Optimized Load Centroid and Rabin Onion Secured Routing in Wireless Sensor Network for IoT

α
Renuka Mohanraj
Renuka Mohanraj Associate Professor, Ph.D., M.Phil., & B.Sc. in Computer Science, Master of Computer Application, Maharishi International University, United States
α Maharishi International University Maharishi International University

Send Message

To: Author

Optimized Load Centroid and Rabin Onion Secured Routing in Wireless Sensor Network  for IoT

Article Fingerprint

ReserarchID

CSTNWSIZIW9

Optimized Load Centroid and Rabin Onion Secured Routing in Wireless Sensor Network  for IoT Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Advances in wireless communication have geared up extensive insights wherein the sensors can themselves communicate with other sensors that form significant parts of the Internet of Things (IoT). However, the large-scale acceptance of WSN for IoT is still surfacing threats and controversies that apprehend the security aspects. There are a lot of attacks that can manipulate the routein WSN for IoT. In this work, an Optimized Load Centroid and Rabin Onion Routing (OLC-ROR) method are designed to improve the throughput rate with minimum routing overhead and latency. The proposed method is based on a Centroid and Rabin Signature, a Digital Signature technique. First, the optimal route is identified by considering both the load and residual energy using Load Centroid function. Then onion routing is used for selecting secured route amongst the optimality. Besides, the node genuineness is checked by applying the Rabin Signature.

References

21 Cites in Article
  1. Yu He,Guangjie Han,Hao Wang,James Adu Ansere,Whenbo Zhang (2020). A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things.
  2. (2019). Global Journals Optimized Load Centroid and Rabin Onion Secured Routing in Wireless Sensor Network for IoT Generation Computer Systems.
  3. Catalina Aranzazu-Suescun,Mihaela Cardei (2019). Anchor-based routing protocol with dynamic clustering for Internet of Things WSNs.
  4. Hao Wang,Guangjie Han,Lina Zhou,James Adu Ansere,Wenbo Zhang (2018). A Source Location Privacy Protection Scheme Based on Ring-loop Routing for the IoT.
  5. Arezou Ostad-Sharif,Hamed Arshad,Morteza Nikooghadam,Dariush Abbasinezhad-Mood (2019). Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme.
  6. Ilhem Souissi,Nadia Ben Azzouna,Lamjed Ben Said (2019). A multi-level study of information trust models in WSN-assisted IoT.
  7. Jai Kumar Vinayagam,C Balaswamy,K Soundararajan (2019). Cross-layered-based adaptive secured routing and data transmission in MANET.
  8. Hongsong Chen,Caixia Meng,Zhiguang Shan,Zhongchuan Fu,Bharat Bhargava (2019). A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation.
  9. Krishnashree Shiju Sathyadevan,Robin Achuthan,Doss,Pan Lei (2019). Protean Authentication Scheme A Time-Bound Dynamic Key Gen Authentication Technique for IoT Edge Nodes in Outdoor Deployments.
  10. Turki Ali,Alghamdi (2019). Convolutional technique for enhancing security in wireless sensor networks against malicious nodes.
  11. Ismail Butun,Patrik Osterberg,Houbing Song (2019). Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures.
  12. Yaw-Wen Kuo,Cho-Long Li,Jheng-Han Jhang,Sam Lin (2018). Design of a wireless sensor network based IoTplatform for wide area and hetero generous applications.
  13. D Geetha,N Devanagavi,Rajashekhar Nalini,Biradar (2014). Secured routing in wireless sensor networks using fault-free and trusted nodes.
  14. Ming Luo,Yi Luo,Yuwei Wan,Ze Wang (2018). Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT.
  15. B Deebak,Fadi Al-Turjman (2019). A Hybrid Secure Routing and Monitoring Mechanism in IoT-based Wireless Sensor Networks.
  16. Travis Mick,Reza Tourani,Satyajayant Misra (2018). LASeR: Lightweight Authentication and Secured Routing for NDN IoT in Smart Cities.
  17. Khalid Haseeb,Naveed Islam,Ahmad Almogren,Ikram Ud Din,N Hisham,Nadra Almajed,Guizani (2019). Secret Sharing-Based Energy-Aware and Multi-Hop Routing Protocol for IoT Based WSNs.
  18. Catalina Aranzazu,Suescun,Mihaela Cardei (2019). Anchor-based routing protocol withdynamic clustering for Internet of Things WSNs.
  19. Imad Jawhar,Nader Mohamed,Jameela Al-Jaroodi (2018). Networking architectures and protocols for smart city systems.
  20. Ramesh Sekaran,Ganesh Parasuraman (2014). A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks.
  21. Songxiang Yang,Lin Ma,Shuang Jia,Danyang Qin (2019). A Novel Markov Model-Based Low-Power and Secure Multihop Routing Mechanism.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Renuka Mohanraj. 2020. \u201cOptimized Load Centroid and Rabin Onion Secured Routing in Wireless Sensor Network for IoT\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 20 (GJCST Volume 20 Issue E2): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-E Classification: C.2.1
Version of record

v1.2

Issue date

July 13, 2020

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 4581
Total Downloads: 1150
2026 Trends
Related Research

Published Article

Advances in wireless communication have geared up extensive insights wherein the sensors can themselves communicate with other sensors that form significant parts of the Internet of Things (IoT). However, the large-scale acceptance of WSN for IoT is still surfacing threats and controversies that apprehend the security aspects. There are a lot of attacks that can manipulate the routein WSN for IoT. In this work, an Optimized Load Centroid and Rabin Onion Routing (OLC-ROR) method are designed to improve the throughput rate with minimum routing overhead and latency. The proposed method is based on a Centroid and Rabin Signature, a Digital Signature technique. First, the optimal route is identified by considering both the load and residual energy using Load Centroid function. Then onion routing is used for selecting secured route amongst the optimality. Besides, the node genuineness is checked by applying the Rabin Signature.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Optimized Load Centroid and Rabin Onion Secured Routing in Wireless Sensor Network for IoT

Renuka Mohanraj
Renuka Mohanraj Maharishi International University

Research Journals