Cluster head selection and malicious node detection using large-scale energy-aware trust optimization algorithm for HWSN

Rahul Das1, Mona Dwivedi1
1Department of Computer Science, Mansarovar Global University, Sehore, India

Tóm tắt

The widespread use of hierarchical wireless sensor networks (HWSN) in various industries, including environmental monitoring, healthcare, and intrusion detection, has made the development of trust among sensor nodes (SNs) essential for enhancing security, dependability, and productive cooperation. However, the existing techniques for HWSN trust management are ineffective because of their poor reliability, increased communication overheads, inaccurate cluster head (CH) selection, etc. The large-scale energy-aware trust optimization (LS-EATO) algorithm is proposed for CH selection and malicious node (MN) detection to avoid these issues. A harmonic search genetic algorithm (HGA) is initially used to select the CH based on energy, trust, distance, and density. By considering trust value, this method avoids the selection of an MN node as the CH. Afterward, MNs are detected using the energy-aware intra and inter-cluster trust (EAIICT) estimation model, which depends on two modules, such as direct trust (DT) and indirect trust (IDT) at the inter-cluster level and intra-cluster level. During this process, the estimation of DT depends upon the communication trust and the data trust. Then the estimation of IDT is based on the feedback trust. This model calculates trust in distributed and centralized ways to find the MNs. Additionally, by considering residual energy (RE) in the trust computation, this estimation approach prevents choosing nodes with low energy as the trustworthy node. Furthermore, the proposed LS-EATO technique is simulated in MATLAB and compared to the existing approaches to show the effectiveness of the proposed approach. The experimental analysis represents the trustworthiness of the proposed scheme in terms of communication overhead, detection accuracy, detection rate, and energy consumption for different network sizes.

Tài liệu tham khảo

She W, Liu Q, Tian Z, Chen JS, Wang B, Liu W (2019) Blockchain trust model for malicious node detection in wireless sensor networks. IEEE Access 7:38947–38956 Yang H, Zhang X, Cheng F (2020) A novel algorithm for improving malicious node detection effect in wireless sensor networks. Mobile Netw Appl. https://doi.org/10.1007/s11036-019-01492-4 Jaint B, Indu S, Pandey N, Pahwa K (2019) Malicious Node Detection in Wireless Sensor Networks Using Support Vector Machine. In 2019 3rd International Conference on Recent Developments in Control, Automation & Power Engineering (RDCAPE) IEEE, 247–252 Yang H, Zhang X, Cheng F (2019) A novel wireless sensor networks malicious node detection method. In International Conference on Security and Privacy in New Computing Environments. Springer, Cham, 697–706 Teng Z, Pang B, Sun M, Xie L, Guo L (2021) A malicious node identification strategy with environmental parameters optimization in wireless sensor network. Wireless Pers Commun 117(2):1143–1162 Gandhimathi L, Murugaboopathi G (2021) Mobile malicious node detection using mobile agent in cluster-based wireless sensor networks. Wireless Pers Commun 117(2):1209–1222 Alghamdi TA (2019) Convolutional technique for enhancing security in wireless sensor networks against malicious nodes. HCIS 9(1):1 Zhang W, Zhu S, Tang J, Xiong N (2018) A novel trust management scheme based on Dempster-Shafer evidence theory for malicious nodes detection in wireless sensor networks. J Supercomput 74(4):1779–1801 Kumar S, Mehfuz S (2019) A PSO based malicious node detection and energy efficient clustering in wireless sensor network. In 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN) IEEE, 859–863 Al-Maslamani N, Abdallah M (2020) Malicious node detection in wireless sensor network using swarm intelligence optimization. In 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) IEEE, 219–224 Gomathi S, Krishnan CG (2020) Malicious node detection in wireless sensor networks using an efficient secure data aggregation protocol. Wireless Pers Commun 113(4):1775–1790 Jamshidi M, Zangeneh E, Esnaashari M, Darwesh AM, Meybodi MR (2019) A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it. Wireless Pers Commun 105(1):145–173 Prithi S, Sumathi S (2020) LD2FA-PSO: a novel learning dynamic deterministic finite automata with PSO algorithm for secured energy efficient routing in wireless sensor network. Ad Hoc Netw 97:102024 Ghugar U, Pradhan J, Bhoi SK, Sahoo RR, Panda SK (2018) PL-IDS: physical layer trust based intrusion detection system for wireless sensor networks. Int J Inf Technol 10(4):489–494 Khan T, Singh K, Abdel-Basset M, Long HV, Singh SP, Manjul M (2019) A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks. IEEE Access 7:58221–58240 Gao M, Wu Y, Nan J, Cui S (2019) Multimedia detection algorithm of malicious nodes in intelligent grid based on fuzzy logic. Multimed Tools Appl 78(17):24011–24022 Gao B, Maekawa T, Amagata D, Hara T (2018) Environment-adaptive malicious node detection in MANETs with ensemble learning. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) IEEE, 556–566 Anwar RW, Zainal A, Outay F, Yasar A, Iqbal S (2019) BTEM: belief based trust evaluation mechanism for wireless sensor networks. Futur Gener Comput Syst 96:605–616 Sharma N, Sharma M, Sharma DP (2020) A Trust based scheme for spotting malicious node of wormhole in dynamic source routing protocol. In 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) IEEE, 1232–1237 Ma Z, Liu L, Meng W (2020) DCONST: detection of multiple-mix-attack malicious nodes using consensus-based trust in IoT networks. In Australasian Conference on Information Security and Privacy, Springer, Cham. 247–267 Yin X (2019) Li S (2019) Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networks. EURASIP J Wirel Commun Netw 1:1 Das R, Dash D, Sarkar MK (2020) HTMS: fuzzy based hierarchical trust management scheme in WSN. Wireless Pers Commun. https://doi.org/10.1007/s11277-020-07092-w Mirsadeghi F, Rafsanjani MK, Gupta BB (2021) A trust infrastructure based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Netw Appl 14(4):2537–2553 Swaroop GV, Murugaboopathi G (2019) Secure and reliable communication scheme for MANET using ECMS cluster head-based certificate revocation. Clust Comput 22(5):11513–11525 Zahedi A, Parma F (2019) An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Netw Appl 12(1):167–176 Saidi A, Benahmed K, Seddiki N (2020) Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks. Ad Hoc Netw 106:102215 Kalidoss T, Rajasekaran L, Kanagasabai K, Sannasi G, Kannan A (2020) QoS aware trust based routing algorithm for wireless sensor networks. Wireless Pers Commun 110(4):1637–1658 Shahraki A, Taherkordi A, Haugen Ø, Eliassen F (2020) Clustering objectives in wireless sensor networks: a survey and research direction analysis. Comput Netw 180:107376 Shahraki A, Taherkordi A, Haugen Ø, Eliassen F (2020) A survey and future directions on clustering: from WSNs to IoT and modern networking paradigms. IEEE Trans Netw Serv Manag 18(2):2242–2274