Configurable Secured Adaptive Routing Protocol for Mobile Wireless Sensor Networks

Hessa Jassim Al-Junaid, Reham Nemer Almesaeed, Ahmed Ebrahim Alnaser


This paper aims at designing, building, and simulating a secured routing protocol to defend against packet dropping attacks in mobile WSNs (MWSNs). This research addresses the gap in the literature by proposing Configurable Secured Adaptive Routing Protocol (CSARP). CSARP has four levels of protection to allow suitability for different types of network applications. The protocol allows the network admin to configure the required protection level and the ratio of cluster heads to all nodes. The protocol has an adaptive feature, which allows for better protection and preventing the spread of the threats in the network. The conducted CSARP simulations with different conditions showed the ability of CSARP to identify all malicious nodes and remove them from the network. CSARP provided more than 99.97% packets delivery rate with 0% data packet loss in the existence of 3 malicious nodes in comparison with 3.17% data packet loss without using CSARP. When compared with LEACH, CSARP showed an improvement in extending the lifetime of the network by up to 39.5%. The proposed protocol has proven to be better than the available security solutions in terms of configurability, adaptability, optimization for MWSNs, energy consumption optimization, and the suitability for different MWSNs applications and conditions.

Full Text:



R. Silva, Z. Zinonos, J. S. Silva and V. Vassiliou, “Mobility in WSNs for critical applications,” 2011 IEEE Symposium on Computers and Communications (ISCC), 2011.

D. Stevanovic and N. Vlajic, “Performance of IEEE 802.15. 4 in wireless sensor networks with a mobile sink implementing various mobility strategies,” in 2008 33rd IEEE Conference on Local Computer Networks (LCN), 2008.

A. Al-Nasser, R. Almesaeed and H. Al-Junaid, “A Comprehensive Survey on Routing and Security in Mobile Wireless Sensor Networks,” INTL Journal of Electronics and Telecommunications, vol. 67, no. 3, pp. 483-496, 2021.

H. Mohapatra and A. K. Rath, “Fault tolerance in WSN through PE-LEACH protocol,” IET wireless sensor systems, vol. 9, no. 6, pp. 358--365, 2019.

L. Zhou, Y. Fang, Q. Wei, Y. Jin and Z. Hu, “LEACH-TLC: a strategy of reducing and uniform energy consumption based on target location constraint,” IET Wireless Sensor Systems, vol. 9, no. 6, pp. 347--357, 2019.

A. Rady, M. Shokair, E.-S. M. El-Rabaie, W. Saad and A. Benaya, “Energy-efficient routing protocol based on sink mobility for wireless sensor networks,” IET Wireless Sensor Systems, vol. 9, no. 6, pp. 405--415, 2019.

H. Al-Behadili, S. AlWane, Y. Al-Yasir, N. Ojaroudi Parchin, P. Olley and R. A. Abd-Alhameed, “The use of multiple mobile sinks in wireless sensor networks for large scale areas,” IET Digital Library, 2020.

H. Mohapatra and A. K. Rath, “Fault tolerance in WSN through PE-LEACH protocol,” IET wireless sensor systems, vol. 9, no. 6, pp. 358--365, 2019.

J. Yin and S. K. Madria, “A hierarchical secure routing protocol against black hole attacks in sensor networks,” in IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06), 2006.

S. Shahabi, M. Ghazvini and M. Bakhtiarian, “A modified algorithm to improve security and performance of AODV protocol against black hole attack,” Wireless Networks, vol. 22, no. 5, pp. 1505-1511, 2016.

L. Teng and Y. Zhang, “SeRA: a secure routing algorithm against sinkhole attacks for mobile wireless sensor networks,” in 2010 Second International Conference on Computer Modeling and Simulation, 2010.

V. B. Salve, L. Ragha and N. Marathe, “An Enhanced Secure Routing Algorithm Against Sinkhole Attack In Wireless Sensor Networks,” International Journal of Advanced Computational Engineering and Networking, vol. 2, no. 8, pp. 62-67, 2014.

D. B. Vishwas, C. Chinnaswamy and T. Sreenivas, “An Improved Detection and Mitigation Approach of Sinkhole in,” International Research Journal of Engineering and Technology (IRJET), vol. 3, no. 6, pp. 808-811, 2016.

Z. Karakehayov, “Using REWARD to detect team black-hole attacks in wireless sensor networks,” Wksp. Real-World Wireless Sensor Networks, 2005.

S. Dokurer, “Simulation of Black hole attack in wireless Ad-hoc networks,” Atılım University, 2006.

V. V.Kumar and R. R.Kumar, “An adaptive approach for detection of blackhole attack in mobile ad hoc network (ICCC-2015),” International Conference on Intelligent Computing, Communication & Convergence, 2015.

A. Mathur, T. Newe and M. Rao, “Defence against black hole and selective forwarding attacks for medical WSNs in the IoT,” Sensors, vol. 16, no. 1, p. 118, 2016.

S. D. Roy, S. A. Singh, S. Choudhury and N. C. Debnath, “Countering sinkhole and black hole attacks on sensor networks using dynamic trust management,” in 2008 IEEE Symposium on Computers and Communications, 2008.

M. Motamedi and N. Yazdani, “Detection of black hole attack in wireless sensor network using UAV,” 2015 7th Conference on Information and Knowledge Technology (IKT), 2015.

H. Gao, R. Wu, M. Cao and C. Zhang, “Detection and defense technology of blackhole attacks in wireless sensor network,” in International Conference on Algorithms and Architectures for Parallel Processing, 2014.

C. Panos, C. Ntantogian, S. Malliaros and C. Xenakis, “Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks,” Computer Networks, vol. 113, pp. 94-110, 2017.

N. Arya, U. Singh and S. Singh, “Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm,” in 2015 International Conference on Computer, Communication and Control (IC4), 2015.

D. Virmani, A. Soni and N. Batra, “Reliability analysis to overcome black hole attack in wireless sensor network,” arXiv preprint arXiv:1401.2540, 2014.

N. Mistry, D. C. Jinwala, M. Zaveri and others, “Improving AODV protocol against blackhole attacks,” Proceedings of the international multi conference of engineers and computer scientists, 2010.

P. N. Raj and P. B. Swadas, “Dpraodv: A dyanamic learning system against blackhole attack in aodv based manet,” arXiv preprint arXiv:0909.2371, 2009.

L. Tamilselvan and V. Sankaranarayanan, “Prevention of co-operative black hole attack in MANET.,” Journal of Networks (JNW), vol. 3, no. 5, pp. 13-20, 2008.

S. S. Ramaswami and S. Upadhyaya, “Smart handling of colluding black hole attacks in MANETs and wireless sensor networks using multipath routing,” IEEE workshop on Info. Assurance. USA, 2006.

S. Athmani, D. E. Boubiche and A. Bilami, “Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs,” in 2013 World Congress on Computer and Information Technology (WCCIT), 2013.

A. A.Dhaka, A. Nandal and R. S. R.Dhaka, “Gray and black hole attack identification using control packets in MANETs,” Procedia Computer Science, vol. 54, pp. 83-91, 2015.

P. Yadav, R. K. Gill and N. Kumar, “A fuzzy based approach to detect black hole attack,” International Journal of Soft Computing and Engineering (IJSCE), pp. 2231-2307, 2012.

R. Shree, S. K. Dwivedi and R. P. Pandey, “Design Enhancements in ZRP for Detecting Multiple Black Hole Nodes in Mobile Ad Hoc Networks,” International Journal of Computer Applications, vol. 18, no. 5, pp. 6-10, 2011.

D. Virmani, M. Hemrajani, S. Chandel and others, “Exponential trust based mechanism to detect black hole attack in wireless sensor network,” arXiv preprint arXiv:1401.2541, p. 2014.

V. F. Taylor and D. T. Fokum, “Mitigating black hole attacks in wireless sensor networks using node-resident expert systems,” 2014 wireless telecommunications symposium, 2014.

C. Wang, T. Feng, J. Kim, G. Wang and W. Zhang, “Catching packet droppers and modifiers in wireless sensor networks,” 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2009.

S. Misra, K. Bhattarai and G. Xue, “BAMBi: Blackhole attacks mitigation with multiple base stations in wireless sensor networks,” 2011 IEEE international conference on communications (ICC), 2011.

J. Shi, X. Wei and W. Zhu, “An efficient algorithm for energy management in wireless sensor networks via employing multiple mobile sinks,” International Journal of Distributed Sensor Networks, vol. 12, no. 1, 2016.

W. J. Chung and T. H. Cho, “A Multi-Path Routing Determination Method for Improving the Energy Efficiency in Selective Forwarding

Attack Detection Based MWSNs,” International Journal of Wireless & Mobile Networks (IJWMN), vol. 10, no. 4, pp. 9-19, August 2018.

A. Nazari, “Wireless Sensor Networks Simulation,” MATLAB Central File Exchange, 2018.

T. C. Hung and H. H. Trung, “Energy Savings in Applications for Wireless Sensor Networks Time Critical Requirements,” International Journal of Computer Networks & Communications (IJCNC), vol. 8, no. 4, July 2016.


  • There are currently no refbacks.

International Journal of Electronics and Telecommunications
is a periodical of Electronics and Telecommunications Committee
of Polish Academy of Sciences

eISSN: 2300-1933