Next Article in Journal
Prospects for Hermetic Sealing of Scaled-Up Photoelectrochemical Hydrogen Generators for Reliable and Risk Free Operation
Previous Article in Journal
A Study on the Mechanism of Convective Heat Transfer Enhancement Based on Heat Convection Velocity Analysis
Previous Article in Special Issue
Design and Implementation of an IoT System for Smart Energy Consumption and Smart Irrigation in Tunnel Farming
Open AccessArticle

An Energy-Efficient and Secure Routing Protocol for Intrusion Avoidance in IoT-Based WSN

1
Islamia College Peshawar, Peshawar 25000, Pakistan
2
Chair of Cyber Security, Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia
3
Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan
*
Author to whom correspondence should be addressed.
Energies 2019, 12(21), 4174; https://doi.org/10.3390/en12214174
Received: 25 September 2019 / Revised: 21 October 2019 / Accepted: 28 October 2019 / Published: 1 November 2019
(This article belongs to the Special Issue Renewable Energy Systems Based on Internet of Things)
Due to the advancement of information and communication technologies, the use of Internet of Things (IoT) devices has increased exponentially. In the development of IoT, wireless sensor networks (WSNs) perform a vital part and comprises of low-cost smart devices for information gathering. However, such smart devices have constraints in terms of computation, processing, memory and energy resources. Along with such constraints, one of the fundamental challenges for WSN is to achieve reliability with the security of transmitted data in a vulnerable environment against malicious nodes. This paper aims to develop an energy-efficient and secure routing protocol (ESR) for intrusion avoidance in IoT based on WSN to increase the network period and data trustworthiness. Firstly, the proposed protocol creates different energy-efficient clusters based on the intrinsic qualities of nodes. Secondly, based on the (k,n) threshold-based Shamir secret sharing scheme, the reliability and security of the sensory information among the base station (BS) and cluster head are achieved. The proposed security scheme presents a light-weight solution to cope with intrusions generated by malicious nodes. The experimental results using the network simulator (NS-2) demonstrate that the proposed routing protocol achieved improvement in terms of network lifetime as 37%, average end-to-end delay as 24%, packet delivery ratio as 30%, average communication cost as 29%, network overhead as 28% and the frequency of route re-discoveries as 38% when compared with the existing work under dynamic network topologies. View Full-Text
Keywords: Internet of Things; network lifetime; smart devices; intrusion defence; secure routing Internet of Things; network lifetime; smart devices; intrusion defence; secure routing
Show Figures

Graphical abstract

MDPI and ACS Style

Haseeb, K.; Almogren, A.; Islam, N.; Ud Din, I.; Jan, Z. An Energy-Efficient and Secure Routing Protocol for Intrusion Avoidance in IoT-Based WSN. Energies 2019, 12, 4174.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop