Compusoft Geed
Compusoft Geed
Compusoft Geed
Date of Submission 25/02/2019 Cite This Paper: Srikanth, N. & GangaPrasad, M.S. (2019). Green comp based
energy efficient data aggregation algorithm with malicious node identification
Date of Acceptance 08/04/2019 (geed-m) for lifetime improvement in wsn. 8(4), COMPUSOFT, An
Date of Publication 30/04/2019 International Journal of Advanced Computer Technology. PP-3117-3125.
Page numbers 3117-3125 (9 Pages)
This work is licensed under Creative Commons Attribution 4.0 International License.
ISSN:2320-0790
Abstract: Random deployment of sensor nodes, energy limitations, interference of wireless links, and exposed nodes, are the
major reasons of performance degradation in WSN. Energy efficiency, Lifetime improvements are the key research areas from
last few decades. Even a high level of research is going on; still there are several issues which reduce the network lifetime and its
throughput. For diminishing the energy consumption, the sensor nodes are driven into sleep mode once they finished their
sensing round. Introducing mobile nodes in sub clusters is an efficient technique to make the network energy efficient in
irregular terrains like plateaus. The energy limitations of mobile nodes, and malicious behaviour are big issues in mobile node
based sub clustered sensor networks. These issues can be clear up by introducing a Green CoMP based energy efficient data
aggregation algorithm with malicious node identification is proposed, which exchange messages to the cluster head through a
mobile node. Malicious behaviour of mobile node is also identified by using Built-in self-Test based technique to improve
network throughput. The proposed algorithm gives better results compared with existing algorithms with a lifetime improvement
of 56%, energy consumption 44%.
I. INTRODUCTION to the Base station through a cluster head. The smart sensors
WSN is a collection of group of sensor nodes which nodes works on command controlled strategies that have
communicate through wireless links, and can work together one or more memory unit, sensors, processor, an actuator
to sense environmental conditions. WSN has changed the and power supply [4]. In WSN, sensor nodes are controlled
way of living, and reduce the complexity situations, and w.r.t communication bandwidth, processing power and
giving attractive solutions to various problems in various storage space which are mandatory to be very efficient as a
fields. The wide range of applications of WSN includes source of operation. In Wireless sensor networks, the sensor
military, medical, communication, industrial, wild life, nodes are organized into clusters. It is more advantageous to
environmental applications etc. The drastic development of use clustering in WSNs, Due to clustering, reducing the
WSN changed the entire communication system in many complete energy consumption and decreasing the
applications with high end security, throughput. The data interferences between sensor nodes. The major issues of
gathered from various sensor nodes are aggregated and send WSN are Energy efficiency, lifetime, and security. There
3117
COMPUSOFT, An international journal of advanced computer technology, 8(4), April-2019 (Volume-VIII, Issue-IV)
are several clustering and routing approaches have been sub clusters has only one mobile node with
proposed to make the network more energy efficient. From low energy.
the past few decades, there is a rapid growth in WSN, and A novel BIST based algorithm is proposed to
technologies in various fields which are associated with find which mobile node is malicious. There
WSN. Even a high level of research is going on; still there are three cases in malicious nodes
are several issues to make the network energy efficient. Identification, and this algorithm makes the
Depends on application of WSN, there are several issues network to identify the malicious nodes
which degrades the performance of WSN. automatically and immediately, and moreover
Election of cluster head and formation of clusters and network itself takes the action according to the
sub clusters are basic steps to design and implement WSN. case.
Traditional approaches make the network into groups of The proposed method section of the paper explains how
clusters, and each cluster is assigned with a cluster head, GEED-M algorithm enhances the network lifetime,
each cluster is divided into sub clusters, and each sub cluster throughput, PDR, energy efficiency of the network.
is assigned with a sub cluster head. Every sensor node in
sub cluster sense the data and forward to the sub cluster
head, and sub cluster heads forward data to the Cluster head.
Cluster head is the gateway of particular cluster.
3118
COMPUSOFT, An international journal of advanced computer technology, 8(4), April-2019 (Volume-VIII, Issue-IV)
structure is created with every node, and each node has its algorithm, for mobile WSNs, It is a distributed clustering
parent node for data transmission. In this type of algorithm, and it is named as ALM. This algorithm
approaches leaves nodes are less loaded, and nodes near to enhances network lifetime, and it also improves the
sink node are heavily loaded for aggregation. stability, and network connectivity.
In cluster based routing [13], entire network is Gong et al. [12] presented a routing protocol for the
partitioned into clusters, and each cluster is assigned with a purpose of energy efficiency and security in WSNs, named,
cluster head. This cluster head collects data from every secure and energy aware routing protocol (ETARP). The
node in the cluster, and aggregates the data and finally main contribution point in ETARP is route discovering and
forward to the base station. Due to this technique, selection based on both the maximum utility concept.
bandwidth for data transmission is reduced due to reduction ETARP scheme takes into consideration the energy
in number of data packets. in mobile data collector based efficiency and the trustworthiness in routing protocol,
aggregation methods [14, 15 16], various new algorithms which may sustain more complexity and overhead
are proposed for efficient data aggregation. In conventional compared to AODV routing protocol. For hybridized
methods, entire network is divided into clusters, and networks like some nodes are fixed and others are mobile, a
assigned with a cluster head. The mobile data collector CBR-MOBILE routing is proposed. It is a traffic adaptive
collects data from each cluster head, and aggregates the routing protocol, which gives a re-assigned time slot to the
data and forward to the base station. The mobile data mobile nodes which are moving into the network by
collector move among clusters and aggregates the data removing the timeslots of nodes which are moving out of
collected from cluster head nodes. The major problem in the network [13].Authors proposed a novel secure mobile
this type of algorithms is every node‟s data can be easily data routing to the mobile nodes while collecting the data.
accessed at cluster head. For secure data collection they proposed three protocols
with a tree based connection management among them
Guoxing Zhan et al., [7] For dynamic wireless sensor [14].
networks, to provide a trustful and efficient scale routing
without time synchronization, a robust trust-aware routing S. Deng ; J. Li ; L. Shen proposed a Mobility based
framework is designed and implemented. To overcome the clustering protocol for wireless sensor networks, with
misdirecting of multi hop communication, and also to mobile nodes. Based on its residual energy and mobility of
provide security for WSN, authors proposed this algorithm. the sensor node, it can decide itself as a cluster head. Based
on connection time estimation, the sensor node aims on
B. A Mohan, H. Saroja Devi, [8] proposed an efficient link stability which is connected between sensor node and
hybrid data collection algorithm, for data collection from cluster head. Each sensor node can send its data in assigned
multiple mobile nodes. In this technique, the cluster head time slot in an ascending order (TDMA).During mobility
will be elected by the base station for first two rounds using condition; sensor node sends a joining request message to
centralized algorithm, after that CH selection is based on the new cluster head, about its joining when it lost its
previous cluster heads selection in distributed way. Here a connection with previous cluster head [16].
mobile node is introduced between CH, and Base Station.
For this type of applications, Mobile nodes are assigned
with unlimited resources to increase lifetime of Network. III. RESEARCH METHODOLOGY
3.1 Network model
J. Luo and J.-P. Hubaux, [9] presented an energy
efficient and conserving routing protocol for the purpose of The network model should have randomly deployed
improving lifetime, by managing the concentration of data sensor nodes in distributed way with non-uniform manner.
traffic at small number of base stations. In WSN, sensors Sensor nodes are arranged as sub clusters, and each sub
which are nearer to BS have to relay high amount of data cluster is assigned with one or two mobile nodes randomly.
traffic, then those nodes batteries ends up quickly. To The cluster head (CH), should be at centre of sensing sub
overcome this problem, the BS should be a mobile, and regions, and it has to be in communicate with only Mobile
then automatically sensors nearer to BS changes timely and nodes. All sensor nodes are homogeneous, and equipped
no more data traffic burden would be on same nodes. with a unique ID.
Atakli et al. [10] developed a scheme based on 1. The sensor nodes are always static and that nodes
weighted-trust estimation in order to detect and isolate the never change its location.
compromised nodes in hierarchical clustered WSN 2. These nodes are used to accumulate surrounding
structure. In this scheme, they select some nodes as data and forward this data to the cluster head,
forwarding nodes to give a trust values for all of the cluster through Mobile node by wireless communication.
nodes. Afterwards, they decrease the node's trust level for 3. The unique identifier (ID) is assigned to each and
all nodes that sent malicious information. D. Tolba, W. every sensor node to avoid redundant data, these
Ajib, and A. Obaid, [11] proposed an energy efficient sensor nodes won‟t work when their energy is less
than threshold level.
3119
COMPUSOFT, An international journal of advanced computer technology, 8(4), April-2019 (Volume-VIII, Issue-IV)
4. Power level can be adjusted dynamically when 3.1.2 Energy Consumption model for proposed
node‟s transmitting energy level decreases. algorithm
Every sensor nodes calculates their position based on the The Energy consumption for the mobile data collector, and
received signal strength instead of GPS equipment based in the system for data transmission when CH is located at
position finding in the sensor region centre of the cluster, can be calculated as
To send „R‟ bits of data to the cluster head from mobile
3.1.1 Energy consumption model: data collector, its energy consumption is
The energy spent for transmitting an m-bit message over
distance n is, E(Trans)m,n = E MDC = m × E(elec ) + m × E(s) × rh2 (8)
m × E elec + n ×∝ fs × n2 , n < 𝑛(0) Where E (MDC) is the energy consumed by mobile data
(1)
m × E elec + n ×∝ mp × n2 , n ≥ n(0) collector node, and 𝑟ℎ is the average distance between
The energy spent to receive m-bit message is mobile data collector and cluster head.
1. If one of the sub cluster has less number The Role of mobile node in these types of applications
of nodes.(less loaded sub cluster) is very important, especially in data aggregation and data
2. If one of the sub cluster has more number transmission. The entire sub cluster data depends on mobile
of nodes (heavily loaded) but assigned with less node of particular sub cluster. Therefore Mobile nodes
number of mobile nodes ( <2 ) should have to transmit data perfectly and also within a
3. If the energy of mobile nodes is less than timeslot. If mobile node is malicious then entire network
the threshold level. performance degrades and it is a big issue to the network in
As mentioned in first condition, less loaded sub cluster some major applications like military and security
does not require more than one mobile node, therefore networks. There are three cases to check or to identify
remaining mobile nodes of sub cluster are switch over to whether the mobile node is a malicious or not.
another sub clusters which are heavily loaded. If a sub
cluster is loaded with very few nodes (SC3), then that sub Case-I: If the mobile node does not able to transmit
cluster is assigned with neighbour sub cluster mobile nodes any data to cluster head (Dead)
as green comp technique in cellular networks. As per next Case-II: if the mobile node able to send the data,
two conditions, if heavily loaded sub cluster has less but it is a fault data. (Fault)
number of mobile nodes (SC2), or if the energy of mobile Case-III: if the mobile node able to send the correct
node is less than the threshold level after some rounds, then data, but it is received as a fault data due to link failure.
neighbour mobile nodes are switch over from other sub (Link fail)
clusters. From implementation, the sub cluster 3 has less In Case–I, if the mobile node does not able to
number of sensor nodes with a single mobile node, sub transmit data, then that MN has to remove from the
cluster 2 has large number of sensor nodes but it is also network, and that node is to be considered as almost
assigned with a single mobile node (MN 30). dead node.
3121
COMPUSOFT, An international journal of advanced computer technology, 8(4), April-2019 (Volume-VIII, Issue-IV)
In Case – II, if mobile node transmits data to cluster Algorithm of Malicious Node Identification
head, but the data is incorrect in several links, then the
network will decide that the mobile node is a fault node, R = no. of rounds
and it has to remove from the network. Sequence formation R
No. of bits in sequence= [0, 1]
In Case – III, if mobile node able to send correct X falls in the condition
data to cluster head, but it received as a fault data in if
only one link, then the network will decide that, an error 𝑁
MN 𝑛=1 seq[1]
is occurred due to link failure but not due to mobile
And
node. 𝑁
MN 𝑛=1 seq[0]
The above three cases should be check by the network Denote
itself and it has to decide which action has to be take X = no malicious node is detected
according to the case, For this purpose a BIST based Else
malicious node identification algorithm is proposed, In this Y= malicious node is detected
algorithm the cluster head has to check every mobile node End if
before data transmission initiates. For this the cluster head
asks mobile node to transmit a sequence of two bits for IV. PERFORMANCE ANALYSIS
checking purpose. The mobile node itself asks neighbour In this section, the proposed green comp based data
six nodes to send a data bit HIGH, then the mobile node aggregation algorithm with malicious node identification
aggregates the data and send it to cluster head, again the (GEED-M) is proposed, evaluated and compared its
mobile node asks another six neighbour nodes to send a performance with two other known routing protocols:
data bit LOW, then the mobile node aggregates the data suspicious node information dissemination protocol
and send it to the cluster head, If cluster head receives two (SNIDP) and normal Node Behavioral Strategies Banding
data bits 1, and 0 (Zero) simultaneously from mobile node, Trust Evaluation Algorithm (NBBTE). These two
then it accepts that mobile node for data transmission. If algorithms were chosen for being well known in the
cluster head does not receive those two bits sequence literature and have the same goals that the proposed
correctly, then it asks agent node in particular sub cluster to algorithm. The TMECA performance is evaluated under
check that mobile node condition. When mobile node sends the following metrics: (i) Energy efficiency (ii) Energy
data to particular agent node, if agent node also does not Consumption (iii) Throughput (iv) Lifetime of network.
receive data sequence correctly then cluster head decides,
that mobile node is a fault node and it is completely
removed from the network. If agent node receives data Parameters Values
sequence correctly, but cluster head receives data sequence
wrongly, then cluster head decides data received wrongly Simulation Period 100ms
due to communication link failure. Then it assigns another Coverage Area 1320*1032
link to mobile node and check again. Here agent node is the No of Nodes 51
node which node has direct access with cluster head for No of sink node 1
malicious identification. During this entire process mobile No of mobile node 5
node can identify malicious nodes of sub cluster, when it No of Sub cluster 5
asks its neighbour nodes to send data HIGH, Low for No of Cluster Head 1
checking process. Those nodes will remove from the sub Traffic Type CBR
cluster by mobile node. Agent Type UDP
Routing protocol AODV
Algorithm of proposed Green CoMP
Initial power 100 J
MN collect data from n Transmission Power 1J
Calculation of energy in MN Receiving Power 1J
Threshold (TH) =5J (assigned) Queue Type Drop-Tail
If Table-1 Simulation parameters
TH of MN < 5J
MN of neighbour cluster act as data Network lifetime
collector
Else The lifetime of network is calculated by data aggregation in
Present MN act as data collector` number of rounds until sensor node get die. For
End if applications instance, where the time of all nodes operates
together, the lifetime can be defined as the first sensor is
exhausted of its energy until certain the number of rounds.
3122
COMPUSOFT, An international journal of advanced computer technology, 8(4), April-2019 (Volume-VIII, Issue-IV)
Energy Efficiency
Energy efficiency is the amount of energy used by the
individual node that to be processed. The proposed work
shows how much it is efficient than existed protocols. It is
an efficient technique which can reduces the energy
wastage, and performs the number of rounds within limited
energy. Malicious node identification is a good sign for
reducing energy wastage of the network.
Figure 7: Energy consumption comparison graph with
Energy Consumption existing system
The energy consumption represents energy consumed by
the network within assigned data rounds. Energy
consumption includes energy consumed by the nodes,
processors, transceiver, and all other units used for the
network. The energy consumption of the network is greatly
reduced by Green CoMP technique. By avoiding malicious
nodes in the network, the energy wastage can be reduced.
Figure shows comparison results of Green CoMP with
existed techniques.
Network Throughput
Throughput is the amount of data transmitted successfully Figure 8: Network throughput comparison graph with
from one place to another in a given time period. It is also existing system
referred as overall system performance. The proposed
technique can reduce the packet wastage and it can increase
the system performance. The comparison results of the
proposed method with existed techniques shown below to
know how Green CoMP plays a vital role in WSN.
3123
COMPUSOFT, An international journal of advanced computer technology, 8(4), April-2019 (Volume-VIII, Issue-IV)
Fig .10: Implementation of Green CoMP with higher nodes Fig .11 Implementation of Green CoMP with higher nodes
(>100 Nodes) at Initial Rounds (>100 Nodes) after few rounds
3124
COMPUSOFT, An international journal of advanced computer technology, 8(4), April-2019 (Volume-VIII, Issue-IV)
Parametric analysis can be performed, by calculating [7]. GuoxingZhan, WeisongShi, J.Deng, „Design and
various parameters at various node densities and analysed implementation of TARF: A trust-aware routing
at different density levels. The Graph shows comparison framework for WSNs‟, IEEE Transactions on
and analysis of various parameters like Lifetime, Loss of Dependable and Secure Computing,Vol No 9, Issue No 2,
pp. 184-197. 2012.
network, and Throughput of proposed GEED-M algorithm. [8]. B. A Mohan, H. Saroja Devi, „A hybrid approach for data
collection using multiple mobile nodes in WSN
VI. CONCLUSION (HADMMN)‟. In. Proc. IEEE International Conference
WSN in plateaus and Military areas has more concern with on Recent Trends in Electronics, Information &
network lifetime and energy efficiency due to uneven Communication Technology (RTEICT),Vol No. 5, pp.
736-739. 2016.
deployment of sensor nodes and due to mobility of data [9]. J. Luo and J.-P. Hubaux, ‘Joint mobility and routing for
collectors. Due to Energy limitation, Sometimes there is a lifetime elongation in wireless sensor networks,‟
chance of each sub cluster may have only one mobile node, in Proc. IEEE INFOCOM, Vol No. 3, pp. 1735-1746, 2005.
or none after some rounds of data sensing. To overcome
this problem, a Green CoMP Based Energy Efficient Data [10]. Idris M. Atakli, Hongbing Hu, Yu Chen, Wei-Shinn Ku, and
Aggregation Algorithm with Malicious Node Identification Zhou Su, "Malicious Node Detection in Wireless Sensor
(GEED-M) is proposed. Depending on energy level of Networks using Weighted Trust Evaluation". Proceedings
mobile node network can decide which mobile node has to of the Symposium on Simulation of Systems Security
be active/sleep, and switch over from one sub cluster to (SSSS’08), Ottawa, Canada, April 14 – 17, pp. 836-843,
2008.
another sub cluster.
[11]. F. D. Tolba, W. Ajib, and A. Obaid, “Distributed clustering
This algorithm makes the network more energy efficient algorithm for mobile wireless sensors networks,”
and also improves the network lifetime. This work will be in Proceedings of the 12th IEEE SENSORS 2013,
extended in future with Trust Node based Data Conference, pp. 1–4.
Aggregation. The proposed method achieves 56% of [12]. P. Gong, T. M. Chen, and Q. Xu, „ETARP: Energy Efficient
network lifetime and also 54% of energy efficiency. Trust- Aware Routing Protocol for Wireless Sensor
Networks‟. Journal of Sensors, 2015, Article ID 469793, 10
VII. REFERENCES pages, 2015.
[13]. Awwad, Samer A. B. and Ng, CheeKyun and Noordin, Nor
[1]. L F. Akyildiz, T.Melodia, and K. R. Chowdhury, „A survey Kamariah and A. Rasid, MohdFadlee , „Cluster based
on wireless multimedia sensor networks‟,Computer Netw. routing protocol for mobile nodes in wireless sensor
(ElseVier),Vol. No. 51, Issue No. 4, pp. 921-960. 2007 network‟, Wireless Personal Communications,Vol No. 61,
[2]. O. DurmazIncel, A. Ghosh, B. Krishnamachari, and K. Issue No 2, pp. 251-281.
Chintalapudi, „Fast data collection in tree-based wireless [14]. Poornima, A.S. &Amberker, B.B..„Secure data collection
sensor networks‟,IEEE Tran. Mobile Computing,Vol No. using mobile data collector in clustered wireless sensor
11, Issue No. 1, pp. 86-99.2012. networks‟, IET Wireless Sensor Systems, 2011, Vol No. 1,
[3]. V. Mhatre and C. Rosenberg, "Design guidelines for pp. 85 – 95.
wireless sensor networks communication: clustering and [15]. Sayyed, Ali & Buss Becker, Leandro. „Optimizing speed of
aggregation",Elsevier Ad Hoc Networks Journal,Vol No. 2, mobile data collector in Wireless Sensor Network‟, 2015, 1-
Issue No 1, pp. 45-63. 2004. 6. International Conference on Emerging Technologies
[4]. Po-Han Huang, Shi-Sheng Sun, and Wanjiun Liao, (ICET)
„GreenCoMP: Energy-Aware Cooperation for Green [16]. S. Deng, J. Li and L. Shen, „Mobility-based clustering
Cellular Networks‟,IEEE Transactions on mobile protocol for wireless sensor networks with mobile nodes,‟
computing,Vol No. 16, Issue No 1, pp. 143-157. 2017. in IET Wireless Sensor Systems,Vol No. 1, Issue No 1, pp.
[5]. Syed Muhammad Sajjad, SafdarHussainBouk, and 39-47, 2011.
Muhammad Yousaf, „Neighbor Node Trust Based Intrusion [17]. Azharuddin, M., Kuila, P., Jana, P.K.: „Energy efficient
Detection System for WSN‟. Procedia Computer Science, fault tolerant clustering and routing algorithms for wireless
Vol No 63, pp. 183-188. 2015. sensor networks‟, Comput. Electr. Eng., Vol No. , 41,
[6]. R. Ferdous, V. Muthukkumarasamy, and A. Sattar, „A pp. 177–190, 2015.
Node-based Trust Management Scheme for Mobile Ad- [18]. Ip, W., Wang, D., Cho, V.: „Aircraft ground service
Hoc Networks‟. Proceedings of the 4th International scheduling problems and their genetic algorithm with hybrid
Conference on Network and System Security (NSS), 2010, assignment and sequence encoding scheme‟, IEEE Syst.
pp. 275–280. Journal, Vol No.7, Issue No 4, pp. 649–657, 2013,
3125