit the packet from source to the destination node by choosing an optimal path, the routing concept is initiated. For this purpose, an Adaptive Source Location Privacy Preservation Technique using Randomized Routes (ASLPP-RR) is presented for routing. Also, Secure Data Aggregation based on Principle Component Analysis (SDA-PCA) algorithm is performed with end-to-end confidentiality and integrity. Finally, the security of confidential data is analyzed properly to obtain a better result than the existing approaches. The overall performance of the proposed methodology when compared with existing is expressed in terms of 20% higher packet delivery ratio, 15% lower packet dropping ratio, 18% higher residual energy, 22% higher network lifetime, and 16% lower energy consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Elshrkawey M, Elsherif SM, Wahed ME (2018) An enhancement approach for reducing the energy consumption in wireless sensor networks. J King Saud Univ-Comp Info Sci 30(2):259–267

    Google Scholar 

  2. Sivakumar MK, Vasanthi V (2010) A Perspective analysis of routing protocols in Wireless sensor networks. Int J Comput Sci Eng 2(8):2511–2518

    Google Scholar 

  3. Priyadarshi R, Soni SK, Nath V (2018) Energy efficient cluster head formation in wireless sensor network. Microsyst Technol 24(12):4775–4784

    Article  Google Scholar 

  4. AlBaz A, El-Sayed A (2018) A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks. Int J Commun Syst 31(1):e3407

    Article  Google Scholar 

  5. Merad Boudia OR, Senouci SM, Feham M (2018) Secure and efficient verification for data aggregation in wireless sensor networks. Int J Netw Manag 28(1):e2000

    Article  Google Scholar 

  6. Ansari AR, Cho S (2018) CHESS-PC: cluster-HEad selection scheme with power control for public safety networks. IEEE Access 6:51640–51646

    Article  Google Scholar 

  7. Wang J et al (2018) A PSO based energy efficient coverage control algorithm for wireless sensor networks. Comp Mater Continua 56(3):433–446

    Google Scholar 

  8. Zhao L, Qu S, Yi Y (2018) A modified cluster-head selection algorithm in wireless sensor networks based on LEACH. J Wireless Commun Netw 2018(1):1–8

    Article  Google Scholar 

  9. Cui J, Shao L, Zhong H, Xu Y, Liu L (2018) Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. Peer-to-Peer Netw Appl 11(5):1022–1037

    Article  Google Scholar 

  10. Gaber T, Abdelwahab S, Elhoseny M, Hassanien AE (2018) Trust-based secure clustering in WSN-based intelligent transportation systems. Comput Netw 146:151–158

    Article  Google Scholar 

  11. Acharya S, Tripathy C (2018) An ANFIS estimator based data aggregation scheme for fault tolerant wireless sensor networks. J King Saud Univ-Comp Info Sci 30(3):334–348

    Google Scholar 

  12. Li X, Liu W, Xie M, Liu A, Zhao M, Xiong N, Zhao M, Dai W (2018) Differentiated data aggregation routing scheme for energy conserving and delay sensitive wireless sensor networks. Sensors 18(7):2349

    Article  Google Scholar 

  13. Osamy W, Khedr AM (2018) An algorithm for enhancing coverage and network lifetime in cluster-based wireless sensor networks. Int J Commun Netw Info Secur 10(1):1–9

    Google Scholar 

  14. Al-Turjman F (2019) Cognitive routing protocol for disaster-inspired internet of things. Futur Gener Comput Syst 92:1103–1115

    Article  Google Scholar 

  15. Jha SK, Eyong EM (2018) An energy optimization in wireless sensor networks by using genetic algorithm. Telecommun Syst 67(1):113–121

    Article  Google Scholar 

  16. Deebak BD, Al-Turjman F (2020) A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Netw 97:102022

    Article  Google Scholar 

  17. Tang J, Liu A, Zhang J, Xiong N, Zeng Z, Wang T (2018) A trust-based secure routing scheme using the traceback approach for energy-harvesting wireless sensor networks. Sensors 18(3):751

    Article  Google Scholar 

  18. Al-Turjman F, Deebak BD, Mostarda L (2019) Energy aware resource allocation in multi-hop multimedia routing via the smart edge device. IEEE Access 7:151203–151214

    Article  Google Scholar 

  19. Hasan MZ, Al-Turjman F, Al-Rizzo H (2018) Analysis of cross-layer design of quality-of-service forward geographic wireless sensor network routing strategies in green internet of things. IEEE Access 6:20371–20389

    Article  Google Scholar 

  20. Soundararajan R, Palanisamy N, Patan R, Nagasubramanian G, Khan MS (2020) Secure and concealed watchdog selection scheme using masked distributed selection approach in wireless sensor networks. IET Commun 14(6):948–955

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jafar A. Alzubi.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Babu, M.V., Alzubi, J.A., Sekaran, R. et al. An Improved IDAF-FIT Clustering Based ASLPP-RR Routing with Secure Data Aggregation in Wireless Sensor Network. Mobile Netw Appl 26, 1059–1067 (2021). https://doi.org/10.1007/s11036-020-01664-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-020-01664-7

Keywords

Navigation