Green COMP based energy efficient data aggregation algorithm with malicious node identification (GEED-M) for lifetime improvement in WSN

Authors

  • Srikanth N Department of Electronics and Communication Engineering, KoneruLakshmiah Educational Foundation, Green fields, Vaddeswaram, India
  • Prasad MSG Department of Electronics and Communication Engineering, KoneruLakshmiah Educational Foundation, Green fields, Vaddeswaram, India

Keywords:

Data aggregation, Green-CoMP, Malicious node, Built-in self-test, Lifetime

Abstract

Random deployment of sensor nodes, energy limitations, interference of wireless links, and exposed nodes, are the major reasons of performance degradation in WSN. Energy efficiency, Lifetime improvements are the key research areas from last few decades. Even a high level of research is going on; still there are several issues which reduce the network lifetime and its throughput. For diminishing the energy consumption, the sensor nodes are driven into sleep mode once they finished their sensing round. Introducing mobile nodes in sub clusters is an efficient technique to make the network energy efficient in irregular terrains like plateaus. The energy limitations of mobile nodes, and malicious behaviour are big issues in mobile node based sub clustered sensor networks. These issues can be clear up by introducing a Green CoMP based energy efficient data aggregation algorithm with malicious node identification is proposed, which exchange messages to the cluster head through a mobile node. Malicious behaviour of mobile node is also identified by using Built-in self-Test based technique to improve network throughput. The proposed algorithm gives better results compared with existing algorithms with a lifetime improvement of 56%, energy consumption 44%.

References

. L F. Akyildiz, T.Melodia, and K. R. Chowdhury, „A survey on wireless multimedia sensor networks‟,Computer Netw. (ElseVier),Vol. No. 51, Issue No. 4, pp. 921-960. 2007

. O. DurmazIncel, A. Ghosh, B. Krishnamachari, and K. Chintalapudi, „Fast data collection in tree-based wireless sensor networks‟,IEEE Tran. Mobile Computing,Vol No. 11, Issue No. 1, pp. 86-99.2012.

. V. Mhatre and C. Rosenberg, "Design guidelines for wireless sensor networks communication: clustering and aggregation",Elsevier Ad Hoc Networks Journal,Vol No. 2, Issue No 1, pp. 45-63. 2004.

. Po-Han Huang, Shi-Sheng Sun, and Wanjiun Liao, „GreenCoMP: Energy-Aware Cooperation for Green Cellular Networks‟,IEEE Transactions on mobile computing,Vol No. 16, Issue No 1, pp. 143-157. 2017.

. Syed Muhammad Sajjad, SafdarHussainBouk, and Muhammad Yousaf, „Neighbor Node Trust Based Intrusion Detection System for WSN‟. Procedia Computer Science, Vol No 63, pp. 183-188. 2015.

. R. Ferdous, V. Muthukkumarasamy, and A. Sattar, „A Node-based Trust Management Scheme for Mobile AdHoc Networks‟. Proceedings of the 4th International Conference on Network and System Security (NSS), 2010, pp. 275–280.

. GuoxingZhan, WeisongShi, J.Deng, „Design and implementation of TARF: A trust-aware routing framework for WSNs‟, IEEE Transactions on Dependable and Secure Computing,Vol No 9, Issue No 2, pp. 184-197. 2012.

. B. A Mohan, H. Saroja Devi, „A hybrid approach for data collection using multiple mobile nodes in WSN (HADMMN)‟. In. Proc. IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT),Vol No. 5, pp. 736-739. 2016.

. J. Luo and J.-P. Hubaux, ‘Joint mobility and routing for lifetime elongation in wireless sensor networks,‟in Proc. IEEE INFOCOM, Vol No. 3, pp. 1735-1746, 2005.

.Idris M. Atakli, Hongbing Hu, Yu Chen, Wei-Shinn Ku, and Zhou Su, "Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation". Proceedings of the Symposium on Simulation of Systems Security (SSSS’08), Ottawa, Canada, April 14 – 17, pp. 836-843, 2008.

.F. D. Tolba, W. Ajib, and A. Obaid, “Distributed clustering algorithm for mobile wireless sensors networks,”in Proceedings of the 12th IEEE SENSORS 2013, Conference, pp. 1–4.

.P. Gong, T. M. Chen, and Q. Xu, „ETARP: Energy Efficient Trust- Aware Routing Protocol for Wireless Sensor Networks‟. Journal of Sensors, 2015, Article ID 469793, 10 pages, 2015.

.Awwad, Samer A. B. and Ng, CheeKyun and Noordin, Nor Kamariah and A. Rasid, MohdFadlee , „Cluster based routing protocol for mobile nodes in wireless sensor network‟, Wireless Personal Communications,Vol No. 61, Issue No 2, pp. 251-281.

.Poornima, A.S. &Amberker, B.B..„Secure data collection using mobile data collector in clustered wireless sensor networks‟, IET Wireless Sensor Systems, 2011, Vol No. 1, pp. 85 – 95.

.Sayyed, Ali & Buss Becker, Leandro. „Optimizing speed of mobile data collector in Wireless Sensor Network‟, 2015, 1-6. International Conference on Emerging Technologies (ICET)

.S. Deng, J. Li and L. Shen, „Mobility-based clustering protocol for wireless sensor networks with mobile nodes,‟in IET Wireless Sensor Systems,Vol No. 1, Issue No 1, pp. 39-47, 2011.

.Azharuddin, M., Kuila, P., Jana, P.K.: „Energy efficient fault tolerant clustering and routing algorithms for wireless sensor networks‟, Comput. Electr. Eng., Vol No. , 41, pp. 177–190, 2015.

.Ip, W., Wang, D., Cho, V.: „Aircraft ground service scheduling problems and their genetic algorithm with hybrid assignment and sequence encoding scheme‟, IEEE Syst. Journal, Vol No.7, Issue No 4, pp. 649–657, 2013,

Downloads

Published

2024-02-26

How to Cite

Srikanth, N., & Prasad, M. S. G. (2024). Green COMP based energy efficient data aggregation algorithm with malicious node identification (GEED-M) for lifetime improvement in WSN. COMPUSOFT: An International Journal of Advanced Computer Technology, 8(04), 3117–3125. Retrieved from https://ijact.in/index.php/j/article/view/490

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.