HHSRP: a cluster based hybrid hierarchical secure routing protocol for wireless sensor networks

Wireless sensor networks happen to be fundamentally networks with energy restrictions. This is limited over longer period of time proves to be the challenge in clustering algorithms. We suggested a new method related to co-ordinator head (CNH) selection by using a mixed hierarchical cluster based al...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Cluster computing Jg. 22; H. Suppl 5; S. 10449 - 10465
Hauptverfasser: Deepa, C., Latha, B.
Format: Journal Article
Sprache:Englisch
Veröffentlicht: New York Springer US 01.09.2019
Springer Nature B.V
Schlagworte:
ISSN:1386-7857, 1573-7543
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Wireless sensor networks happen to be fundamentally networks with energy restrictions. This is limited over longer period of time proves to be the challenge in clustering algorithms. We suggested a new method related to co-ordinator head (CNH) selection by using a mixed hierarchical cluster based algorithm that includes selecting the CNH happens to be the greatest value of the co-ordinator node (CN) and fitness value. This analysis put forward two different algorithms; mixed hierarchical cluster oriented routing program and hybrid hierarchical secure algorithm. A mixed hierarchal cluster based algorithm has been suggested for generating CNH and CN, for identifying the harmful node and packet is securely delivered. The source node transmits details about packet to the CN and then it chooses the pathway which is the shortest, depending upon the trust value among intermediate node and sensor node. The behavior activities of all the nodes are analyzed by the CNH, if anyone of the node’s behavior found to be incorrect, the organizer who finds the harmful node and CNH will drop those particular node behaviors. The CNH then changes to other path way immediately and transmits the delivery packet securely to the target destination under short time.
Bibliographie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1386-7857
1573-7543
DOI:10.1007/s10586-017-1065-3