Trust aware secured energy efficient fuzzy clustering-based protocol in wireless sensor networks

Soft Computing - Trang 1-12 - 2023
Bhukya Kranthikumar1, R. Leela Velusamy1
1Department of Computer Science and Engineering, National Institute of Technology, Tiruchirappalli, India

Tóm tắt

Recent advancements in Wireless Sensor Networks (WSNs) have generated interest in the field of sensor tracking events. Environment monitoring is one of the most important applications where WSNs are used to guarantee animal conservation. WSNs are crucial in many real-time applications because of their topology, scale, and communication capabilities. Data privacy and integrity are the essential components that maximize network, security, trust and effectiveness. The fundamental problem with WSNs is the effective communication and efficient information to exchange among several sensor nodes for extending the lifespan of the WSNs. Moreover, along with these issues, it is necessary to measure an optimal path with the highest degree of reliability. In this paper, a new fuzzy and secured clustering algorithm is proposed for improving the energy efficiency and security. In the proposed method, clustering is proved to be the best strategy for energy management of WSN metrics because it uses trust-based fuzzy logic to find malicious nodes and selecting reliable path for data communication. The simulation results show that the proposed technique detects progress in relation to a variety of performance parameters. When compared to other various existing protocols, the proposed work reduces energy consumption while increasing network lifetime and security of communication.

Tài liệu tham khảo

Arjunan S, Sujatha P (2018) Lifetime maximization of wireless sensor network using fuzzy based unequal clustering and ACO based routing hybrid protocol. Appl Intell 48(8):2229–2246 Arjunan S, Pothula S, Ponnurangam D (2018) F5N-based unequal clustering protocol (F5NUCP) for wireless sensor networks. Int J Commun Syst 31(17):e3811 Augustine S, Ananth JP (2020) Taylor kernel fuzzy C-means clustering algorithm for trust and energy-aware cluster head selection in wireless sensor networks. Wirel Netw 26(7):5113–5132 Balakrishnan N, Rajendran A, Pelusi D, Ponnusamy V (2019) Deep belief network enhanced intrusion detection system to prevent security breach in the internet of things. In: Internet of things, p 100112 Duan J, Yang D, Zhu H, Zhang S, Zhao J (2014) TSRF: A trust-aware secure routing framework in wireless sensor networks. Int J Distrib Sens Netw 10:1–14 Lian H, Wang G, Wang Q (2018) Fully secure traceable and revocable-storage attribute-based encryption with short update keys via subset difference method In: 2018 third international conference on security of smart cities, industrial control system and communications (SSIC), Shanghai, pp 1–8, https://doi.org/10.1109/SSIC.2018.8556734 Ganesh S, Amutha R (2013) Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms. J Commun Netw 15(4):422–429 Ganta SR, Rao NNM (2020) A Novel trust based node integrity verification and privacy preservingmodel for dynamic WSNs. Turk J Comput Math Educ (TURCOMAT) 11(3):1136–1151 Gu W, Dutta N, Chellappan S, Bai X (2011) Providing end-to-end secure communications in wireless sensor networks. IEEE Trans Netw Serv Manage 8(3):205–218 Jasper J (2021) A secure routing scheme to mitigate attack in wireless adhoc sensor network. Comput Secur 103:102197 Kandris D, Nakas C, Vomvas D, Koulouras G (2020) Applications of wireless sensor networks: an up-to-date survey. Appl Syst Innov 3(1):14 Karthick PT, Palanisamy C (2019) Optimized cluster head selection using krill herd algorithm for wireless sensor network. Automatika 60(3):340–348 Kaur G, Varsha (2016) Review on hierarchical unequal clustering-based protocols in wireless sensor network. Int J Recent Innov Trends Comput Commun 4 96–99 Kerrache CA, Calafate CT, Cano JC, Lagraa N, Manzoni P (2016) Trust management for vehicular networks: an adversary-oriented overview. IEEE Access 4:9293–9307 Khalaf OI, Sabbar BM (2019) An overview on wireless sensor networks and finding optimal location of nodes. Period Eng Nat Sci (PEN) 7(3):1096–1101 Khan T, Singh K, Hasan MH, Ahmad K, Reddy GT, Mohan S, Ahmadian A (2021) ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs. Futur Gener Comput Syst 125:921–943 Kumar Kashyap P, Kumar S, Dohare U, Kumar V, Kharel R (2019) Green computing in sensors-enabled internet of things: neuro fuzzy logic-based load balancing. Electronics 8(4):384 Kuo YW, Li CL, Jhang JH, Lin S (2018) Design of a wireless sensor network-based IoT platform for wide area and heterogeneous applications. IEEE Sens J 18(12):5187–5197 Lee S-B, Choi Y-H (2006) A secure alternate path routing in sensor networks. Comput Commun 30(1):153–165 Li S, Zhao S, Wang X, Zhang K, Li L (2014) Adaptive and secure load-balancing routing protocol for service-oriented wireless sensor networks. IEEE Syst J 8(3):858–867 Liang W, Tang M et al (2019) A secure fabric blockchain-based data transmission technique for industrial internet-of-things. IEEE Trans Industr Inf 15(6):3582–3592. https://doi.org/10.1109/TII.2019.2907092 Liang W, Li K-C et al (2020) An industrial network intrusion detection algorithm based on multi-feature data clustering optimization model. IEEE Trans Industr Inf 16(3):2063–2071. https://doi.org/10.1109/TII.2019.2946791 Liu Y, Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensics Secur 11(9):2013–2027 Mahmoud MM, Lin X, Shen XS (2015) Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Trans Parallel Distrib Syst 26(4):1140–1153 Murthy S, D’Souza RJ, Varaprasad G (2012) Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks. IEEE Trans Sens J 12(10):2941–2949 Rawat P, Chauhan S (2021) Clustering protocols in wireless sensor network: a survey, classification, issues, and future directions. Comput Sci Rev 40:100396 Roy NR, Chandra P (2019) EEDAC-WSN: energy efficient data aggregation in clustered WSN. In: 2019 international conference on automation, computational and technology management (ICACTM), pp 586–592. IEEE Sah DK, Amgoth T (2020) A novel efficient clustering protocol for energy harvesting in wireless sensor networks. Wirel Netw 26(6):4723–4737 Salehian S, Subraminiam SK (2015) Unequal clustering by improved particle swarm optimization in wireless sensor network. Proc Comput Sci 62:403–409 Santhosh Kumar SVN, Palanichamy Y, Selvi M, Ganapathy S, Kannan A, Perumal SP (2021) Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks. Wirel Netw 27(6):3873–3894 Selvi M, Thangaramya K, Ganapathy S, Kulothungan K, Khannah Nehemiah H, Kannan A (2019) IEEE An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wirel Pers Commun 105(4):1475–1490 Song Y, Han Z, Liu FM et al (2015) Attribute-based encryption with hidden policies in the access tree. J Commun 36(09):119–126. https://doi.org/10.11959/j.issn.1000-436x.2015135 Sumalatha MS, Nandalal V (2021) An intelligent cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) for securing wireless sensor network (WSN). J Ambient Intell Humaniz Comput 12(5):4559–4573 Thangaramya K, Kulothungan K, Logambigai R, Selvi M, Ganapathy S, Kannan A (2019) Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. Comput Netw 151:211–223 Vennira Selvi G, Manoharan R (2013) A survey of energy efficient unequal clustering algorithms for wireless sensor networks. Int J Comput Appl 79:0975–8887 Xiong H, Qin Z (2015) Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans Inf Forensics Secur 10(7):1442–1455 Yang SK, Shiue YM, Su ZY, Liu IH, Liu CG (2020) An authentication information exchange scheme in WSN for IoT applications. IEEE Access 8:9728–9738 Zhang Y, Wang J, Han D, Wu H, Zhou R (2017) ‘Fuzzy-logic based distributed energy-efficient clustering algorithm for wireless sensor networks.’ Sensors 17(7):1554. https://doi.org/10.3390/s17071554 Zhang W, Han D et al (2020) Wireless sensor network intrusion detection system based on MK-ELM. Soft Comput. https://doi.org/10.1007/s00500-020-04678-1 Zhang W, Han D, Li KC, Massetto FI (2020) Wireless sensor network intrusion detection system based on MK-ELM. Soft Comput 76:1–14