
Energy efficient aggregation technique‐based realisable secure aware routing protocol for wireless sensor network
Author(s) -
Raja Basha Adam
Publication year - 2020
Publication title -
iet wireless sensor systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.433
H-Index - 27
eISSN - 2043-6394
pISSN - 2043-6386
DOI - 10.1049/iet-wss.2019.0178
Subject(s) - computer science , wireless sensor network , data aggregator , overhead (engineering) , node (physics) , computer network , routing protocol , data flow diagram , routing (electronic design automation) , process (computing) , engineering , structural engineering , database , operating system
Wireless sensor network (WSN) plays a predominant role from household equipment into military applications,sometimes utilised to handle most sensitive, personalised data like body sensors report, medical purposes in those cases, all kind of prescription and decisions are taken based on the sensor data. Many algorithms and techniques have been developed for these purposes among them trust‐based algorithms outperform the conventional techniques. A trust method provides ultimate security with integrity, authenticity and availability of data to all the nodes. Data overhead is the complication encountered while implementation trust‐based method which leads to complications like congestion into the system. And also directly affects the data aggregation process, as a cumulative effect, the overall lifetime of the network is drastically brought down. This study proposes a realisable secure aware routing (RSAR) protocol: RSAR method to overcome the said issue. The RSAR starts with the trust factor calculation of individual sensor node. Then the values are computed by optimal trust inference model using the conditional tug of war optimisation algorithm. The data aggregation help in reducing the instantaneous data flow of the individual node to multi‐hop and filters out the necessary data alone, then transmits the accumulated information to the receiving end. The energy efficiency of this proposed work is achieved through bypassing the repeated and fault data from the gathered information and in turn, it will maximise the WSN lifetime by saving its battery. Trust factor calculations introduced by this method help in identifying the attacks and mitigate by calculating the trust factors.