SSEGR: Secure Single-Copy Energy Efficient Geographical Routing Algorithm in Wireless Sensor Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Geographical Routing Technique is a new trend in Wireless Sensor Networks in which the sensor nodes are enabled using Global Positioning Systems (GPS). This helps to easily detect the position of their neighboring nodes. The power consumption is more in the existing routing algorithms, since the nodes build the routing tables and the neighboring node IDs are determined by searching the routing table. In this paper, we have proposed Secure Single-Copy Energy Efficient Geographical Routing (SSEGR) algorithm in which the data traffic and energy consumption is minimized using single copy data transfer. In SSEGR, initially one copy is transmitted to the next node using greedy approach and another copy is preserved in the sending station. If acknowledgment is not received even after timeout then the second copy is transmitted. This dynamic single copy scheme reduces the data traffic in Wireless Sensor Networks. Security algorithms are incorporated in every sensor node to prevent any malicious node attack that disturb the normal functioning of the network. Simulation result shows that the performance of the proposed algorithm is better interms of packet delivery probability and energy consumption in comparision with existing algorithms.
Authors and Affiliations
Lata B T, Raghavendra M, Shaila K, Venugopal K R , Tejaswi V , S S Iyengar , L M Patnaik
Enhancement in Elimination of Security Threads using Trusted Proactive Routing
Ad hoc networks have been used in many applications which mandate a dynamic setup in the absence of fixed infrastructure. The design of ad hoc network has been mainly focuses on proper operation. It is possible t...
Bandwidth Aware vm Migration Policy in Cloud Data Centers
Abstract: with the advent of Cloud Computing and its tremendous use, Efficient VM migration using task scheduling has become an important issue that affect the performance of Cloud. Designing and implementing .an effecti...
A Self-Organizing Cooperation for Autonomous Agents Based onImmune Network
Abstract: In order to solve the cooperation of autonomous agent systems,an artificial immune networkcooperation algorithm is proposed,which is based on Jerne’s idiotypic immune network hypothesis. A sheepdogherdi...
An Approach to Identify Dishonest Nodes Using MAC Protocol inMultihop Cellular Networks
Abstract: In mobility based networks, the mobile nodes usually relay on other node packets rather than theirown rightful packet for enhancing network performance. It happens due to the availability of some selfish...
SQL Injection Prevention by Adaptive Algorithm
Abstract: An SQL Injection is one of the most dangerous security issues. SQL injections are dangerous becausethey are a door wide open to hackers to enter your system through your Web interface and to do whatever t...