Enhancing earth observation security through optimized routing in wireless sensor networks
Amani K. Samha
DOI: https://doi.org/10.1007/s12145-024-01365-9
2024-06-27
Earth Science Informatics
Abstract:For secure earth observation, we need an optimised routing protocol that reduces security breaches by improving the coordination of the base with the observatory using a wireless sensor network, thereby improving the earth observation systems for secure communication. One of the technologies that are used for networking is known as a wireless sensor network. In this type of network, sensor nodes are linked together using wireless communication methods. A random and haphazard dispersal of nodes is carried out during the deployment procedure inside the network region. This distribution is carried out throughout the network. The consequence of this is that the distances that separate the nodes do not stay the same. However, the nodes have a severely limited battery life and a restricted range of perception, despite the fact that they have a great sensing capacity. All nodes inside their respective sensing regions may sense the wireless data. A unique routing protocol is essential to increase throughput and Quality of Service (QoS), which will help resolve these problems and improve WSN performance. The Dijkstra method was most frequently used by researchers to discover the shortest route. However, it is not more flexible in terms of WSN routing. The Floyd-Warshall (FW) technique is also employed to choose the shortest path. However, in the current WSN, varied sensors are dispersed throughout several sites and convey data to various coordinators, who are likewise dispersed across countless sites. As a result, the FW technique must be modified to discover the shortest path among any two nodes. In this study, the Improved Floyd-warshall (IFW) algorithm is proposed. Data structures like adjacency lists and sparse vectors are used by the IFW method to describe the WSN graph. When sparse WSNs need less memory, this helps make that possible. The Floyd-Warshall method, which figures out distances between nodes in a network based on their actual lengths, can get even better by adding location information. Using the LEACH method to split the network into smaller groups makes the network more manageable. The LEACH method is then used directly in each cluster to improve both scaling and processing speed. This is done so that the goals can be met. The computer can also handle situations where there is not a legal way to connect two nodes, and it can handle information going both ways between nodes.
geosciences, multidisciplinary,computer science, interdisciplinary applications