CFP last date
20 December 2024
Reseach Article

Energy Proficient and Security Protocol for WSN: AODV

by Devendra Kumar, Rajesh Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 107 - Number 13
Year of Publication: 2014
Authors: Devendra Kumar, Rajesh Sharma
10.5120/18813-0391

Devendra Kumar, Rajesh Sharma . Energy Proficient and Security Protocol for WSN: AODV. International Journal of Computer Applications. 107, 13 ( December 2014), 27-33. DOI=10.5120/18813-0391

@article{ 10.5120/18813-0391,
author = { Devendra Kumar, Rajesh Sharma },
title = { Energy Proficient and Security Protocol for WSN: AODV },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 107 },
number = { 13 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 27-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume107/number13/18813-0391/ },
doi = { 10.5120/18813-0391 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:40:59.454288+05:30
%A Devendra Kumar
%A Rajesh Sharma
%T Energy Proficient and Security Protocol for WSN: AODV
%J International Journal of Computer Applications
%@ 0975-8887
%V 107
%N 13
%P 27-33
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor network is extensively used technology now a day in real time application. It consists of a number of autonomous sensor nodes which are organized in various areas of interest to accumulate data and jointly convey that data back to a base station. But the sensor node has limited battery energy and it is also found that the WSN more vulnerable to severe kinds of security threats such as denial of service (DOS), Sybil, hello flood attack etc. In this, we proposed group communication using election algorithm to make the network most energy efficient and also make the network secure. The simulation of the proposed methodology is done between different network parameter such as PDR, end-to-end delay, throughput and energy consumption using the network simulator NS-2. 34.

References
  1. Adil Bashir, Ajaz Hussain Mir, "An Energy Efficient and Dynamic Security Protocol for Wireless Sensor Network", International Conference on Advanced Electronic Systems (ICAES) , 2013 in proceeding of IEEE xplore
  2. Subramanian Ganesh, Ramachandran Amutha, "Efficient and Secure Routing Protocol for Wireless Sensor Networks through SNR Based Dynamic Clustering Mechanisms" Journal of Communications and Networks, vol. 15, no. 4, august 2013
  3. Luigi Coppolino, Salvatore D'Antonio, Alessia Garofalo, Luigi Romano, "Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks" Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2013.
  4. K. Parameswari, M. Mohamed Raseen, "Aggregating Secure Data In Wireless Sensor Networks", International Conference on Current Trends in Engineering and Technology, ICCTET'13 in proceeding of IEEE.
  5. Roshan Zameer Ahmed, Anusha Anigol, R. C. Biradar, "Reactive Security Scheme using Behavioral Aspects of Attacks for Wireless Sensor Networks", International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2013, in proceeding of IEEE.
  6. Sudharsan Omprakash, Giridharan Nanthagopal, Santosh Kumar Omprakash, "A secured energy efficient clustering and data aggregation protocol for wireless sensor network", American Journal of Computation, Communication and Control 2014; 1(1): 18-23
  7. Malika BELKADI, Rachida AOUDJIT, Mehammed DAOUI, Mustapha LALAM, "Energy-efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks", I. J. Information Technology and Computer Science, 2014, 01, 50-56
  8. BabakNikmard and Salman Taherizadeh, "Using mobile agent in clustering method for energy consumption in wireless sensor network", International Conference on Computer and Communication Technology (ICCCT), pp. 153-158, 2010.
  9. Ali K. , Neogy S. , and Das P. K. , "Optimal Energy-Based Clustering with GPS-Enabled Sensor Nodes", Fourth International Conference on Sensor Technologies and Applications (SENSORCOMM), pp. 13-18, 2010
  10. Di Tang, Tongtong Li, Jian Ren, Jie Wu, "Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks", Parallel and Distributed Systems, IEEE Transactions 2014 on volume: PP, Issue: 99
  11. Jong-Yong Lee, Kyedong Jung, Hanmin Jung, Daesung Lee, "Improving the Energy Efficiency of a Cluster Head Election for Wireless Sensor Networks", Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 2014, Article ID 305037, 6 pages
  12. Fan Wu," incentive-compatible opportunistic routing for wireless networks", mobicom'08, September 14–19, 2008, San Francisco, California, USA 2008
  13. Naveen Sharma, Anand Nayyar, "A Comprehensive Review of Cluster Based Energy Efficient Routing Protocols for Wireless Sensor Networks", International Journal of Application or Innovation in Engineering & Management, Volume 3, Issue 1, January 2014 ISSN 2319-4847
  14. S. Cui, A. J. Goldsmith, and A. Bahai, "Energy-efficiency of MIMO and cooperative MIMO in sensor networks," IEEE J. Sel. Areas Communication, vol. 22, no. 6, pp. 1089–1098, Aug. 2004
  15. S. Cui and A. Goldsmith, "Cross-layer design of energy-constrained networks using cooperative MIMO techniques," EURASIP Signal Process. J. , vol. 86, no. 8, pp. 1804–1814, Aug. 2006.
  16. M. Dohler, Y. Li, B. Vucetic, A. H. Aghvami, M. Arndt, and D. Barthel, "Performance analysis of distributed space-time block encoded sensor networks," IEEE Trans. Veh. Technol. , vol. 55, no. 7, pp. 1776–1789, Nov. 2006.
  17. P beaulahsoundarabai, Thriveni J, K R Venugopal, L M Patnaik, "an improved leader election algorithm for distributed systems", International Journal of Next-Generation Networks (IJNGN) Vol. 5, No. 1, March 2013
  18. N. Drakos and R. Moore, ns2 - The Manual (formerly Notes and Documentation), 1999. [Online]. Available:http://www. isi. edu/nsnam/ns/doc
  19. Pankaj Rohal, Ruchika Dahiya, Prashant Dahiya, "Study and Analysis of Throughput, Delay and Packet Delivery Ratio in MANET for Topology Based Routing Protocols (AODV, DSR and DSDV)", International Journal for Advance Research In Engineering And Technology, Vol. 1, Issue II, Mar. 2013 ISSN 2320-6802.
Index Terms

Computer Science
Information Sciences

Keywords

Battery PDR Security Threats Throughput Wireless sensor network