A Novel Clustering Protocol Based on Willow Butterfly Algorithm for Diffusing Data in Wireless Sensor Networks

Allahverdi Mamaghani, Alireza1, Ebrahimi Dishabi, Mohammad Reza1, Tabatabaei, Shayesteh2, Abdollahi Azgomi, Mohammad1
1Department of Computer Engineering, Miyaneh Branch, Islamic Azad University, Miyaneh, Iran
2Department of Computer Engineering, Higher Education Complex of Saravan, Saravan, Iran

Tóm tắt

Mobile sensor networks consist of a set of mobile sensor nodes, which establish wireless communications within a specific area. In WSNs, mobile sensor nodes can sense the physical status of a given environment, process information and report them to the sink node or the base station. Due to nodes’ movements, these networks do not have a fixed infrastructure. There is no centralized controlling infrastructure for wireless sensor networks and different nodes are at relative liberty for joining and leaving network. Furthermore, due to the specific applications of these networks, it is highly probable that malicious nodes may exist in the network. The available malicious nodes in these networks do not follow the general principles, which dominate the execution of the routing protocols. They make hostile changes and abuse the rules, so as to disrupt the normal functioning of the routing protocols. In this way, malicious nodes aim to demolish the network or they refuse to cooperate fully with other available nodes in the network so that they can preserve their own limited energy. Consequently, they would like to destroy the possibility for providing services for some users. In order to ensure routing security in sensor networks and consider their fundamental challenge, i.e. nodes’ optimal power consumption, we proposed clustering-based secure routing protocol by capitalizing on willow butterfly algorithm. It has three phases, i.e. clustering, encryption and routing. The results of simulating the proposed method using OPNET showed its better performance in terms of power consumption, data transmission delay and access delay to media, data-packet loss rate by destructive nodes and productivity rate.

Từ khóa


Tài liệu tham khảo

Wang, Y., Chen, J., Jin, Q., & Ma, J. (2016). Message forwarding strategies in device-to-device based mobile social networking in proximity (msnp). In 2016 IEEE 14th international conference on dependable, autonomic and secure computing, 14th international conference on pervasive intelligence and computing, 2nd international conference on big data intelligence and computing and cyber science and technology congress (DASC/PiCom/DataCom/CyberSciTech) (pp. 69–74). IEEE.‏ Li, P., & Lu, R. (2015). A sybil attack detection scheme for privacy-preserving mobile social networks. In 2015 10th international conference on information, communications and signal processing (ICICS) (pp. 1–5). IEEE.‏ citation_journal_title=IEEE Communications Magazine; citation_title=A unifying perspective on proximity-based cellular-assisted mobile social networking; citation_author=S Andreev, J Hosek, T Olsson, K Johnsson, A Pyattaev, A Ometov; citation_volume=54; citation_issue=4; citation_publication_date=2016; citation_pages=108-116; citation_doi=10.1109/MCOM.2016.7452274; citation_id=CR3 citation_journal_title=Computers & Electrical Engineering; citation_title=Energy efficient multipath data transfer scheme to mitigate false data injection attack in wireless sensor networks; citation_author=SA Jeba, B Paramasivan; citation_volume=39; citation_issue=6; citation_publication_date=2013; citation_pages=1867-1879; citation_doi=10.1016/j.compeleceng.2013.03.019; citation_id=CR4 citation_journal_title=Washington and Lee Law Review; citation_title=Privacy and freedom; citation_author=AF Westin; citation_volume=25; citation_issue=1; citation_publication_date=1968; citation_pages=166; citation_id=CR5 citation_journal_title=IEEE Communications Magazine; citation_title=Safebook: A privacy-preserving online social network leveraging on real-life trust; citation_author=LA Cutillo, R Molva, T Strufe; citation_volume=47; citation_issue=12; citation_publication_date=2009; citation_pages=94-101; citation_doi=10.1109/MCOM.2009.5350374; citation_id=CR6 citation_journal_title=Journal of the American Society for Information Science and Technology; citation_title=CoPE: Enabling collaborative privacy management in online social networks; citation_author=AC Squicciarini, H Xu, X Zhang; citation_volume=62; citation_issue=3; citation_publication_date=2011; citation_pages=521-534; citation_id=CR7 citation_journal_title=IEEE Communications Surveys & Tutorials; citation_title=A survey on mobile social networks: Applications, platforms, system architectures, and future research directions; citation_author=X Hu, TH Chu, VC Leung, ECH Ngai, P Kruchten, HC Chan; citation_volume=17; citation_issue=3; citation_publication_date=2014; citation_pages=1557-1581; citation_doi=10.1109/COMST.2014.2371813; citation_id=CR8 citation_journal_title=Future Generation Computer Systems; citation_title=Security-oriented opportunistic data forwarding in mobile social networks; citation_author=D Wu, F Zhang, H Wang, R Wang; citation_volume=87; citation_publication_date=2018; citation_pages=803-815; citation_doi=10.1016/j.future.2017.07.028; citation_id=CR9 citation_journal_title=Computers in Human Behavior; citation_title=Information privacy in online social networks: Uses and gratification perspective; citation_author=A Heravi, S Mubarak, KKR Choo; citation_volume=84; citation_publication_date=2018; citation_pages=441-459; citation_doi=10.1016/j.chb.2018.03.016; citation_id=CR10 citation_journal_title=Wireless Personal Communications; citation_title=Reliable routing algorithm based on clustering and mobile sink in wireless sensor networks; citation_author=S Tabatabaei, AM Rigi; citation_volume=108; citation_issue=4; citation_publication_date=2019; citation_pages=2541-2558; citation_doi=10.1007/s11277-019-06537-1; citation_id=CR11 Sharma, R., Vashisht, V., & Singh, U. (2019). Fuzzy modelling based energy aware clustering in wireless sensor networks using modified invasive weed optimization. Journal of King Saud University-Computer and Information Sciences.‏ citation_journal_title=Computers & Security; citation_title=Composition attack against social network data; citation_author=J Medková; citation_volume=74; citation_publication_date=2018; citation_pages=115-129; citation_doi=10.1016/j.cose.2018.01.002; citation_id=CR13 citation_journal_title=Future Generation Computer Systems; citation_title=Privacy-preserving wireless communications using bipartite matching in social big data; citation_author=M Qiu, K Gai, Z Xiong; citation_volume=87; citation_publication_date=2018; citation_pages=772-781; citation_doi=10.1016/j.future.2017.08.004; citation_id=CR14 citation_journal_title=IEEE Access; citation_title=Mobile social networking under side-channel attacks: Practical security challenges; citation_author=A Ometov, A Levina, P Borisenko, R Mostovoy, A Orsino, S Andreev; citation_volume=5; citation_publication_date=2017; citation_pages=2591-2601; citation_doi=10.1109/ACCESS.2017.2665640; citation_id=CR15 citation_journal_title=IEEE Systems Journal; citation_title=A survey of mobile social networks: Applications, social characteristics, and challenges; citation_author=T Qiu, B Chen, AK Sangaiah, J Ma, R Huang; citation_volume=12; citation_issue=4; citation_publication_date=2017; citation_pages=3932-3947; citation_doi=10.1109/JSYST.2017.2764479; citation_id=CR16 citation_journal_title=Computers in Human Behavior; citation_title=Information privacy, consumer alienation, and lurking behavior in social networking sites; citation_author=J Ortiz, WH Chih, FS Tsai; citation_volume=80; citation_publication_date=2018; citation_pages=143-157; citation_doi=10.1016/j.chb.2017.11.005; citation_id=CR17 citation_journal_title=Future Generation Computer Systems; citation_title=Modeling of large-scale social network services based on mechanisms of information diffusion: Sina weibo as a case study; citation_author=R Wang, S Rho, BW Chen, W Cai; citation_volume=74; citation_publication_date=2017; citation_pages=291-301; citation_doi=10.1016/j.future.2016.03.018; citation_id=CR18 citation_journal_title=Future Generation Computer Systems; citation_title=ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks; citation_author=X Ma, J Ma, H Li, Q Jiang, S Gao; citation_volume=79; citation_publication_date=2018; citation_pages=82-94; citation_doi=10.1016/j.future.2017.09.060; citation_id=CR19 citation_journal_title=Wireless Personal Communications; citation_title=FSCVG: A fuzzy semi-distributed clustering using virtual grids in WSN; citation_author=A Mazinani, SM Mazinani, S Hasanabadi; citation_volume=118; citation_issue=2; citation_publication_date=2021; citation_pages=1017-1038; citation_doi=10.1007/s11277-020-08056-w; citation_id=CR20 citation_journal_title=Wireless Personal Communications; citation_title=A novel QoS based secure unequal clustering protocol with intrusion detection system in wireless sensor networks; citation_author=M Maheswari, RA Karthika; citation_volume=118; citation_issue=2; citation_publication_date=2021; citation_pages=1535-1557; citation_doi=10.1007/s11277-021-08101-2; citation_id=CR21 citation_journal_title=Wireless Personal Communications; citation_title=Learning-based security technique for selective forwarding attack in clustered WSN; citation_author=S Singh, HS Saini; citation_volume=118; citation_issue=1; citation_publication_date=2021; citation_pages=789-814; citation_doi=10.1007/s11277-020-08044-0; citation_id=CR22 citation_journal_title=Wireless Personal Communications; citation_title=An efficient and secure data forwarding mechanism for opportunistic IoT; citation_author=N Kandhoul, SK Dhurandher; citation_volume=118; citation_issue=1; citation_publication_date=2021; citation_pages=217-237; citation_doi=10.1007/s11277-020-08010-w; citation_id=CR23 Radhika, S., & Rangarajan, P. (2021). Fuzzy based sleep scheduling algorithm with machine learning techniques to enhance energy efficiency in wireless sensor networks. Wireless Personal Communications, 1–20. Zardosht, M. J., & Parhizgar, N. (2021). Energy optimization in multi-hop wireless sensor networks based on proposed harmony search routing algorithm. Wireless Personal Communications, 1–15. citation_journal_title=Memetic Comp.; citation_title=Moth search algorithm: A bio-inspired metaheuristic algorithm for global optimization problems; citation_author=G Wang; citation_volume=10; citation_publication_date=2018; citation_pages=151-164; citation_doi=10.1007/s12293-016-0212-3; citation_id=CR26 citation_journal_title=Knowledge-based systems; citation_title=Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm; citation_author=S Mirjalili; citation_volume=89; citation_publication_date=2015; citation_pages=228-249; citation_doi=10.1016/j.knosys.2015.07.006; citation_id=CR27