USCDRP: unequal secure cluster-based distributed routing protocol for wireless sensor networks

  • V. VijayalakshmiEmail author
  • A. Senthilkumar


In the last decade, parallel computing techniques become more popular and offer various architectures to perform diverse processes in an individual computing node or a collection of strongly linked nodes with homogeneous hardware. In this paper, we propose a distributed secure unequal cluster-based multipath routing protocol (USCDRP) for improving the energy efficiency and also to enhance the security as well as reliability. The presented USCDRP is the enhanced work of SCMRP, which provides the security to a particular extent. The presented method offers reliability, energy efficiency and maximum lifetime. Besides, an independent clustering method is provided to eliminate the orphan nodes and cluster maintenance strategy to enhance the network lifetime. A detailed experimental analysis ensured the superiority of the USCDRP over the compared methods concerning throughput, energy efficiency and network lifetime analysis. The simulation outcome indicated that all the nodes in WSN become dead node, and the network becomes inactive in the round number of 2021 by Sec-LEACH, 2412 by SCMRP and 3245 by USCDRP.


Parallel Computing Urban big data Distributed algorithm Hot spot problem Clustering Security Multihop communication 



  1. 1.
    Dhiviya S, Sariga A, Sujatha P (2017) Survey on WSN using clustering. In: 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM), pp 121–125. IEEEGoogle Scholar
  2. 2.
    Heinzelman WR, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, IEEEGoogle Scholar
  3. 3.
    Al-Karaki JN, Kamal AE (2004) Routing techniques in wireless sensor networks: a survey. IEEE Wirel Commun 11(6):6–28CrossRefGoogle Scholar
  4. 4.
    Karlof C (20030 Secure routing in sensor networks: attacks and countermeasures. In: Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications (SNPA2003)Google Scholar
  5. 5.
    Famila S, Jawahar A, Sariga A, Shankar K (2019) Improved artificial bee colony optimization based clustering algorithm for SMART sensor environments, Peer-to-Peer Networking and Applications, 2019. In Press.
  6. 6.
    Dutta AK, Elhoseny M, Dahiya V, Shankar K (2019) An efficient hierarchical clustering protocol for multihop internet of vehicles communication. Trans Emerg Telecommun Technol in press.
  7. 7.
    Elhoseny M, Shankar K (2019) Reliable data transmission model for mobile ad hoc network using signcryption technique. IEEE Trans Reliab pp 1–10, in press.
  8. 8.
    Uma Maheswari P, Manickam P, Sathesh Kumar K, Maseleno A, Shankar K (2019) Bat optimization algorithm with fuzzy based PIT sharing (BF-PIT) algorithm for named data networking (NDN). J Intell Fuzzy Syst. In Press. CrossRefGoogle Scholar
  9. 9.
    Senthil Ragavan VK, Elhoseny M, Shankar K, An enhanced whale optimization algorithm for vehicular communication networks. Int J Commun Syst.
  10. 10.
    Gupta D, Khanna A, Lakshmanaprabu SK, Shankar K, Furtado V, Rodrigues JJ (2018) Efficient artificial fish swarm based clustering approach on mobility aware energy-efficient for MANET. Trans Emerg Telecommun Technol Wiley.
  11. 11.
    Elhoseny M, Shankar K (2020) Energy efficient optimal routing for communication in VANETs via clustering model. In: Emerging Technologies for Connected Internet of Vehicles and Intelligent Transportation System Networks, pp 1–14, Springer, ChamGoogle Scholar
  12. 12.
    Arjunan S, Sujatha P (2018) Lifetime maximization of wireless sensor network using fuzzy based unequal clustering and ACO based routing hybrid protocol. Appl Intell 48(8):2229–2246CrossRefGoogle Scholar
  13. 13.
    Arjunan S, Pothula S (2017) A survey on unequal clustering protocols in wireless sensor networks. J King Saud Univ Comput Inf SciGoogle Scholar
  14. 14.
    Arjunan S, Pothula S, Ponnurangam D (2018) F5N-based unequal clustering protocol (F5NUCP) for wireless sensor networks. Int J Commun Syst 31(17):e3811CrossRefGoogle Scholar
  15. 15.
    Oliveira LB, Ferreira A, Vilaça MA, Wong HC, Bern M, Dahab R, Loureiro AA (2007) SecLEACH—On the security of clustered sensor networks. Signal Process 87(12):2882–2895CrossRefGoogle Scholar
  16. 16.
    Steiner JG, Neuman BC, Schiller JI (1988) Kerberos: an authentication service for open network systems. In: Usenix Winter, pp 191–202Google Scholar
  17. 17.
    Zhou Q, Li J (2009) Secure routing protocol cluster-gene-based for wireless sensor networks. In: 2009 First International Conference on Information Science and Engineering, pp 4098–4102, IEEEGoogle Scholar
  18. 18.
    Lou W (2005) An efficient N-to-1 multipath routing protocol in wireless sensor networks. In: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005, IEEEGoogle Scholar
  19. 19.
    Parno B, Luk M, Gaustad E, Perrig A (2006) Secure sensor network routing: a clean-slate approach. In: Proceedings of the 2006 ACM CoNEXT Conference, p 11, ACMGoogle Scholar
  20. 20.
    Nasser N, Chen Y (2007) SEEM: secure and energy-efficient multipath routing protocol for wireless sensor networks. Comput Commun 30(11–12):2401–2412CrossRefGoogle Scholar
  21. 21.
    Deng J, Han R, Mishra S (2006) INSENS: intrusion-tolerant routing for wireless sensor networks. Comput Commun 29(2):216–230CrossRefGoogle Scholar
  22. 22.
    Kumar S, Jena S (2010) SCMRP: secure cluster based multipath routing protocol for wireless sensor networks. In: 2010 Sixth International Conference on Wireless Communication and Sensor Networks, pp 1–6, IEEEGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Computer ScienceM.G.R.CollegeHosurIndia
  2. 2.Department of Computer ScienceArignar Anna Government Arts CollegeNamakkalIndia

Personalised recommendations