Security-aware, Red fox optimization-based cluster-based routing in wireless sensor network

被引:1
作者
Dixit, Sameer [1 ]
Qureshi, Shaima [1 ]
机构
[1] NIT Srinagar, Dept Comp Sci & Engn, Srinagar, India
关键词
Adaptive AES; CH; Energy-optimized routing; SECR; Security; RFO; WSN; ALGORITHM; PROTOCOL;
D O I
10.1007/s12083-025-01951-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of security-aware and energy-optimized routing in Wireless Sensor Networks (WSNs) is crucial for establishing a robust, secure, and energy-efficient communication framework while maintaining the Quality of Service (QoS) requirements of the application. Furthermore, energy efficiency which is a critical concern due to the limited power resources of sensor nodes, seeks significant research attention. Optimized routing strategies enhance network longevity by minimizing energy dissipation during data communication. To address above issues, this paper proposes a novel Security-aware Red Fox Optimization (RFO)-based Cluster-based Routing (SECR) algorithm, which facilitates secure and energy-efficient data transmission among sensor nodes. The RFO algorithm is employed to dynamically select the optimal Cluster Head (CH) based on energy metrics and network topology. For secure data transmission, an adaptive Advanced Encryption Standard (AES) is implemented at the selected CH, ensuring data confidentiality before forwarding the encrypted information to the sink node. Performance evaluations through extensive simulations demonstrate that the proposed SECR protocol outperforms existing state-of-the-art routing techniques in terms of security robustness, energy efficiency, and network lifetime.
引用
收藏
页数:17
相关论文
共 28 条
[1]   Securing Underwater Wireless Sensor Networks: A Review of Attacks and Mitigation Techniques [J].
Ahmed, Khawaja Masood ;
Shams, Rehan ;
Khan, Fozia Hanif ;
Luque-Nieto, Miguel-Angel .
IEEE ACCESS, 2024, 12 :161096-161133
[2]  
Avdhesh Yadav S, 2025, International Journal of Communication Systems, P5314
[3]   A genetic algorithm based distance-aware routing protocol for wireless sensor networks [J].
Bhatia, Tarunpreet ;
Kansal, Simmi ;
Goel, Shivani ;
Verma, A. K. .
COMPUTERS & ELECTRICAL ENGINEERING, 2016, 56 :441-455
[4]   End-to-End Self-organizing Intelligent Security Model for Wireless Sensor Network based on a Hybrid (AES-RSA) Cryptography [J].
Devi, V. Anusuya ;
Sampradeepraj, T. .
WIRELESS PERSONAL COMMUNICATIONS, 2024, 136 (03) :1675-1703
[5]   A novel dynamic clustering approach for energy hole mitigation in Internet of Things-based wireless sensor network [J].
Dogra, Roopali ;
Rani, Shalli ;
Sharma, Bhisham ;
Verma, Sandeep ;
Anand, Divya ;
Chatterjee, Pushpita .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (09)
[6]   Detection of Denial-of-Service Attack in Wireless Sensor Networks: A Lightweight Machine Learning Approach [J].
Elsadig, Muawia A. .
IEEE ACCESS, 2023, 11 :83537-83552
[7]   SCEER: Secure cluster based efficient energy routing scheme for wireless sensor networks [J].
Gopinath, S. ;
Kumar, K. Vinoth ;
Elayaraja, P. ;
Parameswari, A. ;
Balakrishnan, S. ;
Thiruppathi, M. .
MATERIALS TODAY-PROCEEDINGS, 2021, 45 :3579-3584
[8]   A Secure Energy Aware Meta-Heuristic Routing Protocol (SEAMHR) for sustainable IoT-Wireless Sensor Network (WSN) [J].
Gurram, Girija Vani ;
Shariff, Noorullah C. ;
Biradar, Rajkumar L. .
THEORETICAL COMPUTER SCIENCE, 2022, 930 :63-76
[9]   Lightweight Aggregated Data Encryption for Wireless Sensor Networks (WSNs) [J].
Harn, Lein ;
Hsu, Ching-Fang ;
Xia, Zhe ;
He, Zhangqing .
IEEE SENSORS LETTERS, 2021, 5 (04)
[10]   A novel approach for particle swarm optimization-based clustering with dual sink mobility in wireless sensor network [J].
Kaur, Supreet ;
Grewal, Vinit .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (16)