Secure Routing with Improved Medium Access Control (SRI-MAC) Protocol for Wireless Sensor Network using Particle Swarm Optimization

A set of wireless sensor nodes comprises to form a sensor field called Wireless Sensor Networks (WSN).The main purpose of using the sensor node is to collect information from the ambience process it and send to a common gateway interface called Base Station(BS). The major problems that we face while...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of engineering and advanced technology Vol. 8; no. 5s3; pp. 145 - 150
Main Authors Tamilarasi, N., Santhi, S.G.
Format Journal Article
LanguageEnglish
Published 14.09.2019
Online AccessGet full text

Cover

Loading…
More Information
Summary:A set of wireless sensor nodes comprises to form a sensor field called Wireless Sensor Networks (WSN).The main purpose of using the sensor node is to collect information from the ambience process it and send to a common gateway interface called Base Station(BS). The major problems that we face while using WSN are limited battery power, bandwidth, security issues and transmission delay etc. Many algorithms and protocols were developed in order to solve the above issues. Therefore, better solutions are required to face the improvements and challenges in the current technologies. In WSN, the sensor node highly loses its energy during communication period. One of the major issues of Medium Access Control (MAC) layer is collision. Collision increases the energy consumption and delay of the sensor node. So we have to conserve the energy of the sensor node in order to extend the lifetime of the network. At the same time it is also important to transmit the data through secure path and identify the malicious node. In this paper, we propose a novelty approach called Secure Routing with Improved Medium Access control (SRI –MAC) Protocol to solve the issues. SRI-MAC identifies packet precedence sets using Fuzzy Implication System (FIS) to avoid packet collision in MAC layer and also it detects wormhole attacks and selects secure path among k-paths using Particle Swarm Optimization (PSO) algorithm. By simulation results, we show that the proposed approach is efficient in terms of energy consumption and secure routing.
ISSN:2249-8958
2249-8958
DOI:10.35940/ijeat.E1035.0785S319