Secured distributed routing technique using extended DART and table elimination (ET-DART) technique in wireless sensor networks environment

Distributed wireless sensor networks (WSNs) particularly deployed in urban applications like traffic surveillance are the main source of big data, and they produce a massive quantity of data. Multipath routing favors reliable data delivery in the case of sensitive data. However, the disadvantage is that many routes might increase the number of control packets. In this paper, we present an extended dynamic address routing technique (DART) with table elimination (ET) technique named ET-DART to reduce the complexity by handling a high degree of connectedness. The new idea of “connectedness” is used to distribute data from one node as it collected from another node. This method is used for defending capture attacks, and it modifies the security in every node without modifying the packet received ratios. A set of simulations takes place to verify the superiority of the presented ET-DART in terms of different performance metrics. Under the presence of 400 nodes, the presented ET-DART method successfully decrypts 154 packets with a maximum throughput of 82.15%. The experimental outcome verified the enhanced results of the presented method over the compared ones under several aspects.

[1]  Tomoyuki Ohta,et al.  Improvement of Dependability against Node Capture Attacks for Wireless Sensor Networks , 2011, IEICE Trans. Inf. Syst..

[2]  K. Shankar,et al.  Improved artificial bee colony optimization based clustering algorithm for SMART sensor environments , 2020, Peer-to-Peer Netw. Appl..

[3]  Yoshiaki Kakuda,et al.  On Parameters for the Secure Dispersed Data Transfer Scheme Using a Multipath Routing Method , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW).

[4]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[5]  Mohamed Elhoseny,et al.  Energy Efficient Optimal Routing for Communication in VANETs via Clustering Model , 2019, Studies in Systems, Decision and Control.

[6]  Senthil Ragavan Valayapalayam Kittusamy,et al.  An enhanced whale optimization algorithm for vehicular communication networks , 2019, Int. J. Commun. Syst..

[7]  Andino Maseleno,et al.  Bat optimization algorithm with fuzzy based PIT sharing (BF-PIT) algorithm for Named Data Networking (NDN) , 2019, J. Intell. Fuzzy Syst..

[8]  Mohamed Elhoseny,et al.  Reliable Data Transmission Model for Mobile Ad Hoc Network Using Signcryption Technique , 2020, IEEE Transactions on Reliability.

[9]  Mohamed Elhoseny,et al.  An efficient hierarchical clustering protocol for multihop Internet of vehicles communication , 2019, Trans. Emerg. Telecommun. Technol..

[10]  Tomoyuki Ohta,et al.  A Multipath Routing Method with Dynamic ID for Reduction of Routing Load in Ad Hoc Networks , 2010, ADHOCNETS.

[11]  An-Yeu Wu,et al.  Regional ACO-Based Cascaded Adaptive Routing for Traffic Balancing in Mesh-Based Network-on-Chip Systems , 2015, IEEE Transactions on Computers.

[12]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[13]  Tomoyuki Ohta,et al.  Improvement of the Security Against Node Capture Attacks Using Dispersed Data Transmission for Wireless Sensor Networks , 2010, 2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing.

[14]  Joel J. P. C. Rodrigues,et al.  Efficient artificial fish swarm based clustering approach on mobility aware energy‐efficient for MANET , 2018, Trans. Emerg. Telecommun. Technol..

[15]  Hiroki Horiuchi,et al.  AODV-Based Multipath Routing Protocol for Mobile Ad Hoc Networks(Ad Hoc Network)( Networking Technologies for Mobile Internet Systems) , 2004 .

[16]  Eswaran Perumal,et al.  Mobility and QoS Analysis in VANET Using NMP with Salp Optimization Models , 2020 .

[17]  Samir R Das,et al.  Ad hoc on-demand multipath distance vector routing , 2002, MOCO.

[18]  Mohsen Guizani,et al.  Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks , 2007, IEEE Transactions on Wireless Communications.

[19]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[20]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[21]  Kartik Shankar,et al.  Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography , 2019 .

[22]  Ehud D. Karnin,et al.  On secret sharing systems , 1983, IEEE Trans. Inf. Theory.

[23]  Deborah Estrin,et al.  Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.

[24]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.