Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Reliable Fast and Ideal Traffic Aware Secure Routing Protocol Based on Multi-Hop Cross Site Leaping for Efficient Packet Transmission in WSN


Affiliations
1 Department of Computer Applications, Thiruthangal Nadar College, India
2 Department of Computer Science, Agurchand Manmull Jain College, India
     

   Subscribe/Renew Journal


Fast Transmission in Wireless medium possess on node selection routing and unicasting the wireless sensor networks of the traditional secure aggregation system, the node broadcast it to all its neighbors as compared to what it contained. However, due to the rigorous network environment surrounding the nodes, many researchers usually take a different approach from traditional networks. Wireless sensor networks (WSN) are currently used in a variety of applications and will be used in more applications in the future. However, wireless sensor networks tend to be more unreliable than wired networks. In this paper, proposes A Reliable fast and ideal traffic aware secure routing protocol (RTASR) based on multi-hop cross site leaping for efficient packet transmission in WSN. Group-based fast proximity detection algorithm (GBFA) solves these problems. By bearing neighboring information in the beacon pocket, the node knows some potential neighbors in advance. This allows fast discovery to pick up the most energy-efficient neighbors to speed up energy efficiency and reduce network communication load, and actively nodes to verify that this dynamic neighbor is a true neighbor. The simulated results show that the proposed scheme reduces the loss of bandwidth in comparison to routing mechanisms that extend the life of the network.

Keywords

Traffic Aware Routing, Node Bouncing, Cross Site Verification, Multi Hop Verification, Data Collection, Secure Routing, Packet Flow
Subscription Login to verify subscription
User
Notifications
Font Size

  • Aykut Karakaya and Sedat Akleylek, “A Survey on Security Threats and Authentication Approaches in Wireless Sensor Networks”, Proceedings of 6th International Symposium on Digital Forensic and Security, pp. 1-4, 2018.
  • S.R. Rajeswari and V. Seenivasagarn, “Comparative Study on Various Authentication Protocols in Wireless Sensor Networks”, The Scientific World Journal, Vol. 2016, pp. 1-16, 2016.
  • Yun Lin and Jie Chang, “Improving Wireless Network Security Based on Radio Fingerprinting”, Proceedings of IEEE International Conference on Software Quality, Reliability and Security Companion, pp. 1-5, 2019.
  • X. Ye, X. Yin, X. Cai, A. Perez Yuste and H. Xu, “Neural-Network Assisted UE Localization Using Radio-Channel Fingerprints in LTE Networks”, IEEE Access, Vol. 5, pp. 12071-12087, 2017.
  • Liang Huang, Xin Fan, Yan Huo, Chunqiang Hu, Yuqian Tian and Jin Qian, “A Novel Cooperative Jamming Scheme for Wireless Social Networks Without Known CSI”, IEEE Access, vol. 5, pp. 26476-26486, 2017.
  • Nazli Siasi, Adel Aldalbahi and Mohammed A. Jasim, “Reliable Transmission Scheme against Security Attacks in Wireless Sensor Networks”, IEEE Access, Vol. 7, pp. 1-5, 2019.
  • J. Ren, Y. Zhang, K. Zhang and X. Shen, “Adaptive and Channel Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks”, IEEE Transactions on Wireless Communications, Vol. 15, No. 5, pp. 1-15, 2016.
  • E. Stavrou and A. Pitsillides, “WSN Operability during Persistent Attack Execution”, Proceedings of International Conference on Telecommunications, pp. 1-12, 2016.
  • N.G. Palan, B.V. Barbadekar and S. Patil, “Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol: A Retrospective Analysis”, Proceedings of International Conference on Inventive Systems and Control, pp. 1-8, 2017.
  • Shailesh Pramod Bendale and Jayashree Rajesh Prasad, “Security Threats and Challenges in Future Mobile Wireless Networks”, Proceedings of International Conference on IEEE Global Conference on Wireless Computing and Networking, pp. 146-150, 2018.
  • Dongfeng Fang, Yi Qian and Rose Qingyang Hu, “Security for 5G Mobile Wireless Networks”, IEEE Access, Vol. 6, pp. 4850-4874, 2018.
  • Y. Ju, H. M. Wang, T.X. Zheng and Q. Yin, “Secure Transmission with Artificial Noise in Millimeter Wave Systems”, Proceedings of International Conference on IEEE Wireless Communications and Networking, pp. 1-6 2016.
  • N. Panwar, S. Sharma and A. K. Singh, “A Survey on 5G: The Next Generation of Mobile Communication”, Physical Communication, Vol.18, No. 2, pp. 64-84, 2016.
  • E. Dubrova, M. Naslund and G. Selander, “CRC-Based Message Authentication for 5G Mobile Technology”, Proceedings of International Conference on Trust, Security, and Privacy in Computing and Communications, pp. 1186-1191, 2015.
  • L. Wei, R. Q. Hu, Y. Qian and G. Wu, “Energy Efficiency and Spectrum Efficiency of Multihop Device-to-Device Communications Underlaying Cellular Networks”, IEEE Transactions on Vehicular Technology, Vol. 65, No. 1, pp. 367-380, 2016.
  • Haomeng Xie, Zheng Yan, “Data Collection for Security Measurement in Wireless Sensor Networks: A Survey”, IEEE Internet of Things Journal, Vol. 6, No. 2, pp. 1-22, 2018.
  • G. Liu, Z. Yan and W. Pedryczc, “Data Collection for Attack Detection and Security Measurement in Mobile Ad Hoc Networks: A Survey”, Journal of Network and Computer Applications, Vol. 105, pp. 105-122, 2018.
  • H.Q. Lin, Z. Yan, Y. Chen and L.F. Zhang, “A Survey on Network Security-Related Data Collection Technologies”, IEEE Access, Vol. 6, pp. 18345-18365, 2018.
  • Y.F. Zheng, H.Y. Duan and C. Wang, “Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing”, IEEE Transactions on Information Forensics and Security, Vol. 13, No. 10, pp. 2475-2489, 2018.
  • J. Ren, S. Member, Y. Zhang, K. Zhang and S. Member, “Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks”, IEEE Transaction on Wireless Communications, Vol. 15, No. 5, pp. 3718-3731, 2016.

Abstract Views: 198

PDF Views: 1




  • Reliable Fast and Ideal Traffic Aware Secure Routing Protocol Based on Multi-Hop Cross Site Leaping for Efficient Packet Transmission in WSN

Abstract Views: 198  |  PDF Views: 1

Authors

A. Ambeth Raja
Department of Computer Applications, Thiruthangal Nadar College, India
A. Udhaya Kumar
Department of Computer Science, Agurchand Manmull Jain College, India

Abstract


Fast Transmission in Wireless medium possess on node selection routing and unicasting the wireless sensor networks of the traditional secure aggregation system, the node broadcast it to all its neighbors as compared to what it contained. However, due to the rigorous network environment surrounding the nodes, many researchers usually take a different approach from traditional networks. Wireless sensor networks (WSN) are currently used in a variety of applications and will be used in more applications in the future. However, wireless sensor networks tend to be more unreliable than wired networks. In this paper, proposes A Reliable fast and ideal traffic aware secure routing protocol (RTASR) based on multi-hop cross site leaping for efficient packet transmission in WSN. Group-based fast proximity detection algorithm (GBFA) solves these problems. By bearing neighboring information in the beacon pocket, the node knows some potential neighbors in advance. This allows fast discovery to pick up the most energy-efficient neighbors to speed up energy efficiency and reduce network communication load, and actively nodes to verify that this dynamic neighbor is a true neighbor. The simulated results show that the proposed scheme reduces the loss of bandwidth in comparison to routing mechanisms that extend the life of the network.

Keywords


Traffic Aware Routing, Node Bouncing, Cross Site Verification, Multi Hop Verification, Data Collection, Secure Routing, Packet Flow

References