Security Aware Cluster-Based Routing Using MTCSA and HEA for Wireless Sensor Networks
Keywords:
Energy Consumption, Internet-Of-Things, Hybrid Encryption Algorithm, Multiobjective Trust Based Crow Search Algorithm, Packet Delivery Ratio, Wireless Sensor NetworkAbstract
Wireless Sensor Network (WSN) is operated as a medium to connect the physical and information network of the Internet-of-Things (IoT) for exchanging information. Energy and trust are two key factors that assist reliable communication over the WSN-IoT. Secure data transmission is considered a challenging task during the multipath routing over the WSN-IoT. To address the aforementioned issue, secure routing is developed over the WSN-IoT. In this paper, the Multiobjective Trust based Crow Search Algorithm (MTCSA) is developed to identify the Secure Cluster Heads (SCHs) and secure path over the network. Further, data security while broadcasting the data packets is enhanced by developing the Hybrid Encryption Algorithm (HEA). This HEA is the combination of Advanced Encryption Standard (AES) and Hill Cipher Algorithm (HCA). Therefore, the developed MTCSA-HEA avoids malicious nodes during the communication which helps to improve data delivery and energy consumption. The performance of MTCSA-HEA method is analyzed using Packet Delivery Ratio (PDR), Packet Loss Ratio (PLR), energy consumption, End to End Delay (EED) and throughput. The existing methods namely Optimal Privacy-Multihop Dynamic Clustering Routing Protocol (OP-MDCRP) and Secure and Energy-aware Heuristic-based Routing (SEHR) are used to evaluate the MTCSA-HEA performances. The PDR of MTCSA-HEA for 100 nodes is 99.7449%, which is high when compared to the OP-MDCRP and SEHR.
Downloads
References
Hriez, S., Almajali, S., Elgala, H., Ayyash, M. and Salameh, H.B., 2021. A novel trust-aware and energy-aware clustering method that uses
stochastic fractal search in IoT-enabled wireless sensor networks. IEEE Systems Journal.
Ahmed, A., Abdullah, S., Bukhsh, M., Ahmad, I. and Mushtaq, Z., 2022. An energy-efficient data aggregation mechanism for IoT secured by blockchain. IEEE Access, 10, pp.11404-11419.
Kala, I. and Karthik, S., 2021. Advanced hybrid secure multipath optimized routing in Internet of Things (IoT)‐based WSN. International Journal of Communication Systems, 34(8), p.e4782.
Shende, D.K. and Sonavane, S.S., 2020. CrowWhale-ETR: CrowWhale optimization algorithm for energy and trust aware multicast routing in WSN for IoT applications. Wireless Networks, 26(6), pp.4011-4029.
Zhang, Y., Ren, Q., Song, K., Liu, Y., Zhang, T. and Qian, Y., 2021. An Energy Efficient Multi-Level Secure Routing Protocol in IoT Networks. IEEE Internet of Things Journal.
Gayathri, A., Prabu, A.V., Rajasoundaran, S., Routray, S., Narayanasamy, P., Kumar, N. and Qi, Y., 2022. Cooperative and feedback based authentic routing protocol for energy efficient IoT systems. Concurrency and Computation: Practice and Experience, 34(11), p.e6886.
Wang, Y., Li, F., Ren, P., Yu, S. and Sun, Y., 2022. A secure aggregation routing protocol with authentication and energy conservation. Transactions on Emerging Telecommunications Technologies, 33(1), p.e4387.
Hema Kumar, M., Mohanraj, V., Suresh, Y., Senthilkumar, J. and Nagalalli, G., 2021. Trust aware localized routing and class
based dynamic block chain encryption scheme for improved security in WSN. Journal of Ambient Intelligence and Humanized Computing, 12(5), pp.5287-5295.
Haseeb, K., Islam, N., Almogren, A., Din, I.U., Almajed, H.N. and Guizani, N., 2019. Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs. IEEE Access, 7, pp.79980-79988.
Yu, X., Li, F., Li, T., Wu, N., Wang, H. and Zhou, H., 2020. Trust-based secure directed diffusion routing protocol in WSN. Journal of Ambient Intelligence and Humanized Computing, pp.1-13.
Reegan, A.S. and Kabila, V., 2021. Highly secured cluster based WSN using novel FCM and enhanced ECC-ElGamal encryption in IoT. Wireless Personal Communications, 118(2), pp.1313-1329.
Chouhan, N. and Jain, S.C., 2020. Tunicate swarm Grey Wolf optimization for multi-path routing protocol in IoT assisted WSN networks. Journal of Ambient Intelligence and Humanized Computing, pp.1-17.
Mon, S., Winster, S.G. and Ramesh, R., 2021. Trust Model for IoT Using Cluster Analysis: A Centralized Approach. Wireless Personal Communications, pp.1-22.
Bangotra, D.K., Singh, Y., Selwal, A., Kumar, N. and Singh, P.K., 2021. A trust based secure intelligent opportunistic routing protocol for wireless sensor networks. Wireless Personal Communications, pp.1-22.
Qureshi, S.G. and Shandilya, S.K., 2021. Novel fuzzy based Crow Search optimization algorithm for secure node-to-node data transmission in WSN. Wireless Personal Communications, pp.1-21.
Kavitha, V., 2021. Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment. Peer-to-Peer Networking and Applications, 14(2), pp.821-836.
Karunkuzhali, D., Meenakshi, B. and Lingam, K., 2022. OQR-SC: An optimal QoS aware routing technique for smart cities using IoT enabled wireless sensor networks. Wireless Personal Communications, pp.1-28.
Gali, S. and Nidumolu, V., 2021. An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things. Cluster Computing, pp.1-11.
Haseeb, K., Almustafa, K.M., Jan, Z., Saba, T. and Tariq, U., 2020. Secure and energy-aware heuristic routing protocol for wireless sensor network. IEEE Access, 8, pp.163962-163974.
Gurupriya, M. and Sumathi, A., 2022. HOFT-MP: A Multipath Routing Algorithm Using Hybrid Optimal Fault Tolerant System for WSNs Using Optimization Techniques. Neural Processing Letters, pp.1-26.
Vijayalakshmi, V. and Senthilkumar, A., 2020. USCDRP: unequal secure cluster-based distributed routing protocol for wireless sensor networks. The Journal of Supercomputing, 76(2), pp.989-1004.
Rodrigues, P. and John, J., 2020. Joint trust: an approach for trust-aware routing in WSN. Wireless Networks, pp.1-16.
Selvi, M., Thangaramya, K., anapathy, S., Kulothungan, K., Nehemiah, H.K. and Kannan, A., 2019. An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communications, 105(4), pp.1475-1490.
Fang, W., Zhang, W., Yang, W., Li, Z., Gao, W. and Yang, Y., 2021. Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks. Digital Communications and Networks.
SureshKumar, K. and Vimala, P., 2021. Energy efficient routing protocol using exponentially-ant lion whale optimization algorithm in wireless sensor networks. Computer Networks, 197, p.108250.
Shi, Q., Qin, L., Ding, Y., Xie, B., Zheng, J. and Song, L., 2020. Information-aware secure routing in wireless sensor networks. Sensors, 20(1), p.165.
Hu, H., Han, Y., Wang, H., Yao, M. and Wang, C., 2021. Trust‐aware secure routing protocol for wireless sensor networks. ETRI Journal.
Shankar, A., Jaisankar, N., Khan, M.S., Patan, R. and Balamurugan, B., 2018. Hybrid Model for security-aware cluster head selection in wireless sensor networks.IET Wireless Sensor Systems, 9(2), pp.68-76.
Thangaramya, K., Kulothungan, K., Indira Gandhi, S., Selvi, M., Santhosh Kumar, S.V.N. and Arputharaj, K., 2020. Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Computing, pp.1-15.
Y. Wu, Y. Zhao, M. Riguidel, G. Wang, and P. Yi, "Security and trust management in opportunistic networks: a survey," Security and Comm. Networks, vol. 8, pp. 1812-1827, 2015.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.