Sectional Transmission analysis approach for improved reliable transmission and secure routing in wireless sensor networks R. Kingsly Stephen 1 • A. Chandra Sekar 2 • K. Dinakaran 1 Received: 28 December 2017 / Revised: 20 February 2018 / Accepted: 22 February 2018 Ó Springer Science+Business Media, LLC, part of Springer Nature 2018 Abstract Wireless sensor networks have become the backbone of modern information technology, which supports the service oriented architecture in a major activity. There are a number of routing and security protocols recommended for improving the performance of packet transmission. However, is hard to achieve the required performance. Sectional transmission analysis (STA) based approach is proposed in this paper for implementing the performance in reliability of transmission and security in routing. The method performs route discovery initially and collects various routes available to reach the destination. Also the method learns the network topology on the basis of the routes and their parameters. Second, the network has been sectioned into numbers and the transmission analysis is performed at each identified section. STA is performed on the basis of the details available in the routes identified. At the route discovery, each node updates its transmission details, neighbor details, energy details, etc. Using this information, STA is performed on the routes of each section. Based on the result, a single route and a section have been identified for the transmission of the packet. The same has been used for performing various threats involved and identifies a set of malicious nodes present in each sector identified. The approach improves the performance of secure routing and transmission reliability. Keywords WSN Á Reliable routing Á Secure routing Á Routing attacks Á STA Á QoS 1 Introduction Wireless sensor network (WSN) has become the most popular communication device in this decade due to the strength its rapid deployment. It can be deployed in a short time to perform many activities. A number of applications can be noted from the warfield network to industrial monitoring. WSN can be deployed for private purposes also. Modern users access various services through their mobiles and the services can be accessed through the WSN networks. It is a collection of sensor nodes which are dis- tributed in various locations where each has its own transmitter/receiver with a fixed transmission range or radio range and has fixed power. At each transmission, the sensor node would lose a certain amount of joules and can perform only a limited number of transmissions. Similarly, a sensor node can communicate only with the nodes which are located within its transmission range. This makes the transmission in the WSN as cooperative one and if a node has certain data to be sent to the sink node, then it has to transmit the same through the intermediate nodes. However, the intermediate nodes are not fully trust- worthy and the presence of malicious nodes in the route selected would involve various security attacks. For example, if there exists a malicious node which simply performs eavesdrop attack, it simply drops whatever the packets received. This affects the throughput performance and packet delivery ratio. If the protocol does not look for acknowledgement, there will be no retransmission and the entire transmission would fail. In most networks, routing is performed as a source routing approach, which allows the & R. Kingsly Stephen kingsly.stephen@gmail.com A. Chandra Sekar drchandrucse@gmail.com K. Dinakaran kdinacse@gmail.com 1 CSE Department, P.M.R. Engineering College, Chennai, Tamil Nadu, India 2 CSE Department, St. Joseph’s College of Engineering, Chennai, Tamil Nadu, India 123 Cluster Computing https://doi.org/10.1007/s10586-018-2276-y