Abstract
The objective of this study is to analyze the energy consumption associated with modern methodologies utilized in wireless sensor networks and to conduct a comparative assessment with Reed Solomon (RS) codes. This paper presents three discrete techniques for wireless sensor networks. The strategies mentioned include the Self-Evolving Sensor System (SESS), the Secure and Adaptive Key Management utilizing Multipath Routing Protocol (SAKM-MRP), and the National Instruments Secure Reference-based Data Aggregation (NI-SRDA). A distinct algorithm was developed for each method to examine the energy use. Based on the experimental results, it has been shown that the RS-codes approach consumes a considerably greater quantity of energy compared to the SESS methods, which, in contrast, exhibit a significantly lower energy consumption. When comparing the efficiency of RS-codes and SESS methods, it is observed that the SAKN-MRP technique exhibits a more significant decrease in energy consumption. Compared to the RS-Codes system, the SESS scheme stands out with a significant 45.5% reduction in energy usage at the maximum delivery node. Similarly, the SAKM-MRP scheme showcases an average decrease of 35.7% in energy consumption. Notably, the NI-SRDA scheme achieves an impressive 60% reduction in energy consumption, underscoring its remarkable impact on energy efficiency. In a broader sense, it can be inferred that the NI-SDRA technique holds promise as an energy-efficient solution for wireless sensor networks in comparison to alternative strategies suggested in the current study.
Keywords
Energy Efficient, Multi-Path Routing Protocols, Wireless Sensor Network, Space Efficient Secret Sharing,Downloads
References
- C.R. Kaur, N. Kumar, S. Batra, Trust management in social Internet of Things: A taxonomy, open issues, and challenges. Computer Communications, 150, (2020) 13-46. https://doi.org/10.1016/j.comcom.2019.10.034
- K. Amina, S. Gupta, S.K. Gupta, Multi-hazard disaster studies: Monitoring, detection, recovery, and management, based on emerging technologies and optimal techniques. International journal of disaster risk reduction, 47, (2020) 101642. https://doi.org/10.1016/j.ijdrr.2020.101642
- H.M.A. Fahmy, (2023) In Concepts, applications, experimentation and analysis of wireless sensor networks. Springer Cham. https://doi.org/10.1007/978-3-030-58015-5
- V. Wattana, T. Anuphaptrirong, D. Hoonsopon, when blockchain meets Internet of Things: Characteristics, challenges, and business opportunities. Journal of industrial information integration, 15, (2019) 21-28. https://doi.org/10.1016/j.jii.2019.05.002
- R. Álvarez, J. Díez-González, P. Verde, R. Ferrero-Guillén, H. Perez, Combined sensor selection and node location optimization for reducing the localization uncertainties in wireless sensor networks. Ad Hoc Networks, 139, (2023) 103036. https://doi.org/10.1016/j.adhoc.2022.103036
- A. Singh, P. Ashish, B. Sourabh, A walkthrough of the emerging IoT paradigm: Visualizing inside functionalities, key features, and open issues. Journal of Network and Computer Applications, 143, (2019) 111-151. https://doi.org/10.1016/j.jnca.2019.06.013
- S. Parween, Z.H. Syed, Md Asdaque Hussain, A survey on issues and possible solutions of cross-layer design in Internet of Things. International Journal of Computer Networks and Applications (IJCNA), 8(4), (2021) 311-333. https://doi.org/10.22247/ijcna/2021/209699
- M.H.P. Rizi, S.A.H Seno, A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city. Internet of Things, 20, (2022) 100584. https://doi.org/10.1002/ett.4711
- M. Kingston Roberts, J. Thangavel, An improved optimal energy aware data availability approach for secure clustering and routing in wireless sensor networks. Transactions on Emerging Telecommunications Technologies, 34(3), (2022) e4711. https://doi.org/10.1002/ett.4711
- A. Ghosal, M. Conti, Security issues and challenges in V2X: A survey. Computer Networks, 169, (2020) 107093. https://doi.org/10.1016/j.comnet.2019.107093
- I.M. Varma, N. Kumar, A Comprehensive Survey on SDN and Blockchain-based Secure Vehicular Networks. Vehicular Communications, 44, (2023) 100663. https://doi.org/10.1016/j.vehcom.2023.100663
- K. Guleria, A.K. Verma, Meta-heuristic ant colony optimization based unequal clustering for wireless sensor network. Wireless Personal Communications, 105, (2019) 891-911. https://doi.org/10.1007/s11277-019-06127-1
- M.N. Halgamuge, Estimation of the success probability of a malicious attacker on blockchain-based edge network. Computer Networks, 219, (2022) 109402. https://doi.org/10.1016/j.comnet.2022.109402
- G. Kalnoor, S. Gowrishankar, IoT-based smart environment using intelligent intrusion detection system. Soft Computing, 25(17), (2021) 11573-11588. https://doi.org/10.1007/s00500-021-06028-1
- U. Dampage, L. Bandaranayake, R. Wanasinghe, K. Kottahachchi, B. Jayasanka. Forest fire detection system using wireless sensor networks and machine learning. Scientific Reports, 12(1), (2022) 46. https://doi.org/10.1038/s41598-021-03882-9
- J. Grover, Security of Vehicular Ad Hoc Networks using blockchain: A comprehensive review. Vehicular Communications, 34 (2022) 100458. https://doi.org/10.1016/j.vehcom.2022.100458
- A. Heshmati, M. Bayat, M. Doostari, S.M. Pournaghi, Blockchain based authentication and access verfication scheme in smart home. Journal of Ambient Intelligence and Humanized Computing, 14(3), (2023) 2525-2547. https://doi.org/10.1007/s12652-022-04501-9
- V. Sharma, S. Vats, D. Arora, K. Singh, A.S. Prabuwono, M.S. Alzaidi, A. Ahmadian, OGAS: Omni-directional Glider Assisted Scheme for autonomous deployment of sensor nodes in open area wireless sensor network. ISA transactions, 132, (2023) 131-145. https://doi.org/10.1016/j.isatra.2022.08.001
- M. Faris, M.N. Mahmud, M.F.M. Salleh, A. Alnoor, Wireless sensor network security: A recent review based on state-of-the-art works. International Journal of Engineering Business Management, 15, (2023). https://doi.org/10.1177/18479790231157220
- S. Tabibi, A. Ghaffari, Energy-efficient routing mechanism for mobile sink in wireless sensor networks using particle swarm optimization algorithm. Wireless Personal Communications, 104, (2019) 199-216. https://doi.org/10.1007/s11277-018-6015-8
- M.M Hazzazi, S. Attuluri, B. Zaid, K. Joshi, A Novel Cipher-Based Data Encryption with Galois Field Theory. Sensors, 23(6), (2023) 3287. https://doi.org/10.3390/s23063287
- G.D. Kaur, Human factor analysis of error detection and correction in hand-knotted carpet production process. Research Journal of Textile and Apparel, (2023). https://doi.org/10.1108/RJTA-10-2022-0124
- A. Iqbal, K.M. Chari, Concurrent fault detection and location with minimal overhead in Ling parallel prefix adders with a scheme for fault tolerant Ling prefix adders. Microelectronics Reliability, 127, (2021) 114375. https://doi.org/10.1016/j.microrel.2021.114375
- M.S. Azhdari, A. Barati, H. Barati, A cluster-based routing method with authentication capability in Vehicular Ad hoc Networks (VANETs). Journal of Parallel and Distributed Computing, 169, (2022) 1-23. https://doi.org/10.1016/j.jpdc.2022.06.009
- Z. Yang, L. Li, G.U. Fei, L. Xinghong, H. Maryam, TADR-EAODV: A trust-aware dynamic routing algorithm based on extended AODV protocol for secure communications in wireless sensor networks. Internet of Things, 20, (2022) 100627. https://doi.org/10.1016/j.iot.2022.100627
- G. Douglas, D. Centola, Topological measures for identifying and predicting the spread of complex contagions. Nature Communications, 12(1), (2021) 4430. https://doi.org/10.1038/s41467-021-24704-6
- M. Baldi, F. Chiaraluce, L. Incipini, M. Ruffini, Code-based physical layer secret key generation in passive optical networks. Ad Hoc Networks, 89, (2019) 1-8. https://doi.org/10.1016/j.adhoc.2019.02.003
- Z. Chunli, Y. Fengfan, C. Chen, R. Umar, Reed-Solomon Coded Cooperative Space-time Block Coded Spatial Modulation. International Conference on Wireless Communications and Smart Grid (ICWCSG), IEEE, China. https://doi.org/10.1109/ICWCSG53609.2021.00027