A Novel Method for Enhancing the Network Lifetime using Energy-Efficient Routing Protocol Approach for Wireless IoT Sensor Network Applications

A Novel Method for Enhancing the Network Lifetime using Energy-Efficient Routing Protocol Approach for Wireless IoT Sensor Network Applications

© 2022 by IJETT Journal
Volume-70 Issue-11
Year of Publication : 2022
Authors : Battina Srinuvasu Kumar, S.G. Santhi, S. Narayana
DOI : 10.14445/22315381/IJETT-V70I11P230

How to Cite?

Battina Srinuvasu Kumar, S.G. Santhi, S. Narayana, "A Novel Method for Enhancing the Network Lifetime using Energy-Efficient Routing Protocol Approach for Wireless IoT Sensor Network Applications," International Journal of Engineering Trends and Technology, vol. 70, no. 11, pp. 277-287, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I11P230

The Internet of Things (IoT) profoundly impacts our daily lives, from tiny wearable gadgets to enormous industrial systems. As a result, a wide range of IoT applications has been designed and implemented utilizing several IoT frameworks. Rules, protocols, and standards that guide the development of IoT applications may be found in an IoT framework. The success of these applications is mostly dependent on the ecosystem features of the IoT framework, with the primary focus being placed on the security procedures that are incorporated into the framework. It is because concerns about security and privacy are of the utmost importance. End-to-End encryption is not being ensured during data transfer in IoT due to several issues. Cyberattacks are easier to launch since most IoT devices utilize default login credentials and are not correctly configured or protocoled. In order to maintain high levels of security, not all IoT devices can be equipped with the latest security measures. On the other hand, the rising interconnectedness of common things might provide hackers with a bunch of new attack routes. Low-cost IoT devices have a wide range of capabilities and resources, making it challenging to deploy traditional perimeter defenses in a dynamic IoT environment. The authors of this research considered all of this while creating a routing method for wireless IoT sensor networks that is simple yet efficient in terms of energy consumption. This article uses an optimization problem to simulate the energy constraint problem of IoT devices. The suggested protocol uses clustering, cluster head election, and computing the least energy-expensive path to provide efficient and real-time Routing. This helps reduce the amount of power wasted by individual devices. Communication intent among transmitter and receiver devices is characterized using a route computation equation. The clustering algorithm's characteristics have been chosen to maximize energy conservation efforts. In addition, this article employs an evolutionary sleep scheduling approach that may be utilized to enhance network performance further. Particle Swarm Optimization (PSO) and Genetic Algorithm (G.A.) are combined in this method (G.A.). As a result of these simulations, the proposed routing protocol was compared to two current routing protocols on metrics, including the number of active nodes and energy dynamics. According to the simulation findings, the suggested protocol beats both LEACH and FCM in terms of performance.

IoT security, routing protocol, network applications, cyberattacks, energy efficiency, network lifetime.

[1] Sadrishojaei M, Jafari Navimipour N, Reshadi M, et al., “An Energy-Aware Clustering Method in the Iot Using a Swarm-Based Algorithm,” Wireless Network, vol. 28, pp. 125–136, 2022. Crossref, https://doi.org/10.1007/s11276-021-02804-x
[2] Xiao N, et al., “A Diversity-Based Selfish Node Detection Algorithm for Socially Aware Networking,” Journal of Signal Processing Systems, vol. 93, pp. 811–825, 2021.
[3] Lv Z, Qiao L, Li J, & Song H, “Deep-Learning-Enabled Security Issues in the Internet of Things,” IEEE Internet of Things Journal, vol. 8, no. 12, pp. 9531–9538, 2020. Crossref, https://doi.org/10.1109/JIOT.2020.3007130
[4] Lv Z, Lou R, Li J, Singh A. K, & Song H, “Big Data Analytics for 6G-Enabled Massive Internet of Things,” IEEE Internet of Things Journal, vol. 8, no. 7, pp. 5350–5359, 2021. Crossref, https://doi.org/10.1109/JIOT.2021.3056128
[5] Sohaib A. Latif, Fang B. Xian Wen, Celestine Iwendi, Li-li F. Wang, Syed Muhammad Mohsin, Zhaoyang Han, and Shahab S. Band, “AI-Empowered, Blockchain and SDN Integrated Security Architecture for Iot Network of Cyber Physical Systems,” Computer Communications, vol. 181, pp. 274-283, 2022. Crossref, https://doi.org/10.1016/j.comcom.2021.09.029
[6] J. Agarkhed, V. Kadrolli and S.R. Patil, “Efficient Bandwidth-Aware Routing Protocol in Wireless Sensor Networks (EBARP),” International Journal of Information Technology, vol. 14, pp. 1967–1979, 2022. Crossref, https://doi.org/10.1007/s41870-021-00828-2
[7] Z. Yiming, L. Mandan and L. Qingwei, “An Energy Balanced Clustering Protocol Based on an Improved CFSFDP Algorithm for Wireless Sensor Networks,” Sensors, vol. 18, no. 3, pp. 881, 2018. Crossref, https://doi.org/10.3390/s18030881
[8] A. A. Baradaran and K. Navi, “HQCA WSN: High Quality Clustering Algorithm and Optimal Cluster Head Selection Using Fuzzy Logic in Wireless Sensor Networks,” Fuzzy Sets and System, vol. 389, pp. 114-144, 2020. Crossref, https://doi.org/10.1016/j.fss.2019.11.015
[9] X. Yuan, M. Elhoseny, H. K. El Minir and A. M. Riad, “A Genetic Algorithm Based Dynamic Clustering Method Towards Improved WSN Longevity,” Journal of Network and Systems Management, vol. 25, pp. 21-46, 2017. Crossref, https://doi.org/10.1007/s10922-016-9379-7
[10] M. O. Oladimeji, M. Turkey and S. Dudley, “HACH: Heuristic Algorithm for Clustering Hierarchy Protocol in Wireless Sensor Networks,” Applied Soft Computing, vol. 55, pp. 452-461, 2017. Crossref, https://doi.org/10.1016/j.asoc.2017.02.016
[11] B. Singh and D. K. Lobiyal, “Energy Preserving Sleep Scheduling for Cluster-Based Wireless Sensor Networks,” 2013 Sixth International Conference Contemporary Computing (IC3), Noida, India, pp. 97–101, 2013. Crossref, https://doi.org/10.1109/IC3.2013.6612169
[12] F. Adelantado, X. Vilajosana, P. Tuset-Peiro, B. Martinez, J. MeliaSegui, and T. Watteyne, "Understanding the Limits of Lorawan," IEEE Communications Magazine, vol. 55, no. 9, pp. 34-40, 2017. Crossref, https://doi.org/10.1109/MCOM.2017.1600613
[13] LoRa Alliance, “LoRaWAN Specification V1.1,” LoRa Alliance, 2017.
[14] B. Reynders, W. Meert, and S. Pollin, “Power and Spreading Factor Control in Low Power Wide Area Networks,” IEEE ICC 2017 SAC Symposium Internet of Things Track (ICC'17 SAC-7 IoT), pp. 1-5, 2017. Crossref, https://doi.org/10.1109/ICC.2017.7996380
[15] Kh. Abdelfadeel, V. Cionca and D. Pesch, “Fair Adaptive Data Rate Allocation and Power Control in LoRaWAN," IEEE 19th International Symposium on A World of Wireless, Mobile and Multimedia Networks, 2018. Crossref, https://doi.org/10.1109/WoWMoM.2018.8449737
[16] V. Hauser and T. Hgr, “Proposal of Adaptive Data Rate Algorithm for Lorawan-Based Infrastructure,” IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud), pp. 85-90, 2017. Crossref, https://doi.org/10.1109/FiCloud.2017.47
[17] M. Slabicki, G. Premsankar, and M. D. Francesco, “Adaptive Configuration of Lora Networks for Dense Iot Deployments,” IEEE/IFIP Network Operations and Management Symposium, 2018. Crossref, https://doi.org/10.1109/NOMS.2018.8406255
[18] C. Srinivasan, B. Rajesh, P. Saikalyan, K. Premsagar and ES. Yadav, “A Review on the Different Types of Internet of Things (IoT),” Journal of Advanced Research in Dynamical and Control Systems, vol. 11, no. 1, pp. 154-158, 2019.
[19] MA. Al-Garadi, A. Mohamed, A. Al-Ali, X. Du, I. Ali and M. Guizani, “A Survey of Machine and Deep Learning Methods for Internet of Things (Iot) Security,” IEEE Communications Surveys & Tutorials, vol. 22, no. 3, 2020. Crossref, https://doi.org/10.1109/COMST.2020.2988293
[20] K. Haseeb, N. Islam, T. Saba, A. Rehman and Z. Mehmood, “LSDAR: A Lightweight Structure based Data Aggregation Routing Protocol with Secure Internet of Things Integrated Next-Generation Sensor Networks,” Sustainable Cities and Society, vol. 54, pp. 101995, 2020. Crossref, https://doi.org/10.1016/j.scs.2019.101995
[21] S. Vadivelu and P. Suresh Babu, “Survival Study on Energy and Bandwidth Efficient Data Transmission in Wireless Networks,” SSRG International Journal of Computer Science and Engineering, vol. 9, no. 8, pp. 1-6, 2022. Crossref, https://doi.org/10.14445/23488387/IJCSE-V9I8P101
[22] K. Haseeb, N. Islam, A. Almogren and Din IU, “Intrusion Prevention Framework for Secure Routing in WSN-Based Mobile Internet of Things,” IEEE Access, vol. 7, pp. 185496-185505, 2019. Crossref, https://doi.org/10.1109/ACCESS.2019.2960633
[23] G. Prabaharan and S. Jayashri, “Mobile Cluster Head Selection Using Soft Computing Technique in Wireless Sensor Network,” Soft Computing, vol. 23, no. 1, pp. 8525-8238, 2019. Crossref, https://doi.org/10.1007/s00500-019-04133-w
[24] F. Zawaideh and M. Salamah, “An Efficient Weighted Trust-Based Malicious Node Detection Scheme for Wireless Sensor Networks,” International Journal of Communication Systems, vol. 32, no. 3, pp. e3878, 2019. Crossref, https://doi.org/10.1002/dac.3878
[25] K. Haseeb, A. Almogren, N. Islam, I. Ud Din and Z. Jan, “An Energy-Efficient and Secure Routing Protocol for Intrusion Avoidance in Iot-Based WSN,” Energies, vol. 12, no. 21, pp. 4174, 2019. Crossref, https://doi.org/10.3390/en12214174
[26] W. She, Q. Liu, Z. Tian, J-S. Chen, B. Wang and W. Liu, “Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks,” IEEE Access, vol. 7, pp. 38947-38956, 2019. Crossref, https://doi.org/10.1109/ACCESS.2019.2902811
[27] M. Jamshidi, SSA. Poor, A. Arghavani, M. Esnaashari, AA. Shaltooki and MR. Meybodi, “A Simple, Lightweight, and Precise Algorithm to Defend Against Replica Node Attacks in Mobile Wireless Networks Using Neighboring Information,” Ad Hoc Networks, vol. 100, pp. 102081, 2020. Crossref, https://doi.org/10.1016/j.adhoc.2020.102081
[28] NA. Khalid, Q. Bai and A. Al-Anbuky, “Adaptive Trust-Based Routing Protocol for Large Scale WSNs,” IEEE Access, vol. 7, pp. 143539–143549, 2019. Crossref, https://doi.org/10.1109/ACCESS.2019.2944648
[29] LB. Oliveira LB, A. Ferreira, MA. Vilaça, HC. Wong, M. Bern, R. Dahab and AA. Loureiro, “SecLEACH—on the Security of Clustered Sensor Networks,” Signal Processing, vol. 87, no. 12, pp. 2882-2895, 2007. Crossref, https://doi.org/10.1016/j.sigpro.2007.05.016
[30] SH. Alsamhi, O. Ma, MS. Ansari and Q. Meng, “Greening Internet of Things for Greener and Smarter Cities: A Survey and Future Prospects,” Telecommunication Systems, vol. 72, pp. 609-632, 2019. Crossref, https://doi.org/10.1007/s11235-019-00597-1
[31] V. Subbarao, K. Srinivas and R. Pavithr, “A Survey on Internet of Things Based Smart, Digital Green and Intelligent Campus,” 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), IEEE, 2019. Crossref, https://doi.org/10.1109/IoT-SIU.2019.8777476
[32] K. Latif, A. Ahmad, N. Javaid, ZA. Khan and N. Alrajeh, “Divide-and-Rule Scheme for Energy Efficient Routing in Wireless Sensor Networks,” Procedia Computer Science, vol. 19, pp. 340-347, 2013. Crossref, https://doi.org/10.1016/j.procs.2013.06.047
[33] V. Saranya, S. Shankar and G. Kanagachidambaresan, “Energy Efficient Clustering Scheme (EECS) for Wireless Sensor Network With Mobile Sink,” Wireless Personal Communications, vol. 100, pp. 1553-1567, 2018. Crossref, https://doi.org/10.1007/s11277-018-5653-1
[34] V. Saranya, S. Shankar and G. Kanagachidambaresan, “Energy Efficient Data Collection Algorithm for Mobile Wireless Sensor Network,” Wireless Personal Communications, vol. 105, pp. 219-232, 2019. Crossref, https://doi.org/10.1007/s11277-018-6109-3
[35] T. Wang, G. Zhang, A. Liu, MZA. Bhuiyan and Q. Jin, “A Secure Iot Service Architecture with an Efficient Balance Dynamic Based on Cloud and Edge Computing,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4831-4843, 2019. Crossref, https://doi.org/10.1109/JIOT.2018.2870288
[36] A. Yousefpour, A. Patil, G. Ishigaki, I. Kim, X. Wang, HC. Cankaya, Q. Zhang, W. Xie and JP. Jue, “FogPlan: A Lightweight Qos-Aware Dynamic Fog Service Provisioning Framework,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 5080-5096, 2019. Crossref, https://doi.org/10.1109/JIOT.2019.2896311
[37] B. Kim and J. Song, “Energy-Efficient and Secure Mobile Node Reauthentication Scheme for Mobile Wireless Sensor Networks,” EURASIP Journal on Wireless Communications and Networking, pp. 155, 2019. Crossref, https://doi.org/10.1186/s13638-019-1470-9
[38] J. Tan, W. Liu, T. Wang, NN. Xiong, H. Song, A. Liu and Z. Zeng, “An Adaptive Collection Scheme-Based Matrix Completion for Data Gathering in Energy-Harvesting Wireless Sensor Networks,” IEEE Access, vol. 7, pp. 6703-6723, 2019. Crossref, https://doi.org/10.1109/ACCESS.2019.2890862
[39] K. Thangaramya, K. Kulothungan, R. Logambigai, M. Selvi, S. Ganapathy and A. Kannan, “Energy Aware Cluster and Neuro-Fuzzy Based Routing Algorithm for Wireless Sensor Networks in IoT,” Computer Networks, vol. 151, pp. 211-223, 2019. https://doi.org/10.1016/j.comnet.2019.01.024
[40] M. Elhoseny and AE. Hassanien, “Expand Mobile WSN Coverage in Harsh Environments, in “Dynamic Wireless Sensor Networks, Springer, pp. 29-52, 2019. https://doi.org/10.1007/978-3-319-92807-4_2