Configurable Secured Adaptive Routing Protocol for Mobile Wireless Sensor Networks


  • Hessa Jassim Al-Junaid Assistant Professor | Dept. Computer Engineering | College of Information Technology | University of Bahrain
  • Reham Nemer Almesaeed Assistant Professor | Dept. Computer Engineering | College of Information Technology University of Bahrain
  • Ahmed Ebrahim Alnaser College of Information Technology | University of Bahrain


This paper aims at designing, building, and simulating a secured routing protocol to defend against packet dropping attacks in mobile WSNs (MWSNs). This research addresses the gap in the literature by proposing Configurable Secured Adaptive Routing Protocol (CSARP). CSARP has four levels of protection to allow suitability for different types of network applications. The protocol allows the network admin to configure the required protection level and the ratio of cluster heads to all nodes. The protocol has an adaptive feature, which allows for better protection and preventing the spread of the threats in the network. The conducted CSARP simulations with different conditions showed the ability of CSARP to identify all malicious nodes and remove them from the network. CSARP provided more than 99.97% packets delivery rate with 0% data packet loss in the existence of 3 malicious nodes in comparison with 3.17% data packet loss without using CSARP. When compared with LEACH, CSARP showed an improvement in extending the lifetime of the network by up to 39.5%. The proposed protocol has proven to be better than the available security solutions in terms of configurability, adaptability, optimization for MWSNs, energy consumption optimization, and the suitability for different MWSNs applications and conditions.

Author Biographies

Hessa Jassim Al-Junaid, Assistant Professor | Dept. Computer Engineering | College of Information Technology | University of Bahrain

Hessa Al-Junaid is an assistant professor of computer engineering in the College of Information Technology, University of Bahrain. She received the B.Sc. and M.Sc. degrees in Electrical Engineering from the University of Bahrain and obtained the Ph.D. degree from the University of Southampton, UK. She holds a postgraduate certificate in academic practice from the University of York Saint Jones, UK. Al-Junaid was a chairperson for the Computer Engineering department. Her research interests include modeling and simulation of mixed-signal circuits and systems and mixed-disciplinary systems, brainwaves modeling and analysis for Brain Machine Interface and robotics applications. Al-Junaid is an active member in the Bahrain Society of Engineers and in the Institution of Engineering and Technology IET, UK. Al-Junaid is a fellow of the Higher Education Academy HEA, UK. Al-Junaid represented Bahrain in the International Visitor Leadership Program IVLP themed advancing women in STEAM fields, USA.

Reham Nemer Almesaeed, Assistant Professor | Dept. Computer Engineering | College of Information Technology University of Bahrain

Reham Almesaeed received her B.Sc. in computer engineering from IT College, University of Bahrain, in 2008, and her M.Sc and PhD degrees in electrical engineering from the University of Bristol, United Kingdom, in 2010 and 2017 respectively. She is currently an assistant professor in the Computer Engineering Department at the University of Bahrain and a research associate at University of Bristol, UK. Her research interests include wireless channel modeling, wireless local area networks, Wireless sensor networks, Long Term Evolution & fifth-generation communications systems, mmWave communications, and massive MIMO. She is a board member on the IEEE ComSoc, Bahrain chapter, and WiBD in Bahrain. She also an associate editor in the IJCDS journal.

Ahmed Ebrahim Alnaser, College of Information Technology | University of Bahrain

Ahmed Alnaser received the B.Sc. degree in computer science and the M.Sc. degree in cybersecurity from the University of Bahrain. His research interests include securing routing protocols in mobile wireless sensor networks, packet dropping attacks in MWSN, securing server-less infrastructure, and smart devices cybersecurity.

Alnaser is the head of information and network team and has been working in the information technology field since 2004.


R. Silva, Z. Zinonos, J. S. Silva and V. Vassiliou, “Mobility in WSNs for critical applications,” 2011 IEEE Symposium on Computers and Communications (ISCC), 2011.

D. Stevanovic and N. Vlajic, “Performance of IEEE 802.15. 4 in wireless sensor networks with a mobile sink implementing various mobility strategies,” in 2008 33rd IEEE Conference on Local Computer Networks (LCN), 2008.

A. Al-Nasser, R. Almesaeed and H. Al-Junaid, “A Comprehensive Survey on Routing and Security in Mobile Wireless Sensor Networks,” INTL Journal of Electronics and Telecommunications, vol. 67, no. 3, pp. 483-496, 2021.

H. Mohapatra and A. K. Rath, “Fault tolerance in WSN through PE-LEACH protocol,” IET wireless sensor systems, vol. 9, no. 6, pp. 358--365, 2019.

L. Zhou, Y. Fang, Q. Wei, Y. Jin and Z. Hu, “LEACH-TLC: a strategy of reducing and uniform energy consumption based on target location constraint,” IET Wireless Sensor Systems, vol. 9, no. 6, pp. 347--357, 2019.

A. Rady, M. Shokair, E.-S. M. El-Rabaie, W. Saad and A. Benaya, “Energy-efficient routing protocol based on sink mobility for wireless sensor networks,” IET Wireless Sensor Systems, vol. 9, no. 6, pp. 405--415, 2019.

H. Al-Behadili, S. AlWane, Y. Al-Yasir, N. Ojaroudi Parchin, P. Olley and R. A. Abd-Alhameed, “The use of multiple mobile sinks in wireless sensor networks for large scale areas,” IET Digital Library, 2020.

H. Mohapatra and A. K. Rath, “Fault tolerance in WSN through PE-LEACH protocol,” IET wireless sensor systems, vol. 9, no. 6, pp. 358--365, 2019.

J. Yin and S. K. Madria, “A hierarchical secure routing protocol against black hole attacks in sensor networks,” in IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06), 2006.

S. Shahabi, M. Ghazvini and M. Bakhtiarian, “A modified algorithm to improve security and performance of AODV protocol against black hole attack,” Wireless Networks, vol. 22, no. 5, pp. 1505-1511, 2016.

L. Teng and Y. Zhang, “SeRA: a secure routing algorithm against sinkhole attacks for mobile wireless sensor networks,” in 2010 Second International Conference on Computer Modeling and Simulation, 2010.

V. B. Salve, L. Ragha and N. Marathe, “An Enhanced Secure Routing Algorithm Against Sinkhole Attack In Wireless Sensor Networks,” International Journal of Advanced Computational Engineering and Networking, vol. 2, no. 8, pp. 62-67, 2014.

D. B. Vishwas, C. Chinnaswamy and T. Sreenivas, “An Improved Detection and Mitigation Approach of Sinkhole in,” International Research Journal of Engineering and Technology (IRJET), vol. 3, no. 6, pp. 808-811, 2016.

Z. Karakehayov, “Using REWARD to detect team black-hole attacks in wireless sensor networks,” Wksp. Real-World Wireless Sensor Networks, 2005.

S. Dokurer, “Simulation of Black hole attack in wireless Ad-hoc networks,” Atılım University, 2006.

V. V.Kumar and R. R.Kumar, “An adaptive approach for detection of blackhole attack in mobile ad hoc network (ICCC-2015),” International Conference on Intelligent Computing, Communication & Convergence, 2015.

A. Mathur, T. Newe and M. Rao, “Defence against black hole and selective forwarding attacks for medical WSNs in the IoT,” Sensors, vol. 16, no. 1, p. 118, 2016.

S. D. Roy, S. A. Singh, S. Choudhury and N. C. Debnath, “Countering sinkhole and black hole attacks on sensor networks using dynamic trust management,” in 2008 IEEE Symposium on Computers and Communications, 2008.

M. Motamedi and N. Yazdani, “Detection of black hole attack in wireless sensor network using UAV,” 2015 7th Conference on Information and Knowledge Technology (IKT), 2015.

H. Gao, R. Wu, M. Cao and C. Zhang, “Detection and defense technology of blackhole attacks in wireless sensor network,” in International Conference on Algorithms and Architectures for Parallel Processing, 2014.

C. Panos, C. Ntantogian, S. Malliaros and C. Xenakis, “Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks,” Computer Networks, vol. 113, pp. 94-110, 2017.

N. Arya, U. Singh and S. Singh, “Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm,” in 2015 International Conference on Computer, Communication and Control (IC4), 2015.

D. Virmani, A. Soni and N. Batra, “Reliability analysis to overcome black hole attack in wireless sensor network,” arXiv preprint arXiv:1401.2540, 2014.

N. Mistry, D. C. Jinwala, M. Zaveri and others, “Improving AODV protocol against blackhole attacks,” Proceedings of the international multi conference of engineers and computer scientists, 2010.

P. N. Raj and P. B. Swadas, “Dpraodv: A dyanamic learning system against blackhole attack in aodv based manet,” arXiv preprint arXiv:0909.2371, 2009.

L. Tamilselvan and V. Sankaranarayanan, “Prevention of co-operative black hole attack in MANET.,” Journal of Networks (JNW), vol. 3, no. 5, pp. 13-20, 2008.

S. S. Ramaswami and S. Upadhyaya, “Smart handling of colluding black hole attacks in MANETs and wireless sensor networks using multipath routing,” IEEE workshop on Info. Assurance. USA, 2006.

S. Athmani, D. E. Boubiche and A. Bilami, “Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs,” in 2013 World Congress on Computer and Information Technology (WCCIT), 2013.

A. A.Dhaka, A. Nandal and R. S. R.Dhaka, “Gray and black hole attack identification using control packets in MANETs,” Procedia Computer Science, vol. 54, pp. 83-91, 2015.

P. Yadav, R. K. Gill and N. Kumar, “A fuzzy based approach to detect black hole attack,” International Journal of Soft Computing and Engineering (IJSCE), pp. 2231-2307, 2012.

R. Shree, S. K. Dwivedi and R. P. Pandey, “Design Enhancements in ZRP for Detecting Multiple Black Hole Nodes in Mobile Ad Hoc Networks,” International Journal of Computer Applications, vol. 18, no. 5, pp. 6-10, 2011.

D. Virmani, M. Hemrajani, S. Chandel and others, “Exponential trust based mechanism to detect black hole attack in wireless sensor network,” arXiv preprint arXiv:1401.2541, p. 2014.

V. F. Taylor and D. T. Fokum, “Mitigating black hole attacks in wireless sensor networks using node-resident expert systems,” 2014 wireless telecommunications symposium, 2014.

C. Wang, T. Feng, J. Kim, G. Wang and W. Zhang, “Catching packet droppers and modifiers in wireless sensor networks,” 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2009.

S. Misra, K. Bhattarai and G. Xue, “BAMBi: Blackhole attacks mitigation with multiple base stations in wireless sensor networks,” 2011 IEEE international conference on communications (ICC), 2011.

J. Shi, X. Wei and W. Zhu, “An efficient algorithm for energy management in wireless sensor networks via employing multiple mobile sinks,” International Journal of Distributed Sensor Networks, vol. 12, no. 1, 2016.

W. J. Chung and T. H. Cho, “A Multi-Path Routing Determination Method for Improving the Energy Efficiency in Selective Forwarding

Attack Detection Based MWSNs,” International Journal of Wireless & Mobile Networks (IJWMN), vol. 10, no. 4, pp. 9-19, August 2018.

A. Nazari, “Wireless Sensor Networks Simulation,” MATLAB Central File Exchange, 2018.

T. C. Hung and H. H. Trung, “Energy Savings in Applications for Wireless Sensor Networks Time Critical Requirements,” International Journal of Computer Networks & Communications (IJCNC), vol. 8, no. 4, July 2016.






Wireless and Mobile Communications