Tytuł artykułu
Treść / Zawartość
Pełne teksty:
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
In this paper a highly robust and efficient systematic-random linear network coding (S-RLNC) routing scheme is proposed. Unlike classic security systems, the proposed S-RLNC transmission model incorporates an advanced pre-coding and interleaving concept followed by multigeneration mixing (MGM) based data transmission to assure secure and QoS efficient communication. The proposed S-RLNC MGM based routing scheme exhibits higher throughput (99.5-100%) than the existing NCC-ARQ-WSN protocol (80%). Unlike NCC-ARQ-WSN, the proposed model incorporates multiple enhancements, such as RLNC concept, systematic network coding, MGM concept, IBF provision and redundant packet optimization. Combined, all these optimizations have strengthened the proposed S-RLNC MGM to exhibit optimum performance for secure and QoS-centric communication over WSNs.
Rocznik
Tom
Strony
55--64
Opis fizyczny
Bibliogr. 24 poz., rys.
Twórcy
autor
- School of ECE, Reva University, Bangalore, India
autor
- School of ECE, Reva University, Bangalore, India
autor
- School of ECE, Reva University, Bangalore, India
Bibliografia
- [1] V. Patil, S. Gupta, and C. Keshavamurthy, „An enhanced network coding based mac optimization model for QoS oriented multicast transmission over LTE networks", Int. J. of Com. Science and Inform. Secur. (IJCSIS), paper ID 301116206, pp. 843-851, 2016 [Online]. Available: https://www.academia.edu/31261832/An_Enhanced_Network_Coding_Based_MAC_Optimization_Model_for_QoS_Oriented_Multicast_Transmission_Over_LTE_Networks
- [2] K. Dhote and G. M. Asutkar, „Optimization of routing techniques in wireless sensor network using queue management", in Proc. Devices for Integrated Circuit DevIC 2017, Kalyani, India, 2017, pp. 500-504 (doi: 10.1109/DEVIC.2017.8074000).
- [3] G. Kalnoor and J. Agarkhed, „QoS based multipath routing for intrusion detection of sinkhole attack in wireless sensor networks", in Proc. Int. Conf. on Circ., Power and Comput. Technol. ICCPCT 2016, Nagercoil, India, 2016 (doi: 10.1109/ICCPCT.2016.7530341).
- [4] A. Rachedi and A. Hasnaoui, „Security with Quality-of-Services optimization in Wireless Sensor Networks", in Proc. 9th Int. Wirel. Commun. and Mob. Compu. Conf. IWCMC 2013, Sardinia, Italy, 2013, pp. 1319-1324 (doi:10.1109/IWCMC.2013.6583747).
- [5] D. Qin et al., „Research on trust sensing based secure routing mechanism for wireless sensor network", IEEE Access, vol. 5, pp. 9599-9609, 2017 (doi: 10.1109/ACCESS.2017.2706973).
- [6] A. Alanazi and K. Elleithy, „Optimized Node Selection Process for quality of service provisioning over wireless multimedia sensor networks", in Proc. 2nd Int. Conf. on Mob. and Secure Serv. MobiSec-Serv 2016, Gainesville, FL, USA, 2016 (doi: 10.1109/MOBISECSERV.2016.7440227).
- [7] Q. Shi and Z. Li, „A secure QoS Routing Algorithm Based on ACO for Wireless Sensor Network", in Proc. IEEE 10th Int. Conf. on High Perform. Comput. and Commun. & IEEE Int. Conf. on Embedd. And Ubiquit. Comput., Zhangjiajie, China, 2013, pp. 1241-1245 (doi: 10.1109/HPCC.and.EUC.2013.176).
- [8] C. Deepa and B. Latha, „HHCS: Hybrid hierarchical cluster based secure routing protocol for Wireless Sensor Networks", in Proc. Int. Conf. on Inform. Commun. and Embedd. Sys. ICICES 2014, Chennai, India, 2014 (doi: 10.1109/ICICES.2014.7033805).
- [9] M. Malathi and S. Jayashri, „Design and performance of dynamic trust management for secure routing protocol", in Proc. IEEE Int. Conf. on Adv. in Comp. Appl. ICACA 2016, Coimbatore, India, 2016, pp. 121-124 (doi: 10.1109/ICACA.2016.7887935).
- [10] S. Zafar and M. K. Soni, „Trust based QOS protocol(TBQP) using meta-heuristic genetic algorithm for optimizing and securing MANET", in Proc. Int. Conf. on Reliabil. Optimiz. and Information Technol. ICROIT 2014, Faridabad, India, 2014, pp. 173-177 (doi: 10.1109/ICROIT.2014.6798315).
- [11] S. K. Bhoi and P. M. Khilar, „A secure routing protocol for Vehicular Ad Hoc Network to provide ITS services", in Proc. Int. Conf. on Commun. and Sig. Process., Melmaruvathur, India, 2013, pp. 1170-1174 (doi: 10.1109/iccsp.2013.6577240).
- [12] Z. Abolfazli and M. Mahdavi, „A homogeneous wireless sensor network routing algorithm: An energy aware cluster based approach", in Proc. 22nd Iranian Conf. on Elec. Engin. ICEE 2014, Tehran, Iran, 2014, pp. 1717-1722 (doi: 10.1109/IranianCEE.2014.6999815).
- [13] A. Tripathi, N. Yadav, and R. Dadhich, „Secure-SPIN with cluster for data centric wireless sensor networks", in Proc. 50th Int. Conf. on Adv. Compu. & Commun. Technol., Haryana, India, 2015, pp. 347-351 (doi: 10.1109/ACCT.2015.26).
- [14] S. Sedaghat, F. Adibniya, and V. Derhami, „A mechanism-based QoS and security requirements consideration for MANETs QoS routing", in Proc. 6th Int. Symp. on Telecommun. IST 2012, Tehran, Iran, 2012, pp. 1123-1128 (doi: 10.1109/ISTEL.2012.6483155).
- [15] J. Levendovszky and H. N. Thai, „Quality-of-Service routing protocol for Wireless Sensor Networks", J. of Inform. Technol. Softw. Engin., vol. 4, no. 2, 2015 (doi: 10.4172/2165-7866.1000133).
- [16] B. Lorenzo, I. Kovacevic, F. J. Gonzalez-Castano, and J. C. Burguillo, „Exploiting context-awareness for secure spectrum trading in multi-hop cognitive cellular networks", in Proc. IEEE Globecom Worksh. GC Wkshps 2015, San Diego, CA, USA, 2015 (doi: 10.1109/GLOCOMW.2015.7413995).
- [17] W. Gu, N. Dutta, S. Chellappan, and X. Bai, „Providing end-to-end secure communications in wireless sensor networks", IEEE Trans. on Netw. and Serv. Manag., vol. 8, no. 3, pp. 2015-218, 2011 (doi: 10.1109/TNSM.2011.072611.100080).
- [18] M. Roopak, T. Bhardwaj, S. Soni, and G. Batra, „Review of threats in Wireless Sensor Networks", Int. J. of Comp. Sci. and Inform. Technol. (IJCSIT), vol. 5, no. 1, pp. 25-31, 2014 [Online]. Available: http://ijcsit.com/docs/Volume 5/vol5issue01/ijcsit2014050106.pdf
- [19] K. Sharma, M. K. Ghose, and Kuldeep, „Complete security framework for ireless Sensor Networks", Int. J. of Comp. Sci. And Inform. Secur. (IJCSIS), vol. 3, no. 1, 2009 [Online]. Available: https://arxiv.org/ftp/arxiv/papers/0908/0908.0122.pdf
- [20] J. Rehana, „Security of Wireless Sensor Network", TKK T-110.5190 Seminar on Internetworking, 2009 [Online]. Available: http://www.cse.tkk._/en/publications/B/5/papers/Rehana_final.pdf
- [21] S. Jaggi et al., „Resilient network coding in the presence of Byzantine adversaries", in Proc. 26th IEEE Int. Conf. on Comp. Commun. INFOCOM 2007, Barcelona, Spain, 2007, pp. 616-624 (doi: 10.1109/INFOCOM.2007.78).
- [22] M. Halloush and H. Radha, „Network coding with multi-generation mixing: a generalized framework for practical network coding", IEEE Trans. on Wirel. Commun., vol. 10, no. 2, pp. 466-473, 2011 (doi: 10.1109/TWC.2011.120810.090280).
- [23] A. Antonopoulos and C. Verikoukis, „Network coding-based cooperative ARQ medium access control protocol for Wireless Sensor Networks", Int. J. of Distrib. Sensor Netw., vol. 8, no. 1, 2012 (doi: 10.1155/2012/601321).
- [24] B. Sun, Y. Song, C. Gui, and T. Zhang, „Performance of Network Coding Based Multipath Routing in Wireless Sensor Networks", Int. J. of Comp. Sci. (IJCSI), vol. 9, issue 6, no 2, pp. 182-187, 2012 [Online]. Available: https://pdfs.semanticscholar.org/ba24/0f1e5aed473b8641b987da440cf214ed532f.pdf
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2020).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-e444264f-0f6f-4b2e-8b76-19d61cbe49f1