Abstract
In order to solve the general problems of information overlap, low energy utilization rate and network transmission security in routing protocols of wireless sensor networks, a scheme of energy-efficient and security-high routing for wireless sensor networks (EEASHR) based on improved Kruskal algorithms is proposed in this paper. The proposed scheme takes the energy size required for transmission and the value of reliability between nodes and nodes as the edges value of graph, then uses improved Kruskal algorithm to generate the minimum spanning tree (MST) in sink node, in other words, the optimal route path. The simulation in NS2 shows that the proposed algorithm improves network energy efficiency, reduces the node packet loss rate and prolongs the life cycle of wireless sensor networks.
Chapter PDF
Similar content being viewed by others
References
Kifayat, K., Merabti, M., Shi, Q.: Security in Wireless Sensor Networks. In: Staroulakis, P., Stamp, M. (eds.) Handbook of Information and Communication Security, pp. 513–552. Springer, Berlin (2010)
Jaydip, S.: A Survey on Wireless Sensor Network Security. International Journal of Communication Networks and Information Security 2, 55–78 (2009)
Boukerch, A., Xu, L., El-khatib, K.: Trust-based Security for Wireless Ad Hoc and Sensor Networks. Computer Communications 30, 2413–2427 (2007)
Wu, Y.F., Zhou, X., Feng, R.J., Wan, J.W., Xu, X.F.: Secure Routing based on Node Trust Value in Wireless Sensor Networks. Chinese Journal of Scientific Instrument 1, 221–227 (2012)
Kan, B.Q., Cai, L., Zhu, H.S., Xu, Y.J.: Accurate Energy Model for WSN Node and Its Optimal Design. Journal of Systems Engineering and Electronics 19(3), 427–433 (2008)
Hu, X.D., Wei, Q.F., Tang, H.: Model and Simulation of Creditability-based Data Aggregation for the Internet of Things. Chinese Journal of Scientific Instrument 31(11), 2636–2640 (2010)
Chang, D., Cho, K., Choi, N., Kwon, T., Choi, Y.: A Probabilistic and Opportunistic Flooding Algorithm in Wireless Sensor Networks. Computer Communications 35(4), 500–506 (2012)
Tang, J.H., Dai, S.S., Li, J.H.: Gossip-based Scalable Directed Diffusion for Wireless Sensor Networks. International Journal of Communication Systems 24(11), 1418–1430 (2011)
Joanna, K., Wendi, H., Hari, B.: Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks. Wireless Networks 8, 169–185 (2002)
Cui, Y.R., Cao, J.H., He, N., Zhu, F.: Energy-efficient Data Query Protocol for Wireless Sensor Network. Application Research of Computers 25(2), 216–217 (2008)
Rappaport, T.: Wireless Communications: Principles and Practice. Prentice Hall Inc., New Jersey (1996)
Heinzelman, W.R., Chandrakasan, A.B., Krishnan, H.: An Application Specific Protocol Architecture for Wireless Micro Sensor Networks. IEEE Trans. on Wireless Communications, 660–670 (2002)
Zhang, J., Xu, L., Xu, D.W.: Secure Clustering Algorithm based on Trust Evaluation in Ad Hoc Network. Computer Application 10(27), 2426–2429 (2007)
Levin, M.S., Zamkovoy, A.: A Multicriteria Steiner Tree with the Cost of Steiner Vertices. Journal of Communications Technology and Electronics 5(12), 1527–1542 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Zeng, M., Jiang, H. (2012). A New Security Routing Algorithm Based on MST for Wireless Sensor Network. In: Shi, Z., Leake, D., Vadera, S. (eds) Intelligent Information Processing VI. IIP 2012. IFIP Advances in Information and Communication Technology, vol 385. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32891-6_41
Download citation
DOI: https://doi.org/10.1007/978-3-642-32891-6_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32890-9
Online ISBN: 978-3-642-32891-6
eBook Packages: Computer ScienceComputer Science (R0)