Skip to main content
Log in

Sectional Transmission analysis approach for improved reliable transmission and secure routing in wireless sensor networks

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Wireless sensor networks have become the backbone of modern information technology, which supports the service oriented architecture in a major activity. There are a number of routing and security protocols recommended for improving the performance of packet transmission. However, is hard to achieve the required performance. Sectional transmission analysis (STA) based approach is proposed in this paper for implementing the performance in reliability of transmission and security in routing. The method performs route discovery initially and collects various routes available to reach the destination. Also the method learns the network topology on the basis of the routes and their parameters. Second, the network has been sectioned into numbers and the transmission analysis is performed at each identified section. STA is performed on the basis of the details available in the routes identified. At the route discovery, each node updates its transmission details, neighbor details, energy details, etc. Using this information, STA is performed on the routes of each section. Based on the result, a single route and a section have been identified for the transmission of the packet. The same has been used for performing various threats involved and identifies a set of malicious nodes present in each sector identified. The approach improves the performance of secure routing and transmission reliability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Mohanty, P.: Energy efficient structure-free data aggregation and delivery in WSN. Egypt. Inf. J. 17(3), 273–284 (2016)

    Google Scholar 

  2. Rezaee, A.A., Yaghmaee, M.H., Rahmani, A.M., Mohajerzadeh, A.H.: HOCA: healthcare aware optimized congestion avoidance and control protocol for wireless sensor networks. J. Netw. Comput. Appl. 37, 216–228 (2013)

    Google Scholar 

  3. Jiang, S.F., Zhang, C.M., Zhang, S.: Two-stage structural damage detection using fuzzy neural networks and data fusion techniques. Expert Syst. Appl. 38(1), 511–519 (2011)

    Google Scholar 

  4. Kabashkin, I., Kundler, J.: Reliability of sensor nodes in WSN of cyber physical systems. Procedia Comput. Sci. 104, 380–384 (2017)

    Google Scholar 

  5. Ayadi, A.: Energy-efficient and reliable transport protocols for wireless sensor networks: state-of-art. Wirel. Sens. Netw. 3(3), 106–113 (2011)

    Google Scholar 

  6. Sharma, K.K., Patel, R.B., Singh, H.: A reliable and energy efficient transport protocol for wireless sensor networks. Int. J. Comput. Netw. Commun. 2(5), 92–103 (2010)

    Google Scholar 

  7. Park, S.J., Sivakumar, R., Akyildiz, I.F., et al.: GARUDA: achieving effective reliability for downstream communication in wireless sensor networks. IEEE Trans. Mobile Comput. 7(2), 214–230 (2008)

    Google Scholar 

  8. Kumar, M.: LDAT: LFTM based data aggregation and transmission protocol for wireless sensor networks. J. Trust Manag. 3, 2 (2016)

    Google Scholar 

  9. Liu, C., Liu, Y., Zhang, Z.J.: Improved reliable trust-based and energy-efficient data aggregation for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2013(652495), 1–11 (2013)

    Google Scholar 

  10. Misra, S., Vaish, A.: Reputation-based role assignment for role-based access control in wireless sensor networks. J. Comput. Commun. 34(3), 281 (2009)

    Google Scholar 

  11. Marmol, F.G., Perez, G.M.: Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Comput. Stand. Interfaces 32(4), 185–196 (2010)

    Google Scholar 

  12. Marzi, H., Li, M.: An enhanced bio-inspired trust and reputation model for wireless sensor network. Procedia Comput. Sci. 19, 1159–1166 (2013)

    Google Scholar 

  13. Mármol, F.G., Perez, G.M., Marín-Blázquez, J.G.: LFTM, linguistic fuzzy trust mechanism for distributed networks. Concurr. Comput. Pract. Exp. 24(17), 1975–1976 (2012)

    Google Scholar 

  14. Nagarathna, K., Mallapur, J.D., Kiran, Y.B., Hiremath, S.: Trust based secured routing in wireless multimedia sensor networks. In: Fourth International Conference on Computational Intelligence, Communication Systems and Networks, pp. 53–58 (2012)

  15. Ye, Z.: A security fault-tolerant routing for multi-layer non-uniform clustered WSNs. EURASIP J. Wirel. Commun. Netw. 2016, 192 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Kingsly Stephen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kingsly Stephen, R., Chandra Sekar, A. & Dinakaran, K. Sectional Transmission analysis approach for improved reliable transmission and secure routing in wireless sensor networks. Cluster Comput 22 (Suppl 2), 3759–3770 (2019). https://doi.org/10.1007/s10586-018-2276-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2276-y

Keywords