SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 36
SE2R2: Secure Energy Efficient and Reliable Routing Protocol in
Presence of Phishing Attacks for WSNs
Shishir Mathew1, Mamatha Jadav V2
1Dept. of Computer Science and Engineering, MSRIT, Bangalore, Karnataka, India
2Asst. Professor, Dept. of Computer Science and Engineering, MSRIT, Bangalore, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Phishing is a form of social engineering. It is an
attempt to acquire or steal sensitive information such as
usernames, passwords and other sensitive information for
malicious reasons. In wireless sensor networks(WSNs), the
sensor nodes are durable, economical and are designed to be
disposed. Energy is limited for wireless sensor networks and
has to be managed optimally. Data delivery at the base
station(BS) is expected to be reliable. Efficient energy of any
application of WSNs is important. Routing in WSNs is very
important. Therefore, routing should be done in a sensitive
manner so that the energy is saved. We present a secure
routing protocol for WSNs which is energy efficient and
reliable in its routing technique.
Key Words: NS2, M-LEACH, Phishing, Base Station, Deputy
Cluster Head.
1.INTRODUCTION
In wireless sensor networks(WSNs), the sensor nodes are
durable, economical and are designedtobedisposed.Energy
is limited for wireless sensor networks and has to be
managed optimally. Data delivery at the base station(BS) is
expected to be reliable. Efficient energy of any application of
WSNs is important. Routing in WSNs is very important.
Therefore, routing should be done in a sensitive manner so
that the energy is saved.
The existing system focuses on minimizing delay and
maximizing end-to-end throughput. There are more design
objectives to worry about other than delay and throughput.
Objectives like energy constraint and signal interferenceare
to be considered as well. Energy efficiency is important
because unsupervised sensor nodes are present in WSNs.
Routing protocols like Multi-Speed and Multi-Path are
designed for WSNs. Recentwork onenergy efficiencyinclude
Directed Alternative Spanning Tree and Energy-Efficient
routing algorithm. The proposedrouting protocol,where the
packets move to the base station(BS) through dense energy
area and thus protect the nodes with relatively low residual
energy. Some protocols increase the lifetime of the network
but the data delivery is unreliable. Mobility of the nodes and
the base station is also not considered in protocols. The
Modified-LEACH(M-LEACH) ensures the mobility of the
nodes in WSNs but not in base station.
Disadvantages:
• Energy inefficiency.
• Signal interference.
• Managing mobility of the nodes and maintaining
connectivity through alternate paths.
• Minimizing message overhead.
• Less reliable wireless links.
2. RELATED WORK
[2]. “W. Heinzelman, A. Chandrakasan, and H. Balakrishnan”
The paper “Energy-efficient communication protocol for
wireless micro sensor networks”,proposedLEACH.LEACHis
a clustering-based protocol.Itutilizesrandomizedrotationof
cluster heads (Base Station).It evenly distributed the energy
load in the network. Scalabilityandrobustnessismaintained.
Disadvantages:
 Energy and Communication cost.
 Overhead of dynamic cluster formation.
 Performance has to be improved.
[3]. “S. Lindsey and C. S. Raghavendra”
The paper “PEGASIS: Power-efficient gathering in sensor
information systems”, proposed PEGASIS. PEGASIS is chain-
based protocol which is improvement over the LEACH. The
nodes communicate only with a close neighbor. The nodes
take turns while transmitting to the base station.
Disadvantages:
 Lifetime of the system is less.
 Network quality is not quite good.
 Energy load balance.
[4]. “A. Manjeshwar and D. P. Agarwal”
The paper “TEEN: A routing protocol for enhanced
efficiency in wireless sensor networks”, proposed TEEN.
TEEN (Threshold sensitive Energy Efficient Sensor Network
protocol)classifysensornetworksintoproactiveandreactive
networks based on their mode of functioning.Itevaluatesthe
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 37
performance of the protocol for simple temperature sensing
application. Its performs better than LEACH.
Disadvantages:
 Energy consumption.
 Response time is low.
 Accuracy.
3. PROPOSED SYSTEM
We proposed a secure energy efficient and reliable routing
protocol for WSNs. The proposed protocol SE2R2 is
hierarchical and cluster-based. The protocol obtains fault
tolerance by providing alternative routes. When any fault is
detected in existing route to forward data to destination.
The cluster head (CH) aggregates the data to remove
redundancy. Then it forward the aggregated data to BS.
Clusters contain at least one CH node.TheseCHsareassisted
by two deputy cluster head (DCH) nodes. All these functions
are performed in the presence of phishing nodes or the
misbehavior nodes but our protocol is successful inremoval
of the misbehavior nodes as it has the phishing attacks
detection and prevention mechanism.
The performance is compared with the M-LEACH on
simulations in NS2. The proposed protocol SE2R2
outperforms M-LEACH with respect to packet deliveryratio,
packet drop, average energy and throughput.
Advantages:
 Deputy cluster head and Cluster Head Panel which
increases the lifetime of the network.
 Efficient data delivery by base station.
 The protocol ensures reliability.
 Data delivery at the base station is reliable.
 Data forwarding.
 Better throughput, average energy,packetdropand
delivery ratio than M-LEACH.
4. RESULTS
Simulation Environment:
No. of nodes 82
Terrain 1102 x 780
MAC 802.11
Initial energy 100 Joules
Simulation time 50.5 Sec
Propagation TwoRayGround
Routing DSDV
Figure 1: Packet Delivery Ratio
Figure 2: Packet Drop
Figure 3: Average Energy
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 38
Figure 4: Throughput
5.CONCLUSION
The proposed protocol SE2R2 is more secure and efficient
based on the analysis we been through. It’s a systematic
hierarchical representation of the nodes in the network
where we clearly understand the flow of the data way more
efficient. The routing is so reliable as it includes different
levels of cluster management nodes. The CH collects all the
data and forwards to the DCH and finally to the BS. The
analysis of the performance is seen in the simulation results
in the NS2 where we compared the proposed protocoltothe
M-LEACH. The proposed protocol gets away with more
points than M-LEACH. The proposed protocol is ready for
future tests like performance with high mobility nodes and
others as they come.
ACKNOWLEDGEMENT
This work has been carried out as a part of Computer
Science department, M S Ramaiah Institute of Technology,
Bangalore. We thank Management, Principal, HOD and
Mamatha Jadav V, Asst. Professor Dept. of Computer Science
and Engineering MSRIT for their support and guidelines.
REFERENCES
[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E.
Cayirci, “A surveyon sensor networks,” IEEE Commun.
Mag., vol. 40, no. 8, pp. 102–114, Aug. 2002.
[2] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan,
“Energy-efficient communication protocol for wireless
microsensor networks,”inProc.33rdAnnu.HICSS,2000,
pp. 1–10.
[3] S. Lindsey and C. S. Raghavendra, “PEGASIS: Power-
efficient gathering in sensor information systems,” in
Proc. IEEE Aerosp. Conf., 2002, pp. 1125–1130.
[4] A. Manjeshwar and D. P. Agarwal, “TEEN: A routing
protocol for enhanced efficiency in wireless sensor
networks,” in Proc. 15th IPDPSWorkshops, 2000, pp.
2009–2015.
[5] A. Manjeshwar and D. P. Agarwal, “APTEEN: A hybrid
protocol for efficient routing and comprehensive
information retrieval in wireless sensor networks,” in
Proc. IPDPS, 2002.
[6] D. B. Johnson, and D. A. Maltz, “Dynamic source routing
in ad hoc wireless networks,” in Mobile Computing.
Norwell,MA, USA: Kluwer Publishers, 1996, pp. 153–
181.
[7] C. Perkins and E. Royer, “Ad hoc on demand distance
vector routing,” in Proc. 2nd IEEE Workshop Mobile
Comput. Syst. Appl., 1999, pp. 90–100.
[8] C. E. Perkins and P. Bhagwat, “Highly dynamic
destination-sequenced distance-vector routing (DSDV)
for mobile computers,” in Proc. Conf.Commun. Archit. ,
Protocols Appl., 1994, pp. P234–P244.
[9] C. Siva Ram Murthy and B. S. Manoj, Ad hoc Wireless
Networks: Architectures and Protocols, 1st ed. Delhi,
India: Prentice-Hall, 2004.

Weitere ähnliche Inhalte

Was ist angesagt?

Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
IJTET Journal
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
IJCI JOURNAL
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760
Editor IJARCET
 
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
Munisekhar Gunapati
 
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGSCONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
IJCNCJournal
 

Was ist angesagt? (19)

Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using  Genetic AlgorithmsOptimized Projected Strategy for Enhancement of WSN Using  Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
 
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
 
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...
 
Multi-Objective Soft Computing Techniques for Dynamic Deployment in WSN
Multi-Objective Soft Computing Techniques for Dynamic Deployment in WSNMulti-Objective Soft Computing Techniques for Dynamic Deployment in WSN
Multi-Objective Soft Computing Techniques for Dynamic Deployment in WSN
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
D010332935
D010332935D010332935
D010332935
 
A Survey on Secure Alternate Path Selection for Enhanced Network Lifetime in ...
A Survey on Secure Alternate Path Selection for Enhanced Network Lifetime in ...A Survey on Secure Alternate Path Selection for Enhanced Network Lifetime in ...
A Survey on Secure Alternate Path Selection for Enhanced Network Lifetime in ...
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
 
IRJET- LEACH Protocol for Wireless Sensor Network
IRJET-  	  LEACH Protocol for Wireless Sensor NetworkIRJET-  	  LEACH Protocol for Wireless Sensor Network
IRJET- LEACH Protocol for Wireless Sensor Network
 
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
 
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
 
Efficiency enhancement using optimized static scheduling technique in TSCH ne...
Efficiency enhancement using optimized static scheduling technique in TSCH ne...Efficiency enhancement using optimized static scheduling technique in TSCH ne...
Efficiency enhancement using optimized static scheduling technique in TSCH ne...
 
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkEnergetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
 
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGSCONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
 
Software Based Transmission Line Fault Analysis
Software Based Transmission Line Fault AnalysisSoftware Based Transmission Line Fault Analysis
Software Based Transmission Line Fault Analysis
 
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
 

Ähnlich wie SE2R2: Secure Energy Efficient and Reliable Routing Protocol in Presence of Phishing Attacks for WSNs

J031101064069
J031101064069J031101064069
J031101064069
theijes
 

Ähnlich wie SE2R2: Secure Energy Efficient and Reliable Routing Protocol in Presence of Phishing Attacks for WSNs (20)

IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
 
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 PlatformImplementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
 
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
 
A survey report on mapping of networks
A survey report on mapping of networksA survey report on mapping of networks
A survey report on mapping of networks
 
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
LOAD BALANCING AND ENERGY EFFICIENCY IN WSN BY CLUSTER JOINING METHOD
LOAD BALANCING AND ENERGY EFFICIENCY IN WSN BY CLUSTER JOINING METHODLOAD BALANCING AND ENERGY EFFICIENCY IN WSN BY CLUSTER JOINING METHOD
LOAD BALANCING AND ENERGY EFFICIENCY IN WSN BY CLUSTER JOINING METHOD
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
 
Aq4103266271
Aq4103266271Aq4103266271
Aq4103266271
 
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of ManetsIRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
 
IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...
IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...
IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...
 

Mehr von IRJET Journal

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Kürzlich hochgeladen (20)

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 

SE2R2: Secure Energy Efficient and Reliable Routing Protocol in Presence of Phishing Attacks for WSNs

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 36 SE2R2: Secure Energy Efficient and Reliable Routing Protocol in Presence of Phishing Attacks for WSNs Shishir Mathew1, Mamatha Jadav V2 1Dept. of Computer Science and Engineering, MSRIT, Bangalore, Karnataka, India 2Asst. Professor, Dept. of Computer Science and Engineering, MSRIT, Bangalore, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Phishing is a form of social engineering. It is an attempt to acquire or steal sensitive information such as usernames, passwords and other sensitive information for malicious reasons. In wireless sensor networks(WSNs), the sensor nodes are durable, economical and are designed to be disposed. Energy is limited for wireless sensor networks and has to be managed optimally. Data delivery at the base station(BS) is expected to be reliable. Efficient energy of any application of WSNs is important. Routing in WSNs is very important. Therefore, routing should be done in a sensitive manner so that the energy is saved. We present a secure routing protocol for WSNs which is energy efficient and reliable in its routing technique. Key Words: NS2, M-LEACH, Phishing, Base Station, Deputy Cluster Head. 1.INTRODUCTION In wireless sensor networks(WSNs), the sensor nodes are durable, economical and are designedtobedisposed.Energy is limited for wireless sensor networks and has to be managed optimally. Data delivery at the base station(BS) is expected to be reliable. Efficient energy of any application of WSNs is important. Routing in WSNs is very important. Therefore, routing should be done in a sensitive manner so that the energy is saved. The existing system focuses on minimizing delay and maximizing end-to-end throughput. There are more design objectives to worry about other than delay and throughput. Objectives like energy constraint and signal interferenceare to be considered as well. Energy efficiency is important because unsupervised sensor nodes are present in WSNs. Routing protocols like Multi-Speed and Multi-Path are designed for WSNs. Recentwork onenergy efficiencyinclude Directed Alternative Spanning Tree and Energy-Efficient routing algorithm. The proposedrouting protocol,where the packets move to the base station(BS) through dense energy area and thus protect the nodes with relatively low residual energy. Some protocols increase the lifetime of the network but the data delivery is unreliable. Mobility of the nodes and the base station is also not considered in protocols. The Modified-LEACH(M-LEACH) ensures the mobility of the nodes in WSNs but not in base station. Disadvantages: • Energy inefficiency. • Signal interference. • Managing mobility of the nodes and maintaining connectivity through alternate paths. • Minimizing message overhead. • Less reliable wireless links. 2. RELATED WORK [2]. “W. Heinzelman, A. Chandrakasan, and H. Balakrishnan” The paper “Energy-efficient communication protocol for wireless micro sensor networks”,proposedLEACH.LEACHis a clustering-based protocol.Itutilizesrandomizedrotationof cluster heads (Base Station).It evenly distributed the energy load in the network. Scalabilityandrobustnessismaintained. Disadvantages:  Energy and Communication cost.  Overhead of dynamic cluster formation.  Performance has to be improved. [3]. “S. Lindsey and C. S. Raghavendra” The paper “PEGASIS: Power-efficient gathering in sensor information systems”, proposed PEGASIS. PEGASIS is chain- based protocol which is improvement over the LEACH. The nodes communicate only with a close neighbor. The nodes take turns while transmitting to the base station. Disadvantages:  Lifetime of the system is less.  Network quality is not quite good.  Energy load balance. [4]. “A. Manjeshwar and D. P. Agarwal” The paper “TEEN: A routing protocol for enhanced efficiency in wireless sensor networks”, proposed TEEN. TEEN (Threshold sensitive Energy Efficient Sensor Network protocol)classifysensornetworksintoproactiveandreactive networks based on their mode of functioning.Itevaluatesthe
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 37 performance of the protocol for simple temperature sensing application. Its performs better than LEACH. Disadvantages:  Energy consumption.  Response time is low.  Accuracy. 3. PROPOSED SYSTEM We proposed a secure energy efficient and reliable routing protocol for WSNs. The proposed protocol SE2R2 is hierarchical and cluster-based. The protocol obtains fault tolerance by providing alternative routes. When any fault is detected in existing route to forward data to destination. The cluster head (CH) aggregates the data to remove redundancy. Then it forward the aggregated data to BS. Clusters contain at least one CH node.TheseCHsareassisted by two deputy cluster head (DCH) nodes. All these functions are performed in the presence of phishing nodes or the misbehavior nodes but our protocol is successful inremoval of the misbehavior nodes as it has the phishing attacks detection and prevention mechanism. The performance is compared with the M-LEACH on simulations in NS2. The proposed protocol SE2R2 outperforms M-LEACH with respect to packet deliveryratio, packet drop, average energy and throughput. Advantages:  Deputy cluster head and Cluster Head Panel which increases the lifetime of the network.  Efficient data delivery by base station.  The protocol ensures reliability.  Data delivery at the base station is reliable.  Data forwarding.  Better throughput, average energy,packetdropand delivery ratio than M-LEACH. 4. RESULTS Simulation Environment: No. of nodes 82 Terrain 1102 x 780 MAC 802.11 Initial energy 100 Joules Simulation time 50.5 Sec Propagation TwoRayGround Routing DSDV Figure 1: Packet Delivery Ratio Figure 2: Packet Drop Figure 3: Average Energy
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 38 Figure 4: Throughput 5.CONCLUSION The proposed protocol SE2R2 is more secure and efficient based on the analysis we been through. It’s a systematic hierarchical representation of the nodes in the network where we clearly understand the flow of the data way more efficient. The routing is so reliable as it includes different levels of cluster management nodes. The CH collects all the data and forwards to the DCH and finally to the BS. The analysis of the performance is seen in the simulation results in the NS2 where we compared the proposed protocoltothe M-LEACH. The proposed protocol gets away with more points than M-LEACH. The proposed protocol is ready for future tests like performance with high mobility nodes and others as they come. ACKNOWLEDGEMENT This work has been carried out as a part of Computer Science department, M S Ramaiah Institute of Technology, Bangalore. We thank Management, Principal, HOD and Mamatha Jadav V, Asst. Professor Dept. of Computer Science and Engineering MSRIT for their support and guidelines. REFERENCES [1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A surveyon sensor networks,” IEEE Commun. Mag., vol. 40, no. 8, pp. 102–114, Aug. 2002. [2] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,”inProc.33rdAnnu.HICSS,2000, pp. 1–10. [3] S. Lindsey and C. S. Raghavendra, “PEGASIS: Power- efficient gathering in sensor information systems,” in Proc. IEEE Aerosp. Conf., 2002, pp. 1125–1130. [4] A. Manjeshwar and D. P. Agarwal, “TEEN: A routing protocol for enhanced efficiency in wireless sensor networks,” in Proc. 15th IPDPSWorkshops, 2000, pp. 2009–2015. [5] A. Manjeshwar and D. P. Agarwal, “APTEEN: A hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks,” in Proc. IPDPS, 2002. [6] D. B. Johnson, and D. A. Maltz, “Dynamic source routing in ad hoc wireless networks,” in Mobile Computing. Norwell,MA, USA: Kluwer Publishers, 1996, pp. 153– 181. [7] C. Perkins and E. Royer, “Ad hoc on demand distance vector routing,” in Proc. 2nd IEEE Workshop Mobile Comput. Syst. Appl., 1999, pp. 90–100. [8] C. E. Perkins and P. Bhagwat, “Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers,” in Proc. Conf.Commun. Archit. , Protocols Appl., 1994, pp. P234–P244. [9] C. Siva Ram Murthy and B. S. Manoj, Ad hoc Wireless Networks: Architectures and Protocols, 1st ed. Delhi, India: Prentice-Hall, 2004.