A secured routing algorithm for cluster-based networks, integrating trust-aware authentication mechanisms for energy-efficient and efficient data delivery

Published

17-08-2024

DOI:

https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.3.35

Keywords:

Clustering, Optimal routing, Secured WSN, ECC, Data transmission, Energy consumption.

Dimensions Badge

Issue

Section

SECTION C: ARTIFICIAL INTELLIGENCE, ENGINEERING, TECHNOLOGY

Authors

  • Annalakshmi D PG & PG and Research Department of Computer Science, Government Arts College (Autonomous) Affiliated to Bharathidasan University, Tiruchirappalli), Tamil Nadu, India.
  • C. Jayanthi PG & PG and Research Department of Computer Science, Government Arts College (Autonomous) Affiliated to Bharathidasan University, Tiruchirappalli), Tamil Nadu, India.

Abstract

Secure routing in Wireless Sensor Networks (WSNs) is vital for preserving data veracity and privacy in the face of possible threats. Traditional routing protocols lack robust security mechanisms, making WSNs vulnerable to attacks. Secure routing protocols in WSNs aim to address these vulnerabilities by implementing authentication, encryption, and intrusion detection techniques to ensure secure and reliable data transmission while minimizing energy consumption. This paper proposes a novel secured routing algorithm tailored for cluster-based networks, aimed at enhancing energy efficiency and data delivery security by integrating trust-based authentication mechanisms. The approach begins with the design of a clustering algorithm, which organizes network nodes into clusters based on proximity or network topology. Subsequently, a trust-based authentication mechanism is developed to evaluate the reliability and integrity of both nodes and links within the network. Building upon these foundational elements, a secured routing protocol is devised to capitalize on the cluster-based organization and trust-based authentication, thereby facilitating energy-efficient and secure data transmission. The proposed algorithm and authentication mechanism Cluster and Optimal Routing Assisted Cryptograph (CORAC) are implemented within a simulated network environment to validate their efficacy. Performance evaluation is conducted through simulation studies, focusing on key metrics such as packet delivery ratio, energy consumption, and security effectiveness. This comprehensive approach aims to address the dual challenges of energy efficiency and data security in cluster-based networks, offering a promising solution for future deployments in various applications.

How to Cite

Annalakshmi D, & C. Jayanthi. (2024). A secured routing algorithm for cluster-based networks, integrating trust-aware authentication mechanisms for energy-efficient and efficient data delivery. The Scientific Temper, 15(03), 2672–2682. https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.3.35

Downloads

Download data is not yet available.