Amazing technological breakthrough possible @S-Logix

Office Address

  • 2nd Floor, #7a, High School Road, Secretariat Colony Ambattur, Chennai-600053 (Landmark: SRM School) Tamil Nadu, India
  • +91- 81240 01111

Social List

Energy efficient aggregation technique-based realisable secure aware routing protocol for wireless sensor network - 2020

Energy efficient aggregation technique-based realisable secure aware routing protocol for wireless sensor network

Research Area:  Wireless Sensor Networks


Wireless sensor network (WSN) plays a predominant role from household equipment into military applications,sometimes utilised to handle most sensitive, personalised data like body sensors report, medical purposes in those cases, all kind of prescription and decisions are taken based on the sensor data. Many algorithms and techniques have been developed for these purposes among them trust-based algorithms outperform the conventional techniques. A trust method provides ultimate security with integrity, authenticity and availability of data to all the nodes. Data overhead is the complication encountered while implementation trust-based method which leads to complications like congestion into the system. And also directly affects the data aggregation process, as a cumulative effect, the overall lifetime of the network is drastically brought down. This study proposes a realisable secure aware routing (RSAR) protocol: RSAR method to overcome the said issue. The RSAR starts with the trust factor calculation of individual sensor node. Then the values are computed by optimal trust inference model using the conditional tug of war optimisation algorithm. The data aggregation help in reducing the instantaneous data flow of the individual node to multi-hop and filters out the necessary data alone, then transmits the accumulated information to the receiving end. The energy efficiency of this proposed work is achieved through bypassing the repeated and fault data from the gathered information and in turn, it will maximise the WSN lifetime by saving its battery. Trust factor calculations introduced by this method help in identifying the attacks and mitigate by calculating the trust factors.


Author(s) Name:  Adam Raja Basha


Conferrence name:  

Publisher name:  Wiley

DOI:  10.1049/iet-wss.2019.0178

Volume Information:  Volume10, Issue4 August 2020 Pages 166-174