ISSN: 2375-3943
American Journal of Computation, Communication and Control  
Manuscript Information
 
 
A Secured Energy Efficient Clustering and Data Aggregation Protocol for Wireless Sensor Network
American Journal of Computation, Communication and Control
Vol.1 , No. 1, Publication Date: Jul. 7, 2014, Page: 18-23
2340 Views Since July 7, 2014, 1205 Downloads Since Apr. 14, 2015
 
 
Authors
 
[1]    

Sudharsan Omprakash , IT, Anna University, R.V.S College of Engineering and Technology, Dindigul, India.

[2]    

Giridharan Nanthagopal , ECE, Anna University, Velammal College of Engineering and Technology, Madurai, India.

[3]    

Santosh Kumar Omprakash , Software Engineer, Accenture, Bangalore, India.

 
Abstract
 

Energy consumption is a main factor which increases the life time of the network, where the energy can be saved in each individual node as well as by cluster based routing in the network. If the network is energy consumed and the security is less, the network cannot be consider as a trustable network, and passing a secret message is highly impossible in the network. Even though the energy and the security are two different and independent factors in the WSN, a secured energy efficient network should consider both the factors. In this paper we proposed, a Secured Energy Efficient Clustering and Data Aggregation – [SEECDA] protocol for the heterogeneous WSN, in which the security, energy efficient clustering, data aggregation are combined to achieve a best performance in terms of QOS by security and energy. The proposed approach includes a security mechanism, and an innovative cluster head election mechanism and the route will be selected with less energy needed. The simulation output shows that the SEECDA balances the security, energy efficiency and prolongs the network life time is high when compared to LEACH, EEHCA and EDGA, EECDA respectively.


Keywords
 

Wireless Sensor Network, Security, Energy Efficient, Clustering, Data Aggregation


Reference
 
[01]    

Yogesh Kumar, Rajiv Munjal, Krishan Kumar, “Wireless Sensor Networks and Security Challenges”, National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing (RTMC) 2011

[02]    

G. Ravi, M. Mohamed Surputheen, R. Srinivasan, “Secure Packet Transmission in Wireless Sensor Networks using Dynamic Routing Techniques”, International Journal of Computer Applications (0975 – 8887)

[03]    

Michael J. Neely, Rahul Urgaonkar, “Optimal Backpressure Routing for Wireless Networks with Multi-Receiver Diversity, AD HOC NETWORKS (ELSEVIER)”, July 2009, Vol. 7, No.5, PP. 862-881.

[04]    

P. Appavoo and K. Khedo, “SENCAST: A Scalable Protocol for Unicasting and Multicasting in a Large Adhoc Emergency Network”, IJCSNS International Journal of Computer Science and Network Security, February2008, Vol.8, No.2.

[05]    

J.Preetheswari, J. Mark Jain, “ Optimized Secure Data Delivery based on Randomized Routing in Wireless Sensor Networks”, International Conference on Recent Trends in Computational Methods, Communication and Controls (ICON3C 2012)

[06]    

M.Shankar, Dr.M.Sridar, Dr.M.Rajani, “ Performance Evaluation of LEACH Protocol in Wireless Network”, International Journal of Scientific & Engineering Research, Volume 3, Issue 1, January-2012 ISSN 2229-5518

[07]    

Hiren Kumar Deva Sarma, Avijit Kar, and Rajib Mall, “Secure Routing Protocol for Mobile Wireless Sensor Network”, 2011 IEEE

[08]    

Ali Modirkhazeni, Norafida Ithnin, Othman Ibrahim, “Secure Multipath Routing Protocols in Wireless Sensor Networks: A Security Survey Analysis”, 2010 Second International Conference on Network Applications, Protocols and Services

[09]    

Eliana Stavrou, Andreas Pitsillides,” A survey on secure multipath routing protocols in WSNs”, 2010 Elsevier

[10]    

ERMAN AYDAY, FARSHID DELGOSHA, FARAMARZ FEKRI, “Data Authenticity and Availability in Multihop Wireless Sensor Networks”, ACM Transactions on Sensor Networks, Vol. 8, No. 2, Article 10, Publication date: March 2012.

[11]    

Fadila Khadar and David Simplot, Centre de Recherche INRIA Lille - Nord Europe, “Incremental Power Topology Control Protocol for Wireless Sensor Networks”, 2009 IEEE

[12]    

Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d’Auriol, Heejo Lee, Sungyoung Lee,Young-Jae Song, ”Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 20, NO. 11, NOVEMBER 2009

[13]    

Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, and Sushil Jajodia, “Securing Topology Maintenance Protocols for Sensor Networks”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 8, NO. 3, MAY/JUNE 2011

[14]    

Chun-ming Rong , Skjalg Eggen , Hong-bing Cheng, “A Novel Intrusion Detection Algorithm for Wireless Sensor networks”, 2011 IEEE

[15]    

Khalil El-Khatib, “Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 21, NO. 8, AUGUST 2010

[16]    

QiWang, ShuWang, ZhonglouMeng, “Applying an Intrusion Detection Algorithm to Wireless Sensor Networks”, 2009 IEEE

[17]    

Yi-Ying Zhang, Wen-Cheng Yang, Kee-Bum Kim, Myong-Soon Park, “Inside Attacker Detection in Hierarchical Wireless Sensor Network”, 2008 IEEE

[18]    

Ming Li, Wei.jia Jia, and Wei Zhao*, “Decision Analysis of Network-Based Intrusion Detection Systems for Denial-of-Service Attacks”, 2001 IEEE

[19]    

K.SANTHI SAGAR REDDY, Dr. S. VARADARAJAN, M.SUNIL KUMAR, “IMPROVING QOS UNDER DDOS ATTACKS IN WIRELESS SENSOR NETWORKS USING ANT SYSTEM”, International Journal of Engineering Science and Technology (IJEST) 6 June 2011.

[20]    

Bret Hull, Kyle Jamieson, Hari Balakrishnan, “Mitigating Congestion in Wireless Sensor Networks”, SenSys'04, November 3.5, 2004, Baltimore, Maryland, USA.Copyright 2004 ACM 1­58113­879­2/04/0011





 
  Join Us
 
  Join as Reviewer
 
  Join Editorial Board
 
share:
 
 
Submission
 
 
Membership