{"title":"基于节能聚合技术的无线传感器网络可实现安全感知路由协议","authors":"Adam Raja Basha","doi":"10.1049/iet-wss.2019.0178","DOIUrl":null,"url":null,"abstract":"<div>\n <p>Wireless sensor network (WSN) plays a predominant role from household equipment into military applications,sometimes utilised to handle most sensitive, personalised data like body sensors report, medical purposes in those cases, all kind of prescription and decisions are taken based on the sensor data. Many algorithms and techniques have been developed for these purposes among them trust-based algorithms outperform the conventional techniques. A trust method provides ultimate security with integrity, authenticity and availability of data to all the nodes. Data overhead is the complication encountered while implementation trust-based method which leads to complications like congestion into the system. And also directly affects the data aggregation process, as a cumulative effect, the overall lifetime of the network is drastically brought down. This study proposes a realisable secure aware routing (RSAR) protocol: RSAR method to overcome the said issue. The RSAR starts with the trust factor calculation of individual sensor node. Then the values are computed by optimal trust inference model using the conditional tug of war optimisation algorithm. The data aggregation help in reducing the instantaneous data flow of the individual node to multi-hop and filters out the necessary data alone, then transmits the accumulated information to the receiving end. The energy efficiency of this proposed work is achieved through bypassing the repeated and fault data from the gathered information and in turn, it will maximise the WSN lifetime by saving its battery. Trust factor calculations introduced by this method help in identifying the attacks and mitigate by calculating the trust factors.</p>\n </div>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":null,"pages":null},"PeriodicalIF":1.5000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1049/iet-wss.2019.0178","citationCount":"20","resultStr":"{\"title\":\"Energy efficient aggregation technique-based realisable secure aware routing protocol for wireless sensor network\",\"authors\":\"Adam Raja Basha\",\"doi\":\"10.1049/iet-wss.2019.0178\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n <p>Wireless sensor network (WSN) plays a predominant role from household equipment into military applications,sometimes utilised to handle most sensitive, personalised data like body sensors report, medical purposes in those cases, all kind of prescription and decisions are taken based on the sensor data. Many algorithms and techniques have been developed for these purposes among them trust-based algorithms outperform the conventional techniques. A trust method provides ultimate security with integrity, authenticity and availability of data to all the nodes. Data overhead is the complication encountered while implementation trust-based method which leads to complications like congestion into the system. And also directly affects the data aggregation process, as a cumulative effect, the overall lifetime of the network is drastically brought down. This study proposes a realisable secure aware routing (RSAR) protocol: RSAR method to overcome the said issue. The RSAR starts with the trust factor calculation of individual sensor node. Then the values are computed by optimal trust inference model using the conditional tug of war optimisation algorithm. The data aggregation help in reducing the instantaneous data flow of the individual node to multi-hop and filters out the necessary data alone, then transmits the accumulated information to the receiving end. The energy efficiency of this proposed work is achieved through bypassing the repeated and fault data from the gathered information and in turn, it will maximise the WSN lifetime by saving its battery. Trust factor calculations introduced by this method help in identifying the attacks and mitigate by calculating the trust factors.</p>\\n </div>\",\"PeriodicalId\":51726,\"journal\":{\"name\":\"IET Wireless Sensor Systems\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2020-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1049/iet-wss.2019.0178\",\"citationCount\":\"20\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IET Wireless Sensor Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1049/iet-wss.2019.0178\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Wireless Sensor Systems","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/iet-wss.2019.0178","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
Energy efficient aggregation technique-based realisable secure aware routing protocol for wireless sensor network
Wireless sensor network (WSN) plays a predominant role from household equipment into military applications,sometimes utilised to handle most sensitive, personalised data like body sensors report, medical purposes in those cases, all kind of prescription and decisions are taken based on the sensor data. Many algorithms and techniques have been developed for these purposes among them trust-based algorithms outperform the conventional techniques. A trust method provides ultimate security with integrity, authenticity and availability of data to all the nodes. Data overhead is the complication encountered while implementation trust-based method which leads to complications like congestion into the system. And also directly affects the data aggregation process, as a cumulative effect, the overall lifetime of the network is drastically brought down. This study proposes a realisable secure aware routing (RSAR) protocol: RSAR method to overcome the said issue. The RSAR starts with the trust factor calculation of individual sensor node. Then the values are computed by optimal trust inference model using the conditional tug of war optimisation algorithm. The data aggregation help in reducing the instantaneous data flow of the individual node to multi-hop and filters out the necessary data alone, then transmits the accumulated information to the receiving end. The energy efficiency of this proposed work is achieved through bypassing the repeated and fault data from the gathered information and in turn, it will maximise the WSN lifetime by saving its battery. Trust factor calculations introduced by this method help in identifying the attacks and mitigate by calculating the trust factors.
期刊介绍:
IET Wireless Sensor Systems is aimed at the growing field of wireless sensor networks and distributed systems, which has been expanding rapidly in recent years and is evolving into a multi-billion dollar industry. The Journal has been launched to give a platform to researchers and academics in the field and is intended to cover the research, engineering, technological developments, innovative deployment of distributed sensor and actuator systems. Topics covered include, but are not limited to theoretical developments of: Innovative Architectures for Smart Sensors;Nano Sensors and Actuators Unstructured Networking; Cooperative and Clustering Distributed Sensors; Data Fusion for Distributed Sensors; Distributed Intelligence in Distributed Sensors; Energy Harvesting for and Lifetime of Smart Sensors and Actuators; Cross-Layer Design and Layer Optimisation in Distributed Sensors; Security, Trust and Dependability of Distributed Sensors. The Journal also covers; Innovative Services and Applications for: Monitoring: Health, Traffic, Weather and Toxins; Surveillance: Target Tracking and Localization; Observation: Global Resources and Geological Activities (Earth, Forest, Mines, Underwater); Industrial Applications of Distributed Sensors in Green and Agile Manufacturing; Sensor and RFID Applications of the Internet-of-Things ("IoT"); Smart Metering; Machine-to-Machine Communications.