Secure routing with improved medium access control (SRI-MAC) protocol for wireless sensor network using particle swarm optimization

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A set of wireless sensor nodes comprises to form a sensor field called Wireless Sensor Networks (WSN).The main purpose of using the sensor node is to collect information from the ambience process it and send to a common gateway interface called Base Station(BS). The major problems that we face while using WSN are limited battery power, bandwidth, security issues and transmission delay etc. Many algorithms and protocols were developed in order to solve the above issues. Therefore, better solutions are required to face the improvements and challenges in the current technologies. In WSN, the sensor node highly loses its energy during communication period. One of the major issues of Medium Access Control (MAC) layer is collision. Collision increases the energy consumption and delay of the sensor node. So we have to conserve the energy of the sensor node in order to extend the lifetime of the network. At the same time it is also important to transmit the data through secure path and identify the malicious node. In this paper, we propose a novelty approach called Secure Routing with Improved Medium Access control (SRI -MAC) Protocol to solve the issues. SRI-MAC identifies packet precedence sets using Fuzzy Implication System (FIS) to avoid packet collision in MAC layer and also it detects wormhole attacks and selects secure path among k-paths using Particle Swarm Optimization (PSO) algorithm. By simulation results, we show that the proposed approach is efficient in terms of energy consumption and secure routing.

Cite

CITATION STYLE

APA

Tamilarasi, N., & Santhi, S. G. (2019). Secure routing with improved medium access control (SRI-MAC) protocol for wireless sensor network using particle swarm optimization. International Journal of Engineering and Advanced Technology, 8(5 Special Issue 3), 145–150. https://doi.org/10.35940/ijeat.E1035.0785S319

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free