Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

An energy aware secure three-level weighted trust evaluation and grey wolf optimization based routing in wireless ad hoc sensor network

Published: 01 May 2022 Publication History

Abstract

Due to the widespread application of wireless sensor networks in fields such as healthcare, the battlefield, etc., security has become a prime concern for transmitting information without any data manipulation. For this concern, we introduce a Three-Level Weighted Trust evaluation-based Grey Wolf Optimization (3LWT-GWO) approach for the effective detection of misbehaving nodes and provide an optimal secure route through trusted nodes for delivering the data securely to the destination. The proposed model is categorized into three phases: (a) trust-based clustering, (b) cluster head selection, and (c) optimal data routing. Initially, the sensors are deployed randomly in the region in which the nodes have the initial same energy. Then the clustering of nodes is performed in the first phase by computing the Overall Trust Score (OTS) for each node based on the factors like direct trust, indirect trust, energy trust, Long-term neighbor Recommendation Trust, authentication trust, and link quality trust. This OTS helps to identify unsafe nodes. After the identification of unsafe nodes, clustering is performed. In the second stage, the weight of each node is calculated based on the residual energy, node distance, and energy. Then the node that has the highest weight is nominated as Cluster Head. Next, optimal routing is performed based on the GWO algorithm by computing the Trust Satisfactory degree, distance, energy, and delay. Based on the estimated route, the packet is delivered from the source node to the destination. The performance of the 3LWT-GWO method delivers better results when compared with the prevailing techniques in terms of energy consumption, throughput, network lifetime, accuracy, detection rate, and delay.

References

[1]
Shahbaz AN, Barati H, and Barati A Multipath routing through the firefly algorithm and fuzzy logic in wireless sensor networks Peer-to-Peer Networking and Applications 2021 14 2 541-558
[2]
Desai R, Patil BP, and Sharma DP Routing protocols for mobile ad hoc network: A survey and analysis Indonesian Journal of Electrical Engineering and Computer Science 2017 7 3 795-801
[3]
Aadil F, Raza A, Khan MF, Maqsood M, Mehmood I, and Rho S Energy aware cluster-based routing in flying ad-hoc networks Sensors 2018 18 5 1413
[4]
Mosavifard A and Barati H An energy-aware clustering and two-level routing method in wireless sensor networks Computing 2020 102 7 1653-1671
[5]
Hajipour Z and Barati H EELRP: Energy efficient layered routing protocol in wireless sensor networks Computing 2021 103 2789-2809
[6]
Rani, A., & Kumar, S. (2017). A survey of security in wireless sensor networks. In 2017 3rd international conference on computational intelligence and communication technology (CICT) (pp. 1–5). IEEE.
[7]
Yadav, K. S., & Tamboli, M. (2017). Defending against path-based denial of service attack in wireless sensor network. In International conference on examination in modern technology and engineering (ICEMTE) (Vol. 5, No. 3, pp. 46–51).
[8]
Panda SN Bokhari MU, Agrawal N, and Saini D GPS hash table based location identifier algorithm for security and integrity against vampire attacks Cyber security 2018 Springer 81-89
[9]
Isaac Sajan R and Jasper J A secure routing scheme to mitigate attack in wireless adhoc sensor network Computers and Security 2021 103 102197
[10]
Kumari R and Sharma PK Janyani V, Tiwari M, Singh G, and Minzioni P A silver-coated scheme for detection and prevention against vampire attack in wireless sensor network Optical and wireless technologies 2018 Springer 547-555
[11]
Sharma, M. K., & Joshi, B. K. (2017). Detection and prevention of vampire attack in wireless sensor networks. In 2017 International conference on information, communication, instrumentation and control (ICICIC) (pp. 1–5). IEEE.
[12]
Mittal N, Singh S, Singh U, and Salgotra R Trust-aware energy-efficient stable clustering approach using fuzzy type-2 Cuckoo search optimization algorithm for wireless sensor networks Wireless Networks 2021 27 1 151-174
[13]
Hamsha, K., & Nagaraja, G. S. (2019). Threshold cryptography based light weight key management technique for hierarchical WSNs. In International conference on ubiquitous communications and network computing (pp. 188–197). Springer.
[14]
Labraoui N, Gueroui M, and Sekhri L A risk-aware reputation-based trust management in wireless sensor networks Wireless Personal Communications 2016 87 3 1037-1055
[15]
Malik SK, Dave M, Dhurandher SK, Woungang I, and Barolli L An ant-based QoS-aware routing protocol for heterogeneous wireless sensor networks Soft computing 2017 21 21 6225-6236
[16]
Fang W, Zhang W, Yang W, Li Z, Gao W, and Yang Y Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks Digital Communications and Networks 2021 7 470-478
[17]
Khan T, Singh K, Abdel-Basset M, Long HV, Singh SP, and Manjul M A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks IEEE Access 2019 7 58221-58240
[18]
Selvi M, Thangaramya K, Ganapathy S, Kulothungan K, Nehemiah HK, and Kannan A An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks Wireless Personal Communications 2019 105 4 1475-1490
[19]
Shahidinejad A and Barshandeh S Sink selection and clustering using fuzzy-based controller for wireless sensor networks International Journal of Communication Systems 2020 33 15 e4557
[20]
Gilbert EPK, Baskaran K, Rajsingh EB, Lydia M, and Selvakumar AI Trust aware nature inspired optimised routing in clustered wireless sensor networks International Journal of Bio-Inspired Computation 2019 14 2 103-113
[21]
Lyu C, Zhang X, Liu Z, and Chi CH Selective authentication based geographic opportunistic routing in wireless sensor networks for Internet of Things against DoS attacks IEEE Access 2019 7 31068-31082
[22]
Kumar, N., & Singh, Y. (2017). Trust and packet load balancing based secure opportunistic routing protocol for WSN. In 2017 4th International conference on signal processing, computing and control (ISPCC) (pp. 463–467). IEEE.
[23]
Bangotra DK, Singh Y, Selwal A, Kumar N, Singh PK, and Hong WC An intelligent opportunistic routing algorithm for wireless sensor networks and its application towards e-healthcare Sensors 2020 20 14 3887
[24]
Habib MA, Saha S, Razzaque MA, Mamun-Or-Rashid M, Hassan MM, Pace P, and Fortino G Lifetime maximization of sensor networks through optimal data collection scheduling of mobile sink IEEE Access 2020 8 163878-163893
[25]
Fang W, Zhang W, Chen W, Pan T, Ni Y, and Yang Y Trust-based attack and defense in wireless sensor networks: A survey Wireless Communications and Mobile Computing 2020 2020 1-20
[26]
Mehmood G, Khan MZ, Waheed A, Zareei M, and Mohamed EM A trust-based energy-efficient and reliable communication scheme (trust-based ERCS) for remote patient monitoring in wireless body area networks IEEE Access 2020 8 131397-131413
[27]
Yousefpoor E, Barati H, and Barati A A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks Peer-to-Peer Networking and Applications 2021 14 1-26
[28]
Hasheminejad E and Barati H A reliable tree-based data aggregation method in wireless sensor networks Peer-to-Peer Networking and Applications 2021 14 2 873-887
[29]
Naghibi M and Barati H SHSDA: Secure hybrid structure data aggregation method in wireless sensor networks Journal of Ambient Intelligence and Humanized Computing 2021 12 1-20
[30]
Sharifi SS and Barati H A method for routing and data aggregating in cluster-based wireless sensor networks International Journal of Communication Systems 2021 34 7 e4754
[31]
AlFarraj O, AlZubi A, and Tolba A Trust-based neighbor selection using activation function for secure routing in wireless sensor networks Journal of Ambient Intelligence and Humanized Computing 2018 2018 1-11
[32]
Terence JS and Purushothaman G A novel technique to detect malicious packet dropping attacks in wireless sensor networks Journal of Information Processing Systems 2019 15 1 203-216
[33]
Gomathy V, Padhy N, Samanta D, Sivaram M, Jain V, and Amiri IS Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks Journal of Ambient Intelligence and Humanized Computing 2020 11 11 4995-5001
[34]
Isaac Sajan R and Jasper J Trust-based secure routing and the prevention of vampire attack in wireless ad hoc sensor network International Journal of Communication Systems 2020 33 8 e4341
[35]
Elmahdi E, Yoo SM, and Sharshembiev K Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks Journal of Information Security and Applications 2020 51 102425
[36]
Kumar KV, Jayasankar T, Eswaramoorthy V, and Nivedhitha V SDARP: Security based Data Aware Routing Protocol for ad hoc sensor networks International Journal of Intelligent Networks 2020 1 36-42

Cited By

View all
  • (2024)A trustworthy data collection scheme based on active spot-checking in UAV-Assisted WSNsAd Hoc Networks10.1016/j.adhoc.2024.103477158:COnline publication date: 1-May-2024
  • (2023)Hybrid trust-based secure routing protocol for detection of routing attacks in environment monitoring over MANETsJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-23190545:4(6575-6590)Online publication date: 1-Jan-2023
  • (2023)Trust-aware and energy-efficient data gathering in wireless sensor networks using PSOSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-023-07856-z27:16(11731-11754)Online publication date: 7-Feb-2023

Index Terms

  1. An energy aware secure three-level weighted trust evaluation and grey wolf optimization based routing in wireless ad hoc sensor network
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image Wireless Networks
            Wireless Networks  Volume 28, Issue 4
            May 2022
            475 pages

            Publisher

            Springer-Verlag

            Berlin, Heidelberg

            Publication History

            Published: 01 May 2022
            Accepted: 26 January 2022

            Author Tags

            1. Wireless sensor network
            2. Security
            3. Optimization
            4. Routing
            5. Flooding attack
            6. Trust
            7. Clustering

            Qualifiers

            • Research-article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 25 Dec 2024

            Other Metrics

            Citations

            Cited By

            View all
            • (2024)A trustworthy data collection scheme based on active spot-checking in UAV-Assisted WSNsAd Hoc Networks10.1016/j.adhoc.2024.103477158:COnline publication date: 1-May-2024
            • (2023)Hybrid trust-based secure routing protocol for detection of routing attacks in environment monitoring over MANETsJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-23190545:4(6575-6590)Online publication date: 1-Jan-2023
            • (2023)Trust-aware and energy-efficient data gathering in wireless sensor networks using PSOSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-023-07856-z27:16(11731-11754)Online publication date: 7-Feb-2023

            View Options

            View options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media