IDEAS home Printed from https://ideas.repec.org/a/gam/jeners/v12y2019i21p4174-d282548.html
   My bibliography  Save this article

An Energy-Efficient and Secure Routing Protocol for Intrusion Avoidance in IoT-Based WSN

Author

Listed:
  • Khalid Haseeb

    (Islamia College Peshawar, Peshawar 25000, Pakistan)

  • Ahmad Almogren

    (Chair of Cyber Security, Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia)

  • Naveed Islam

    (Islamia College Peshawar, Peshawar 25000, Pakistan)

  • Ikram Ud Din

    (Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan)

  • Zahoor Jan

    (Islamia College Peshawar, Peshawar 25000, Pakistan)

Abstract

Due to the advancement of information and communication technologies, the use of Internet of Things (IoT) devices has increased exponentially. In the development of IoT, wireless sensor networks (WSNs) perform a vital part and comprises of low-cost smart devices for information gathering. However, such smart devices have constraints in terms of computation, processing, memory and energy resources. Along with such constraints, one of the fundamental challenges for WSN is to achieve reliability with the security of transmitted data in a vulnerable environment against malicious nodes. This paper aims to develop an energy-efficient and secure routing protocol (ESR) for intrusion avoidance in IoT based on WSN to increase the network period and data trustworthiness. Firstly, the proposed protocol creates different energy-efficient clusters based on the intrinsic qualities of nodes. Secondly, based on the ( k,n ) threshold-based Shamir secret sharing scheme, the reliability and security of the sensory information among the base station (BS) and cluster head are achieved. The proposed security scheme presents a light-weight solution to cope with intrusions generated by malicious nodes. The experimental results using the network simulator (NS-2) demonstrate that the proposed routing protocol achieved improvement in terms of network lifetime as 37%, average end-to-end delay as 24%, packet delivery ratio as 30%, average communication cost as 29%, network overhead as 28% and the frequency of route re-discoveries as 38% when compared with the existing work under dynamic network topologies.

Suggested Citation

  • Khalid Haseeb & Ahmad Almogren & Naveed Islam & Ikram Ud Din & Zahoor Jan, 2019. "An Energy-Efficient and Secure Routing Protocol for Intrusion Avoidance in IoT-Based WSN," Energies, MDPI, vol. 12(21), pages 1-18, November.
  • Handle: RePEc:gam:jeners:v:12:y:2019:i:21:p:4174-:d:282548
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1996-1073/12/21/4174/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1996-1073/12/21/4174/
    Download Restriction: no
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Regonda Nagaraju & Venkatesan C & Kalaivani J & Manju G & S. B. Goyal & Chaman Verma & Calin Ovidiu Safirescu & Traian Candin Mihaltan, 2022. "Secure Routing-Based Energy Optimization for IoT Application with Heterogeneous Wireless Sensor Networks," Energies, MDPI, vol. 15(13), pages 1-16, June.
    2. Naser Hossein Motlagh & Mahsa Mohammadrezaei & Julian Hunt & Behnam Zakeri, 2020. "Internet of Things (IoT) and the Energy Sector," Energies, MDPI, vol. 13(2), pages 1-27, January.
    3. Michaelraj Kingston Roberts & Poonkodi Ramasamy, 2023. "An improved high performance clustering based routing protocol for wireless sensor networks in IoT," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 82(1), pages 45-59, January.
    4. Vinay Rishiwal & Preeti Yadav & Omkar Singh & B. G. Prasad, 2021. "Optimizing Energy Consumption in IoT-Based Scalable Wireless Sensor Networks," International Journal of System Dynamics Applications (IJSDA), IGI Global, vol. 10(4), pages 1-20, October.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:12:y:2019:i:21:p:4174-:d:282548. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.