{"title":"无线传感器网络中基于簇的动态多径信任安全路由协议的性能分析","authors":"Darshan B. D., P. C. R.","doi":"10.22247/ijcna/2023/221891","DOIUrl":null,"url":null,"abstract":"– A wireless sensor network [WSN] analyses the structured information supplied from the base station for the hostile environment. The primary drawback of WSN is Security since the sensors are placed in a closed network. WSNs are primarily disrupted by a variety of harmful ‘internal and external’ attacks. Due to these attacks, the leading resources in the networks, like power and memory, will be drained early. To overcome these problems, propose a novel protocol: Dynamic Multipath Trust Secure Routing Protocol (DMTSR) with Advanced AAODV protocol. For encryption and decryption purposes, Advanced Encryption Algorithms [AES] are used to help the above protocol. The fastest path is found to a destination from the source node by considering the neighbour node's energy level and energy consumption of the node. It can reduce packet loss and improve the packet_ delivery ratio. DMTSRP and AAODV protocols are merged to develop an innovative approach to routing the information. The DMTSR will give a layer-by-layer explanation. The source node's primary job is to identify the path by considering the neighbour node and approaches for the primary keys. Source nodes begin updating intermediate nodes in secured regions using an AES encryption algorithm. The DMTSR protocol replaces packets of data. The DMTSR protocol uses a secondary_key to substitute an intermediate node, where the secured data is received at the final nodes. The simulation outcomes of the DMTSR protocol achieve a 92% Packet_Delivery_Rate, Throughput of 97%, and a delay is 0.278ms in the network.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Performance Analysis of Cluster-Based Dynamic Multipath Trust Secure Routing (DMTSR)-Protocol in Wireless Sensor Networks (WSNs)\",\"authors\":\"Darshan B. D., P. C. R.\",\"doi\":\"10.22247/ijcna/2023/221891\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"– A wireless sensor network [WSN] analyses the structured information supplied from the base station for the hostile environment. The primary drawback of WSN is Security since the sensors are placed in a closed network. WSNs are primarily disrupted by a variety of harmful ‘internal and external’ attacks. Due to these attacks, the leading resources in the networks, like power and memory, will be drained early. To overcome these problems, propose a novel protocol: Dynamic Multipath Trust Secure Routing Protocol (DMTSR) with Advanced AAODV protocol. For encryption and decryption purposes, Advanced Encryption Algorithms [AES] are used to help the above protocol. The fastest path is found to a destination from the source node by considering the neighbour node's energy level and energy consumption of the node. It can reduce packet loss and improve the packet_ delivery ratio. DMTSRP and AAODV protocols are merged to develop an innovative approach to routing the information. The DMTSR will give a layer-by-layer explanation. The source node's primary job is to identify the path by considering the neighbour node and approaches for the primary keys. Source nodes begin updating intermediate nodes in secured regions using an AES encryption algorithm. The DMTSR protocol replaces packets of data. The DMTSR protocol uses a secondary_key to substitute an intermediate node, where the secured data is received at the final nodes. The simulation outcomes of the DMTSR protocol achieve a 92% Packet_Delivery_Rate, Throughput of 97%, and a delay is 0.278ms in the network.\",\"PeriodicalId\":36485,\"journal\":{\"name\":\"International Journal of Computer Networks and Applications\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computer Networks and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.22247/ijcna/2023/221891\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Networks and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22247/ijcna/2023/221891","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
Performance Analysis of Cluster-Based Dynamic Multipath Trust Secure Routing (DMTSR)-Protocol in Wireless Sensor Networks (WSNs)
– A wireless sensor network [WSN] analyses the structured information supplied from the base station for the hostile environment. The primary drawback of WSN is Security since the sensors are placed in a closed network. WSNs are primarily disrupted by a variety of harmful ‘internal and external’ attacks. Due to these attacks, the leading resources in the networks, like power and memory, will be drained early. To overcome these problems, propose a novel protocol: Dynamic Multipath Trust Secure Routing Protocol (DMTSR) with Advanced AAODV protocol. For encryption and decryption purposes, Advanced Encryption Algorithms [AES] are used to help the above protocol. The fastest path is found to a destination from the source node by considering the neighbour node's energy level and energy consumption of the node. It can reduce packet loss and improve the packet_ delivery ratio. DMTSRP and AAODV protocols are merged to develop an innovative approach to routing the information. The DMTSR will give a layer-by-layer explanation. The source node's primary job is to identify the path by considering the neighbour node and approaches for the primary keys. Source nodes begin updating intermediate nodes in secured regions using an AES encryption algorithm. The DMTSR protocol replaces packets of data. The DMTSR protocol uses a secondary_key to substitute an intermediate node, where the secured data is received at the final nodes. The simulation outcomes of the DMTSR protocol achieve a 92% Packet_Delivery_Rate, Throughput of 97%, and a delay is 0.278ms in the network.