Loading…

A HSEERP—Hierarchical secured energy efficient routing protocol for wireless sensor networks

Wireless Sensor networks are capable of creating any dynamic s–hort-term network with a group of sensor nodes without any previous centralized or infrastructure administration. Each node in the network has only alimited range of wireless transmission, and so it is essential fora node to transmit dat...

Full description

Saved in:
Bibliographic Details
Published in:Peer-to-peer networking and applications 2024, Vol.17 (1), p.163-175
Main Authors: D, Udaya Suriya Rajkumar, P, Shanmugaraja, Arunkumar, K, R, Sathiyaraj, P, Manivannan
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Wireless Sensor networks are capable of creating any dynamic s–hort-term network with a group of sensor nodes without any previous centralized or infrastructure administration. Each node in the network has only alimited range of wireless transmission, and so it is essential fora node to transmit data with the help of further nodes in the set of connections to its destination,generally the base station. The major problems perceived while designing the routing protocol in sensor networks, relates to the construction of an effect utilization device of the harshly restricted resources present in the network, especially the limited energy. The important factor to be considered in WSN from investigator relates to securing energy efficiency for useto the extent achievable. Existing routing protocol highlights only the extension of the duration of the network or just focusing protection mechanism with overwhelming large amountof energy. This paper introduces HSEERP (Hierarchical Secure and Energy EfficientRouting Protocol) forrouting protocol. It selects a best path among two nodes, to enable extension of the derivation of the chosen path of the network. It is also adequately resistive to a fewparticularthreats that comprise the attributes of getting entire traffic through the malicious nodes by advertising a gorgeous way to the destination. The implementation of present protocol was evaluatedand theresults showed the superiority of this proposed protocol to theprevious protocol techniques in terms of throughput 94%, energy efficiency 95%, malicious node detection 94%, time complexity is 64 ms, routing overhead is 31.3% and packet delivery ratio 95%for getting satisfactory duration of the network.
ISSN:1936-6442
1936-6450
DOI:10.1007/s12083-023-01575-w