DOI QR코드

DOI QR Code

GRID BASED ENERGY EFFICIENT AND SECURED DATA TRANSACTION FOR CLOUD ASSISTED WSN-IOT

  • L., SASIREGA (Department of Computer Science, Vels Institute of Science, Technology and Advanced Studies) ;
  • C., SHANTHI (Department of Computer Science, Vels Institute of Science, Technology and Advanced Studies)
  • Received : 2022.02.03
  • Accepted : 2022.10.12
  • Published : 2023.01.30

Abstract

To make the network energy efficient and to protect the network from malignant user's energy efficient grid based secret key sharing scheme is proposed. The cost function is evaluated to select the optimal nodes for carrying out the data transaction process. The network is split into equal number of grids and each grid is placed with certain number of nodes. The node cost function is estimated for all the nodes present in the network. Once the optimal energy proficient nodes are selected then the data transaction process is carried out in a secured way using malicious nodes filtration process. Therefore, the message is transmitted in a secret sharing method to the end user and this process makes the network more efficient. The proposed work is evaluated in network simulated and the performance of the work are analysed in terms of energy, delay, packet delivery ratio, and false detection ratio. From the result, we observed that the work outperforms the other works and achieves better energy and reduced packet rate.

Keywords

Acknowledgement

Authors are greatfully acknowledge the research supports received from Vels University, Chennai-600117, India.

References

  1. A.A. Anasane, & R.A. Satao, A survey on various multipath routing protocols in wireless sensor networks, Procedia Computer Science 79 (2016), 610-615.  https://doi.org/10.1016/j.procs.2016.03.077
  2. T. Qiu, X. Liu, L. Feng, Y. Zhou, & K. Zheng, An efficient tree-based self-organizing protocol for internet of things, Ieee Access 4 (2016), 3535-3546.  https://doi.org/10.1109/ACCESS.2016.2578298
  3. T. Qiu, Y. Lv, F. Xia, N. Chen, J. Wan, & A. Tolba, ERGID: An efficient routing protocol for emergency response Internet of Things, Journal of Network and Computer Applications 72 (2016), 104-112.  https://doi.org/10.1016/j.jnca.2016.06.009
  4. S. Pundir, M. Wazid, D.P. Singh, A.K. Das, J.J. Rodrigues, & Y. Park, Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: Survey and future challenges, IEEE Access 8 (2019), 3343-3363.  https://doi.org/10.1109/access.2019.2962829
  5. W.H. Hassan, Current research on Internet of Things (IoT) security: A survey, Computer networks 148 (2019), 283-294.  https://doi.org/10.1016/j.comnet.2018.11.025
  6. S.K. Lee, M. Bae, & H. Kim, Future of IoT networks: A survey, Applied Sciences, 7 (2017), 1072. 
  7. C. Stergiou, K.E. Psannis, B.G. Kim, & B. Gupta, Secure integration of IoT and cloud computing, Future Generation Computer Systems 78 (2018), 964-975.  https://doi.org/10.1016/j.future.2016.11.031
  8. V.B. Reddy, A. Negi, & S. Venkataraman, Trust computation model using hysteresis curve for wireless sensor networks, In 2018 IEEE SENSORS, 2018, 1-4. 
  9. A. Ahmed, K.A. Bakar, M.I. Channa, K. Haseeb, & A.W. Khan, TERP: A trust and energy aware routing protocol for wireless sensor network, IEEE Sensors Journal 15 (2015), 6962-6972.  https://doi.org/10.1109/JSEN.2015.2468576
  10. X. Wu, J. Huang, J. Ling, & L. Shu, BLTM: beta and LQI based trust model for wireless sensor networks, IEEE Access 7 (2019), 43679-43690.  https://doi.org/10.1109/access.2019.2905550
  11. M. Shen, B. Ma, L. Zhu, R. Mijumbi, X. Du, & J. Hu, Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection, IEEE Transactions on Information Forensics and Security 13 (2017), 940-953.  https://doi.org/10.1109/tifs.2017.2774451
  12. S. Yao, Z. Li, J. Guan, & Y. Liu, Stochastic cost minimization mechanism based on identifier network for IoT security, IEEE Internet of Things Journal 7 (2019), 3923-3934.  https://doi.org/10.1109/jiot.2019.2961839
  13. S. Singh, & J. Sidhu, Compliance-based multi-dimensional trust evaluation system for determining trustworthiness of cloud service providers, Future Generation Computer Systems 67 (2017), 109-132.  https://doi.org/10.1016/j.future.2016.07.013
  14. N. Somu, G.R. MR, K. Kirthivasan, & S.S. VS, A trust centric optimal service ranking approach for cloud service selection, Future Generation Computer Systems 86 (2018), 234-252.  https://doi.org/10.1016/j.future.2018.04.033
  15. X. Li, Q. Wang, X. Lan, X. Chen, N. Zhang, & D. Chen, Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach, IEEE Access 7 (2019), 9368-9383.  https://doi.org/10.1109/access.2018.2890432
  16. S. Siadat, A.M. Rahmani, & H. Navid, Identifying fake feedback in cloud trust management systems using feedback evaluation component and Bayesian game model, The Journal of Supercomputing 73 (2017), 2682-2704.  https://doi.org/10.1007/s11227-016-1950-1
  17. Huang, Longtao, Shuiguang Deng, Ying Li, Jian Wu, Jianwei Yin, and Gexin Li, A trust evaluation mechanism for collaboration of data-intensive services in cloud, Applied Mathematics & Information Sciences 7 (2013), 121-129.  https://doi.org/10.12785/amis/071L18
  18. Yasir Mehmoo, Ammar Oad, Muhammad Abrar et al., Edge Computing for IoT-Enabled Smart Grid.Security and communication networks, Hindawi 2021. 
  19. Khan, Lalith, Devi, Rajalakshmi, A multi-attribute based trusted routing for embedded devices in MANET-IoT, Microprocessor and Microsystems, 2022. https://doi.org/10.1016/j.micpro.2022.104446