Next Article in Journal
Deep Learning Neural Networks for Short-Term PV Power Forecasting via Sky Image Method
Next Article in Special Issue
High-Secured Data Communication for Cloud Enabled Secure Docker Image Sharing Technique Using Blockchain-Based Homomorphic Encryption
Previous Article in Journal
Concentrated Solar Power with Thermoelectric Generator—An Approach Using the Cross-Entropy Optimization Method
Previous Article in Special Issue
Clustering Based Optimal Cluster Head Selection Using Bio-Inspired Neural Network in Energy Optimization of 6LowPAN
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Routing-Based Energy Optimization for IoT Application with Heterogeneous Wireless Sensor Networks

1
Department of Information Technology, St. Martin’s Engineering College, Dhulapally, Secunderabad 500100, India
2
Department of Electronics and Communication Engineering, HKBK College of Engineering, Bengaluru 560045, India
3
Department of Computing Technologies, SRM Institute of Science and Technology, Kattankulathur, Chennai 603203, India
4
Department of CSE, SRM Institute of Science and Technology, Kattankulathur, Chennai 603203, India
5
Faculty of Information Technology, City University, Petaling Jaya 46100, Malaysia
6
Department of Media and Educational Informatics, Faculty of Informatics, Eotvos Lorand University, 1053 Budapest, Hungary
7
Environment Protection Department, Faculty of Agriculture, University of Agriculture Sciences and Veterrnary Medicine Cluj-Napoca, Calea Manastur No. 3–5, 40033 Cluj-Napoca, Romania
8
Faculty of Building Services, Technical University of Cluj-Napoca, 40033 Cluj-Napoca, Romania
*
Authors to whom correspondence should be addressed.
Energies 2022, 15(13), 4777; https://doi.org/10.3390/en15134777
Submission received: 29 May 2022 / Revised: 24 June 2022 / Accepted: 27 June 2022 / Published: 29 June 2022
(This article belongs to the Special Issue Energy Efficiency in Wireless Networks)

Abstract

:
Wireless sensor networks (WSNs) and the Internet of Things (IoT) are increasingly making an impact in a wide range of domain-specific applications. In IoT-integrated WSNs, nodes generally function with limited battery units and, hence, energy efficiency is considered as the main design challenge. For homogeneous WSNs, several routing techniques based on clusters are available, but only a few of them are focused on energy-efficient heterogeneous WSNs (HWSNs). However, security provisioning in end-to-end communication is the main design challenge in HWSNs. This research work presents an energy optimizing secure routing scheme for IoT application in heterogeneous WSNs. In our proposed scheme, secure routing is established for confidential data of the IoT through sensor nodes with heterogeneous energy using the multipath link routing protocol (MLRP). After establishing the secure routing, the energy and network lifetime is improved using the hybrid-based TEEN (H-TEEN) protocol, which also has load balancing capacity. Furthermore, the data storage capacity is improved using the ubiquitous data storage protocol (U-DSP). This routing protocol has been implemented and compared with two other existing routing protocols, and it shows an improvement in performance parameters such as throughput, energy efficiency, end-to-end delay, network lifetime and data storage capacity.

1. Introduction

The IoT and WSNs are becoming viable solutions that are widely utilized in real-time data collection and monitoring applications, which include automated irrigation, target monitoring, observing clinical records, tracking landslides and predictions for forest fire and disaster management. A WSN consists of numerous effective sensor nodes (SNs) that monitor climatic disasters found in harsh or remote areas. Furthermore, the SNs examine the atmospheric factors such as pressure, temperature, humidity, sound and moisture content representing intense symptoms. After an SN completes its sensing operation, the information is gathered and transmitted to the base station (BS). The sensor and data communication units of SNs consume more energy and once the entire energy is exhausted, it expires or is unable to process [1]. Hence, a node that is considered dead is unsuitable for either replacing with or recharging using an alternate power source. Hence, balancing the power utilization of a SN is more essential. To overcome these challenges, several developers have used clustering approaches [2], which can scale up the network lifetime and provide remarkable efficiency. Furthermore, it is supportive in maintaining power as numerous reliable clusters are formed. These clusters, based on the techniques used, can either be considered temporary or permanent. Moreover, clustering distributes the nodes that are placed jointly, which is accomplished based on similarity metrics such as the distance from the base station (BS), radius of transmission and density of the cluster. After the clusters are formed, a node from the cluster is chosen as the cluster head (CH) whose responsibility is to organize the data gathered from cluster members (CM) and transmit those data to the BS. When a single node cluster is considered, it mandatorily communicates with the sink rather than the BS, which finally results in a reduction in power utilization. In WSNs, the serious threats, along with the technical challenges, which arise due to the nature of resource constraints and its limited availability [3], have to be focused on to ensure revision and distribution. With WSNs in an open area, the sensors are more vulnerable to the unfriendly environment that arises due to humidity, increased temperature, pressure, snow, rain, dust and so on. These affect the functions of the wireless sensor network, and hence a demand arises to introduce robust and flexible SNs. Moreover, general and future challenges are constrained to the limited resources, the limited ability of communication, fault tolerance, stability, mobility, bandwidth, precision, reliability, availability, heterogeneity, accountability, uncontrollable setup and denial of service (DoS). Above all, some specific challenges have turned the attention of the researchers towards the utilization of power, network duration, throughput, security and routing protocols. In WSNs, during communication, energy consumption is a highly prominent issue that seeks attention. Energy efficiency has a greater impact on the entire performance of the network and acts as a significant function in the lifespan of a WSN [4]. The metrics that are essential while routing and estimating the cost function (CF) in a WSN are total energy, energy consumed and residual energy. Energy is one of the most significant aspects of the efficient working of wireless sensor networks. The longevity of the network is totally dependent upon the optimum use of the available energy; therefore, optimization is much needed for the efficient utilization of energy. Routing protocol, considered as an important factor, has to be selected carefully to route the data packets safely to the destination with less overhead because of the resource constraints of SNs, namely, their limited power and shorter range for communication. Numerous efforts have been made to bring out the best solutions for WSNs, yet extraordinary works are required [5]. The benefits of the IoT are as follows. An urban IoT has many facilities that may bring a number of benefits such as the management and optimization of traditional public services, including transport and parking facilities, lighting, the surveillance and maintenance of public areas, preservation of cultural heritage, garbage collection, public health care, i.e., hospitals, and schools. Therefore, the availability of different types of data that will store in the cloud or be collected by a data warehouse in the urban IoT should increase the transparency and promote the actions of the local government or municipality towards the citizens, which can increase the awareness of people about the status of their city and their life style. Therefore, the application of the IoT paradigm to the smart city is attractive and expansive for local government and administrations; however, it take times to adopt IoT technology in a wide manner.
This research is organized as follows: A detailed review of the literature related to this research is described in Section 2. The design, algorithms and functionality of the proposed protocol are elaborated on in Section 3. The simulation results of the proposed protocol are presented in Section 4, which is followed by the conclusion in Section 5.

2. Related Works

Mostly, in large scale networks such as the IoT and SNs with restricted constraints, the demanding factor is energy conservation. Generally, in networks based on clusters [6], the controlling entity is CH, whose significant role is to gather data and transmit them. Furthermore, in large scale WSNs integrated with the IoT, the crucial part is to route data securely as they involve constrained resources. Several existing approaches do not provide reliable and secure data routing in the network as they lack protection schema against threats [7]. A low-energy adaptive clustering hierarchy (LEACH) protocol consists of multi-stages [8]. The LEACH protocol’s performance was improved by applying a multi-hop basis for transmitting information [9]. The design elucidated the unstable consumption of energy as the clusters were randomly created. Moreover, the multi-hop paths created were not optimized, which resulted in route breaks. In a chain–chain-based routing protocol (CCBRP) [10], the principles of LEACH as well as Power-Efficient Gathering in Sensor Information Systems (PEGASIS) were integrated, which resulted in scalable energy conservation in SNs while forwarding data. This hybrid CCBRP protocol, which was executed in two stages, reflected the drawback of a higher energy consumption in the nodes and the production of high latency. Subsequently, as the scalability is restricted, CCBRP was not suitable for larger networks. Kumar et al., proposed a data collection as well as a load balancing scheme that was designed to save energy. The network performance was improved in this scheme as the aggregating data were sequenced by data forwarding [11]. A vigorous authentication protocol for energy efficiency was developed for an industrial IoT-based WSN, which provided scalable data security. In this method, mutual authentication was followed between nodes, but the energy was consumed gratuitously, thereby compromising the network lifetime [12]. Likewise, the Shamir secret sharing method comprised two phases, namely, share generation as well as reconstruction. The generated secret was distributed among nodes and the secret key was reconstructed by the usage of any nodes of the subset. The data transmission using this method consumed additional energy leading to routing overheads [13]. If the flow entry exists, the forwarding is performed according to the flow table, and if not, the packet-in message is sent to the subset. After receiving the packet-in message, the subset will make a decision. An improved three-layer hybrid clustering method (ETLHCM) analysed and limited the control traffic specifically while selecting CH. This method achieved an 18% improvement in the lifetime of the network as well as half of the nodes being alive compared with the hybrid hierarchical clustering approach (HHCA). However, this method was not suitable for selecting the grid head (GH) [14]. To beat hateful attacks such as Sybil, wormholes and a black hole, a novel protocol was introduced by Haseeb et al. to ensure reliable routing and data transmission [15]. The functioning of a combined GIN with GEAR protocol resulted in being too complicated to achieve data security [16]. A voting-based hybrid ensemble classification method was introduced for predicting the availability of parking lots, wherein 96% of the accuracy and 89% of the availability rate was achieved [17]. An optimal network coding backpressure routing (NCBPR) method was developed for a large-scale IoT to divert the flow of data packets from highly congested nodes to low ones, thereby balancing the load and optimizing the battery power [18]. The nodes in the network were formed as clusters and the CHs were selected based on the battery power. Moreover, an efficient data aggregation model was involved to improve the network throughput, wherein the redundant data packets were eliminated. An efficient load balancing optimization algorithm for the employment of energy effectual routing as well as a load balancing protocol were used to enhance the network lifetime [19,20]. The authors in [21] explored the cluster-based backpressure routing algorithm for IoTs, which discusses the energy and congestion issues in IoT environment. A brief discussion is also presented related to the sustainable development through the Internet of Things in [22,23].
A novel framework was proposed to handle environmental monitoring using wireless sensors connected with the internet, wherein two distinctive SNs were involved. Moreover, clients observed the information using the web application on the internet from anywhere. When the information of the SN surpassed the specified range, a notification was sent to the clients insisting on the environmental setup being altered accordingly [24,25,26]. Energy is a critical issue in WSNs and the IoT, specifically when deployed in smart city applications and this was discussed briefly in [27,28,29,30].
Research Objectives
  • To establish secure routing for confidential data of the IoT through sensor nodes with heterogeneous energy utilizing MLRP.
  • To optimize the energy and improve the network lifetime using a hybrid-based TEEN (H-TEEN) protocol that has load balancing capacity.
  • To improve the storage capacity using the ubiquitous data storage protocol (U-DSP).

3. Proposed Methodology

The proposed routing protocol with a storage capacity protocol has been discussed in three phases. The first phase implements data routing with the security of the sensor nodes for confidential data through the IoT, which has heterogeneous energy using a multipath link routing protocol (MLRP). The next phase is to incorporate the H-TEEN protocol, which has load balancing capacity for sensor nodes that helps in attaining the energy optimization of nodes. Then the transmission of data is carried out using the security and optimization of energy. Finally, the data are stored with improved capacity using the ubiquitous data storage protocol (U-DSP). The architecture is given in Figure 1.

3.1. Multipath Link Routing Protocol (MLRP)

MLRP comprises five various stages, namely, detecting neighbors, constructing topology, distributing pairwise keys, forming a cluster and transmitting data. Every process is described in detail below.
Detection of neighbors and construction of topology: It is considered that every node holds an ID{IDx}, certificate {CERTx}, public key {Kbs} and unique shared key {Kxbs}. To identify the neighbors, node broadcasts and receives NBR DET packet containing its ID as well as its CERT as in Equation (1).
x   : N B R _ D E T | I D x | C E R T x
The node receiving the NBR_DET packet initially authenticates the ID of the node by verifying CERTx. When authenticated, the ID is added to the neighbor list by the receiver, or else the packet is dropped such that the unauthenticated node does not participate in this process of detecting neighbors. Once broadcasting is complete, neighbor information is forwarded to BS as in Equations (2) and (3).
x B S : N B R _ I N F O | I D x | C E R T x | E ( k x b s , N B R x ) |
M A C ( k x b s , N B R _ I N F O | I D x | C E R T x | E ( k x b s , N B R x ) )
An intermediate node that is receiving the NBR_INFO packet performs few functions such as:
  • The authentication of the SN is verified by its certificate.
  • When the ID of the node is authorized, the packet is again broadcasted by the receiver node.
  • When the receiver receives a similar packet having a similar ID again, the packet is simply dropped.
Hence, a table is maintained by every node termed as a receiver packet table. Thus, the network traffic is reduced and node energy is saved to some extent. Once the NBR INFO packet is reached at BS, BS verifies MAC for authenticity and integrity; then neighbor information is authenticated using Kxbs between SN and BS. MAC, obtained from the data and by encrypting Kxbs, is used such that the intruder cannot either alter or spoof neighbor information.

3.2. Distribution of Pairwise Key

Once the information about the neighbor is obtained from the network nodes, BS analyzes the exact network topology and generates the neighbor matrix. Then the DFS algorithm is applied by which multiple paths are identified from BS to each source node. Beforehand, for each neighbor pair, BS generates the secret key, a random number, termed as pairwise key with the help of the hash function given by Equations (4)–(6).
k x y = h ( s e c r e t , I D x , I D y )
BS unicasts this key to the corresponding node as
B S x : P A I R _ K E Y | s e q n o | I D b s | C E R T b s | I D x | I D y | E ( k x b s , k x y | E ( k y b s , k x y ) ) |
M A C ( k x b s , P A I R K E Y | s e q n o | I D b s | C E R T b s | I D x | I D y | E ( K x b s , K x y | | E ( K y b s , K x y ) ) )
The packet holds its type, sequence number, the ID of BS, neighbor and destination, certificate of BS, pairwise key and MAC of entire data. Every intermediate node that receives the packet performs the following operations:
(1)
The certificate of BS is verified with the public key.
(2)
The sequence number as well as the node pair is checked in the receiver packet table. When no such value is found, sequence number, type of the packet and node pair along with packet rebroadcasting is stored or else dropped.
(3)
When the ID of the destination is identical to its ID, the pairwise key is encrypted, MAC is verified and the encrypted packet of neighbor with nonce as well as its ID encrypted using a pairwise key is sent, which is given by Equation (7).
x y : C H A L L E N G E | I D y | E ( K y b , K x y ) | E ( K x y , I D x | n o n c e )
The packet at node y is decrypted using unique shared key K y b and the pairwise key is generated followed by decrypting the next packet using the generated pairwise key then forwards the packet to x, which is given by Equation (8).
y x : C H A L L E N G E _ R E P | I D x | E ( k x y , I D y | n o n c e _ 1 )
Both the neighboring nodes verify one another by swapping the challenge packet as well as reducing overhead of resending pairwise key to y from BS. In end, each pair of nodes holds a pairwise key. When the CHALLENGE_REP packet is not received at node x in the expected form, node x reports about the fake node to BS.

3.3. Cluster Formation

BS initiates cluster formation and cluster head (CH) is selected based on residual energy. It is assumed that the energy level of the node does not change after the cluster is formed. In total, 5–8% of the cluster nodes are selected as CH with the criteria given below: (1) Two cluster heads should not be neighbors; (2) every CH has not less than 7–10% nodes as a neighbor. Then BS unicasts CH INT to CH along the route from CH to BS as illustrated in Figure 2. By considering that the node is next hop in route, the format of the packet CH INT is given by Equation (9).
B S C H : C H _ I N T | I D b s | I D i | E ( K i b s , P A T H | s e q n o ) | M A C ( k c h b s , C H _ I N T | I D c h | P A T H | s e q _ n o )
Every node that receives the packet performs the following: (1) ID of the next hop is checked, if identical to its own, routing path (PATH) is decrypted and next hop from PATH is identified or else packet is dropped. (2) The sequence number is checked in the receiver packet table, then store packet type and sequence number if the sequence number did not exist in the table, and the changes needed are made, or else it is stopped. (3) Preceding hop is assigned its ID, while the subsequent one with the ID is found in PATH. (4) Routing table is stored in memory along with the previous one, as well as next hop, such that it helps in transmitting the data to BS. (5) PATH, as well as the sequence path for the subsequent hop, are encrypted with a pairwise key and the updated packet is forwarded. While CH is receiving the CH INT packet, decryption of PATH takes place and the data are verified by the MAC; then acknowledgement (ACK) is sent to BS via the same path.
When ACK is not received by BS within certain time from CH, the path is recomputed and the CH INT packet is sent again. A few criteria are involved in determining the routing path including the path having residual energy and power consumed. A path is selected with more residual energy and small hops count. To form a cluster, a CH ADV packet is sent by CHs to publicize their will.
ID and CERT are present in CH and the ADV packet, such that the receiving node ensures authentication. Nodes receiving several CH and ADV select CH based on two factors: (1) checking if the pairwise key is present in the ID advertised and (2) signal strength of advertisement forwarded. Once CH is selected, the will of the nodes is forwarded by CH JOIN packet with ID as well as MAC with pairwise key and a nonce. Once entire CH JOIN is received, information of the cluster members is sent to the BS by CH, and the TDMA schedule is created based on the total nodes in the cluster and unicast to every member. The packet has the following format by Equations (10)–(12).
C H : C H _ A D V | I D c h | C E R T c h
x C H : C H _ J O I N | I D x | M A C ( K x c h , C H _ J O I N | I D x | n o n c e x
C H x : C H _ S H E D | I D x | E ( k x c h , t x ) M A C ( C H S H E D | I D x | E ( K x c h , t x ) n o c n e x + 1 )

3.4. Data Transmission

The data transmission phase comprises three subphases;
(1)
The data sensed with encrypted and authenticated format transmitted by the member node to CH and when not linked to any route, can sleep so that energy is saved.
(2)
The received data are aggregated and compressed by CH to generate a new signal, which is then transmitted to BS through the route specified. (It is considered that node j is subsequent hop in routing table.)
(3)
Base station uses an exclusively shared key for decryption and authentication of the data received.
These subphases are observed with the form as given in Equations (13) and (14).
x C H : D A T A | I D x | E ( K x c h , d x )
M A C ( K x c h , D A T A | I D x | E ( K x c h , d x ) )
Once the data are received, they are aggregated by CH and then forwarded to BS by Equation (15).
C H B S : A G G R _ D A T A | I D c h | I D j | E ( K j c h , s e q n o ) | E ( K c h b s , d c h ) | M A C ( K c h b s , A G G R _ D A T A | s e q n o | E ( K c h b s , d c h )
AGGR_DATA specifies the type of the packet, IDch and IDj denote the previous and next hop in the path, respectively; the packet reply is verified with the encrypted sequence number when AGGR_DATA packet is received by any node with identical sequence number, then packet is dropped. Dch represents encrypted data for BS and MAC, which supports maintenance of the packet integrity and authentication. The following operations are performed by the node receiving this packet: (1) ID of the next hop is checked; when similar to its ID, the sequence number is decrypted. (2) The packet sequence number is verified in the receiver packet table, if not found, packet type and the sequence number is entered or else left out. (3) The entry of the subsequent hop is modified with the ID of the subsequent hop nodes and that of the preceding hops with its ID. (4) The sequence number is encrypted using the pairwise key of subsequent hop as well as then forwarded again. In this manner, data reach the BS through the route specified and BS uses an exclusively shared key (Kchbs), which evaluates the data efficiency.

3.5. Incorporation of H-TEEN

In H-TEEN, after selecting the CHs, CHs forwards the following parameters:
  • Attributes (A): This physical set of parameters helps the user to collect the data.
  • Thresholds: This is composed of hard and soft thresholds denoted by HT and ST, respectively. HT is the particular value that triggers the node to broadcast the data. ST is a little alteration in the significance that triggers the node to rebroadcast the information.
  • Schedule: It is scheduled by TDMA that allows the slot to each node.
  • TimeCount (TC): This is the utmost duration of the pair consecutive reports forwarded by a node. This is the numerous length of the schedule that accounts for the practical component. In a WSN, closer nodes form a cluster that senses analogous data and forwards them concurrently, which leads to collisions. TDMA schedule is introduced so that every cluster member is assigned a slot for transmission.

3.6. U-DSP

In a storage system, businesses store data in the data server located remotely, and hence data authenticity is assured. When, occasionally, unauthorized users delete or modify data, the server is compromised and/or randomly leads to Byzantine failures. As this is the initial process for recovering the storage errors quickly, cloud storage systems introduce a flexible as well as effective distributed approach with explicit dynamic data support for distribution of files in a cloud server. The homomorphic token is computed with the help of a universal hash function and is integrated with verification of erasure-coded data. Moreover, servers that misbehave are also identified. At last, file retrieving and error recovering procedures based on erasure-correcting code are defined.

4. Performance Analysis and Discussion

The efficiency of the secure routing protocol with energy optimization and data storage was evaluated with several simulation experiments with randomly varying topology. NS-2 version 2.34 was the simulation tool used and considered a multi-hop network with 1000 m × 1000 m size located in a randomized grid with SNs from 50 to 200. The sink node was at the centre of the network. Traffic was CBR of 600 packets/sec and packet size was 316 bytes. The heterogeneity of the network was proven in the simulation by testing the environment with different sets of nodes. The simulation parameters are shown in Table 1.
The performance measures considered were throughput, end-to-end delay, energy efficiency, the lifetime of the network and data storage capacity.
End-to-end delay, an important metric, is considered to deal with real-time traffic and transmit data packets within the stipulated time. End-to-end delay is the difference in the time taken between the source node transmitting data and the sink receiving it. It is the sum of the delay in transmission, propagation, queuing and processing at every hop.
Table 2 shows a comparison of the end–end delay. Figure 3 depicts the end–end delay for the proposed MLRP-HTEEN-UDSP protocol and Figure 4 compares it with the other protocols such as LEACH, CCBRP and PEGASIS. It suggests that the proposed protocol performs better than other protocols. The delay is at a minimum since the hierarchical architecture of the CHs for all the times chooses the route that has fewer hops with good quality links.
Throughput is the total packets received by the sink within a specified duration. The comparison of throughput is shown in Table 3.
Figure 5 depicts the throughput of MLRP-HTEEN-UDSP, while Figure 6 compares the throughput of the proposed protocol with other protocols. The selection of multiple paths and minimum delay balances the load and uses the wireless spectrum efficiently. Thus, it achieves a higher throughput than other protocols.
Table 4 shows a comparison of the energy efficiency. The average energy efficiency is represented in Figure 7 where we can realize that our proposed protocol MLRP-HTEEN-UDSP has less energy dissipation compared with other protocols (LEACH, CCBRP and PEGASIS) as shown in Figure 8 with various node numbers.
Table 5 shows the comparison of the network lifetime. Figure 9 presents the network lifetime for the proposed MLRP-HTEEN-UDSP and Figure 10 shows a comparison of the network lifetime between the proposed and existing techniques.
Table 6 shows the comparison of data storage. Figure 11 shows the data storage for the proposed MLRP-HTEEN-UDSP and Figure 12 shows the comparison of the data storage between the proposed and existing techniques.
Table 7 represents the overall parameter comparison of the proposed and existing techniques, and Figure 13 is the graphical representation of the overall comparison.

5. Conclusions

In this research, an energy optimization method with secure routing for IoT heterogeneous WSN applications is proposed. This secure as well as reliable routing protocol gathers data about neighbor nodes at BS, and generates the key and energy-efficient multipath for every node. CHs help in data aggregation and forward them to BS, which continuously monitors nodes for residual energy to choose some new paths and CHs. By using the complexity of multimedia processing and the aggregation process to the CHs side, as well as preventing path loops and path cycles for establishing routes, the integrated implementation of MLRP-HTEEN-UDSP produced a minimum end-to-end delay in suitable data packets and reduced the energy consumption at SNs. We also demonstrated a light-weight distributed key management method for supporting secure communication among nodes. The performance of MLRP-HTEEN-UDSP outperforms the existing ones such as LEACH, CCBRP and PEGASIS in all the performance metrics including end-to-end delay, throughput, energy efficiency, network lifetime and data storage capacity. Future work of the proposed protocol will be extended to the performance analysis in the green IoT environments with an increased network size.

Author Contributions

Conceptualization, Writing—original draft R.N.; Supervision, V.C. and S.B.G.; Writing-original draft and review & editing, K.J. and M.G.; Validation, C.V.; propose the new method or methodology, N.R and S.B.G.; Formal Analysis, Investigation C.O.S.; Resources, S.B.G. and C.O.S.; Software, T.C.M.; Writing—review & editing, T.C.M. All authors have read and agreed to the published version of the manuscript.

Funding

National Research Development Projects to finance excellence (PFE)-14/2022-2024 granted by the Romanian Ministry of Research and Innovation, this paper was partially supported by UEFISCDI Romania and MCI through projects AISTOR, FinSESco, CREATE, I-DELTA, DEFRAUDIFY, Hydro3D, FED4FIRE—SO-SHARED, AIPLAN—STORABLE, EREMI, NGI-UAV-AGRO and by European Union’s Horizon 2020 research and innovation program under grant agreements No. 872172 (TESTBED2) and No. 777996 (SealedGRID).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data will be shared for review based on the editorial reviewer’s request.

Acknowledgments

The work of Chaman Verma was supported by the European Social Fund under the project “Talent Management in Autonomous Vehicle Control Technologies” (EFOP-3.6.3-VEKOP-16-2017-00001). The publication of C.O.S. was supported by funds from the National Research Development Projects to finance excellence (PFE)-14/2022-2024 granted by the Romanian Ministry of Research and Innovation.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Downie, J.D.; Nederlof, L.; Sutherland, J.S.; Wagner, R.E.; Webb, D.A.; Whiting, M.S. Radio Frequency Identification (RFID) Connected Tag Communications Protocol and Related Systems and Methods. U.S. Patent No. 9,652,707, 16 May 2017. [Google Scholar]
  2. Koch, M.J.; Swope, C.B.; Bekritsky, B.J. System for, and Method of, Accurately and Rapidly Determining, in Real-Time, True Bearings of Radio Frequency Identification (RFID) Tags Associated with Items in a Controlled area. U.S. Patent 9,477,865 B2, 26 October 2016. [Google Scholar]
  3. Pirbhulal, S.; Zhang, H.; Alahi, M.E.; Ghayvat, H.; Mukhopadhyay, S.C.; Zhang, Y.-T.; Wu, W. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network. Sensors 2017, 17, 69. [Google Scholar] [CrossRef]
  4. Sharma, N.; Sharma, A.K. Cost analysis of hybrid adaptive routing protocol for heterogeneous wireless sensor network. Sādhanā 2016, 41, 283–288. [Google Scholar] [CrossRef]
  5. Wang, K.; Wang, Y.; Sun, Y.; Guo, S.; Wu, J. Green industrial Internet of things architecture: An energy-efficient perspective. IEEE Commun. Mag. 2016, 54, 48–54. [Google Scholar] [CrossRef]
  6. Airehrour, D.; Gutierrez, J.; Ray, S.K. Secure routing for internet of things: A survey. J. Netw. Comput. Appl. 2016, 66, 198–213. [Google Scholar] [CrossRef]
  7. Deebak, B.D.; Al-Turjman, F. A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Netw. 2020, 97, 102022. [Google Scholar] [CrossRef]
  8. Yang, T.; Xiangyang, X.; Peng, L.; Tonghui, L.; Leina, P. A secure routing of wireless sensor networks based on trust evaluation model. Procedia Comput. Sci. 2018, 131, 1156–1163. [Google Scholar] [CrossRef]
  9. Safara, F.; Souri, A.; Baker, T.; Al Ridhawi, I.; Aloqaily, M. PriNergy: A priority-based energy-efficient routing method for IoT systems. J. Supercomput. 2020, 76, 8609–8626. [Google Scholar] [CrossRef]
  10. Haseeb, K.; Islam, N.; Almogren, A.; Din, I.U. Intrusion prevention framework for secure routing in WSN-based mobile Internet of Things. IEEE Access 2019, 7, 185496–185505. [Google Scholar] [CrossRef]
  11. Kumar, K.; Kumar, S.; Kaiwartya, O.; Cao, Y.; Lloret, J.; Aslam, N. Cross-Layer Energy Optimization for IoT Environments: Technical Advances and Opportunities. Energies 2017, 10, 2073. [Google Scholar] [CrossRef] [Green Version]
  12. Minoli, D.; Sohraby, K.; Occhiogrosso, B. IoT Considerations, Requirements, and Architectures for Smart Buildings—Energy Optimization and Next-Generation Building Management Systems. IEEE Internet Things J. 2017, 4, 269–283. [Google Scholar] [CrossRef]
  13. Guo, X.; Lin, H.; Li, Z.; Peng, M. Deep-Reinforcement-Learning-Based QoS-Aware Secure Routing for SDN-IoT. IEEE Internet ThingsJ. 2020, 7, 6242–6251. [Google Scholar] [CrossRef]
  14. Pirbhulal, S.; Wu, W.; Muhammad, K.; Mehmood, I.; Li, G.; de Albuquerque, V.H.C. Mobility enabled security for optimizing IoT based intelligent applications. IEEE Netw. 2020, 34, 72–77. [Google Scholar] [CrossRef]
  15. Haseeb, K.; Almogren, A.; Islam, N.; Ud Din, I.; Jan, Z. An Energy-Efficient and Secure Routing Protocol for Intrusion Avoidance in IoT-Based WSN. Energies 2019, 12, 4174. [Google Scholar] [CrossRef] [Green Version]
  16. Preeth, S.K.; Dhanalakshmi, R.; Kumar, R.; Shakeel, P.M. An adaptive fuzzy rule based energy efficient clustering and immune-inspired routing protocol for WSN-assisted IoT system. J. Ambient. Intell. Humaniz. Comput. 2018. [Google Scholar] [CrossRef]
  17. Hammi, B.; Zeadally, S.; Labiod, H.; Khatoun, R.; Begriche, Y.; Khoukhi, L. A secure multipath reactive protocol for routing in IoT and HANETs. Ad Hoc Netw. 2020, 103, 102118. [Google Scholar] [CrossRef]
  18. Sampathkumar, A.; Maheswar, R.; Harshavardhanan, P.; Murugan, S.; Jayarajan, P.; Sivasankaran, V. Majority Voting based Hybrid Ensemble Classification Approach for Predicting Parking Availability in Smart City based on IoT. In Proceedings of the 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kharagpur, India, 1–3 July 2020. [Google Scholar]
  19. Sampathkumar, A.; Murugan, S.; Rastogi, R.; Mishra, M.K.; Malathy, S.; Manikandan, R. Energy Efficient ACPI and JEHDO Mechanism for IoT Device Energy Management in Healthcare. In Internet of Things in Smart Technologies for Sustainable Urban Development; Springer: Cham, Switzerland, 2020; pp. 131–140. [Google Scholar]
  20. Sampathkumar, A.; Mulerikkal, J.; Sivaram, M. Glowworm swarm optimization for effectual load balancing and routing strategies in wireless sensor networks. Wirel. Netw. 2020, 26, 4227–4238. [Google Scholar] [CrossRef]
  21. Sharma, S.; Rani, M.; Goyal, S.B. Energy Efficient Data Dissemination with ATIM Window and Dynamic Sink in Wireless Sensor Networks. In Proceedings of the 2009 International Conference on Advances in Recent Technologies in Communication and Computing, Kottayam, India, 27–28 October 2009; pp. 559–564. [Google Scholar] [CrossRef]
  22. Maheswar, R.; Jayarajan, P.; Sampathkumar, A.; Kanagachidambaresan, G.R.; Hindia, M.H.D.; Tilwari, V.; Dimyati, K.; Ojukwu, H.; Sadegh Amiri, I. CBPR: A Cluster-Based Backpressure Routing for the Internet of Things. Wirel. Pers. Commun. 2021, 118, 3167–3185. [Google Scholar] [CrossRef]
  23. Raut, R.; Kautish, S.; Polkowski, Z.; Kumar, A.; Liu, C.M. Energy-Efficient Routing Protocol for Green IoT Network, Green Internet of Things and Machine Learning: Towards a Smart Sustainable World; John Wiley & Sons: Hoboken, NJ, USA, 2021; ISBN 9781119792031. [Google Scholar] [CrossRef]
  24. Kanagachidambaresan, G.R.; Maheswar, R.; Manikantan, C.; Ramakrishnan, K. Internet of Things in Smart Technologies for Sustainable Urban Development, 1st ed.; EAI/Springer Innovations in Communications and Computing Book Series; Springer: Cham, Switzerland, 2020. [Google Scholar]
  25. Sharma, S.; Goyal, S.B.; Qamar, S. Four-Layer Architecture Model for Energy Conservation in Wireless Sensor Networks. In Proceedings of the 2009 Fourth International Conference on Embedded and Multimedia Computing, Jeju, Korea, 10–12 December 2009; pp. 1–3. [Google Scholar] [CrossRef]
  26. Rajawat, A.S.; Bedi, P.; Goyal, S.B.; Alharbi, A.R.; Aljaedi, A.; Jamal, S.S.; Shukla, P.K. Fog Big Data Analysis for IoT Sensor Application Using Fusion Deep Learning. Math. Probl. Eng. 2021, 2021, 6876688. [Google Scholar] [CrossRef]
  27. Rani, S.; Maheswar, R.; Kanagachidambaresan, G.R.; Jayarajan, P. Integration of WSN and IoT for Smart Cities, 1st ed.; EAI/Springer Innovations in Communications and Computing Book Series; Springer: Cham, Switzerland, 2020. [Google Scholar]
  28. Khan, M.; Ilavendhan, A.; Babu, C.N.K.; Jain, V.; Goyal, S.B.; Verma, C.; Safirescu, C.O.; Mihaltan, T.C. Clustering Based Optimal Cluster Head Selection Using Bio-Inspired Neural Network in Energy Optimization of 6LowPAN. Energies 2022, 15, 4528. [Google Scholar] [CrossRef]
  29. Goyal, S.B.; Bedi, P.; Kumar, J.; Varadarajan, V. Deep learning application for sensing available spectrum for cognitive radio: An ECRNN approach. Peer-to-Peer Netw. Appl. 2021, 14, 3235–3249. [Google Scholar] [CrossRef]
  30. Rajawat, A.S.; Bedi, P.; Goyal, S.B.; Shukla, P.K.; Jamal, S.S.; Alharbi, A.R.; Aljaedi, A. Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation. Math. Probl. Eng. 2021, 2021, 2330049. [Google Scholar] [CrossRef]
Figure 1. Proposed architecture.
Figure 1. Proposed architecture.
Energies 15 04777 g001
Figure 2. Clustered architecture.
Figure 2. Clustered architecture.
Energies 15 04777 g002
Figure 3. End-to-end delay of MLRP-HTEEN-UDSP.
Figure 3. End-to-end delay of MLRP-HTEEN-UDSP.
Energies 15 04777 g003
Figure 4. Comparison of end-to-end delay.
Figure 4. Comparison of end-to-end delay.
Energies 15 04777 g004
Figure 5. Throughput of MLRP-HTEEN-UDSP.
Figure 5. Throughput of MLRP-HTEEN-UDSP.
Energies 15 04777 g005
Figure 6. Comparison of throughput.
Figure 6. Comparison of throughput.
Energies 15 04777 g006
Figure 7. Energy efficiency of MLRP-HTEEN-UDSP.
Figure 7. Energy efficiency of MLRP-HTEEN-UDSP.
Energies 15 04777 g007
Figure 8. Comparison of energy efficiency.
Figure 8. Comparison of energy efficiency.
Energies 15 04777 g008
Figure 9. Network lifetime of MLRP-HTEEN-UDSP.
Figure 9. Network lifetime of MLRP-HTEEN-UDSP.
Energies 15 04777 g009
Figure 10. Comparison of network Lifetime.
Figure 10. Comparison of network Lifetime.
Energies 15 04777 g010
Figure 11. Data storage of MLRP-HTEEN-UDSP.
Figure 11. Data storage of MLRP-HTEEN-UDSP.
Energies 15 04777 g011
Figure 12. Comparison of data storage.
Figure 12. Comparison of data storage.
Energies 15 04777 g012
Figure 13. Overall comparison of MLRP-HTEEN-UDSP.
Figure 13. Overall comparison of MLRP-HTEEN-UDSP.
Energies 15 04777 g013
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParametersValue
Network size1000 m × 1000 m
Sensor nodes200
Transmission Rate50 to 250 Kbps
Number of Nodes10 to 500
Data Flows2 to 10
MAC ProtocolIEEE 802.11
Initial Energy14.0 Joules
Packet Size512 bytes
Receiving Power0.4 Watts
Table 2. Comparison of end–end delay.
Table 2. Comparison of end–end delay.
Network SizeLEACHCCBRPPEGASISNCBPRHHCAETLHCMMLRP-HTEEN-UDSP
5042403835312825
7575696359483828
10078726763524232
12581757069584838
15085797776655545
Table 3. Comparison of throughput.
Table 3. Comparison of throughput.
Network SizeLEACHCCBRPPEGASISNCBPRHHCAETLHCMMLRP-HTEEN-UDSP
5020283035404552
7534364044525561
10043475052636578
12558626669747982
15063687072768085
Table 4. Comparison of energy efficiency.
Table 4. Comparison of energy efficiency.
Network SizeLEACHCCBRPPEGASISNCBPRHHCAETLHCMMLRP-HTEEN-UDSP
5020232528323844
7535384042465051
10038404345515861
12550535559636972
15052586062687075
Table 5. Comparison of network Lifetime.
Table 5. Comparison of network Lifetime.
Network SizeLEACHCCBRPPEGASISNCBPRHHCAETLHCMMLRP-HTEEN-UDSP
5028303338455055
7545485055596365
10049515665717881
12550565966798285
15052596172808588
Table 6. Comparison of data storage.
Table 6. Comparison of data storage.
Network SizeLEACHCCBRPPEGASISNCBPRHHCAETLHCMMLRP-HTEEN-UDSP
5019232832353842
7522283039404551
10026313542596468
12528353752657072
15031394161687275
Table 7. Overall comparisons of MLRP-HTEEN-UDSP.
Table 7. Overall comparisons of MLRP-HTEEN-UDSP.
Network SizeThroughputEnd–End DelayEnergy EfficiencyNetwork LifetimeData Storage Capacity
505225445542
756128526551
1007832618168
1258238728572
1508545758875
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Nagaraju, R.; C, V.; J, K.; G, M.; Goyal, S.B.; Verma, C.; Safirescu, C.O.; Mihaltan, T.C. Secure Routing-Based Energy Optimization for IoT Application with Heterogeneous Wireless Sensor Networks. Energies 2022, 15, 4777. https://doi.org/10.3390/en15134777

AMA Style

Nagaraju R, C V, J K, G M, Goyal SB, Verma C, Safirescu CO, Mihaltan TC. Secure Routing-Based Energy Optimization for IoT Application with Heterogeneous Wireless Sensor Networks. Energies. 2022; 15(13):4777. https://doi.org/10.3390/en15134777

Chicago/Turabian Style

Nagaraju, Regonda, Venkatesan C, Kalaivani J, Manju G, S. B. Goyal, Chaman Verma, Calin Ovidiu Safirescu, and Traian Candin Mihaltan. 2022. "Secure Routing-Based Energy Optimization for IoT Application with Heterogeneous Wireless Sensor Networks" Energies 15, no. 13: 4777. https://doi.org/10.3390/en15134777

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop