Loading…
A HSEERP—Hierarchical secured energy efficient routing protocol for wireless sensor networks
Wireless Sensor networks are capable of creating any dynamic s–hort-term network with a group of sensor nodes without any previous centralized or infrastructure administration. Each node in the network has only alimited range of wireless transmission, and so it is essential fora node to transmit dat...
Saved in:
Published in: | Peer-to-peer networking and applications 2024, Vol.17 (1), p.163-175 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Wireless Sensor networks are capable of creating any dynamic s–hort-term network with a group of sensor nodes without any previous centralized or infrastructure administration. Each node in the network has only alimited range of wireless transmission, and so it is essential fora node to transmit data with the help of further nodes in the set of connections to its destination,generally the base station. The major problems perceived while designing the routing protocol in sensor networks, relates to the construction of an effect utilization device of the harshly restricted resources present in the network, especially the limited energy. The important factor to be considered in WSN from investigator relates to securing energy efficiency for useto the extent achievable. Existing routing protocol highlights only the extension of the duration of the network or just focusing protection mechanism with overwhelming large amountof energy. This paper introduces HSEERP (Hierarchical Secure and Energy EfficientRouting Protocol) forrouting protocol. It selects a best path among two nodes, to enable extension of the derivation of the chosen path of the network. It is also adequately resistive to a fewparticularthreats that comprise the attributes of getting entire traffic through the malicious nodes by advertising a gorgeous way to the destination. The implementation of present protocol was evaluatedand theresults showed the superiority of this proposed protocol to theprevious protocol techniques in terms of throughput 94%, energy efficiency 95%, malicious node detection 94%, time complexity is 64 ms, routing overhead is 31.3% and packet delivery ratio 95%for getting satisfactory duration of the network. |
---|---|
ISSN: | 1936-6442 1936-6450 |
DOI: | 10.1007/s12083-023-01575-w |