Trust-based neighbor selection using activation function for secure routing in wireless sensor networks

被引:0
作者
AlFarraj O. [1 ]
AlZubi A. [1 ]
Tolba A. [1 ,2 ]
机构
[1] Computer Science Department, Community College, King Saud University, Riyadh
[2] Mathematics and Computer Science Department, Faculty of Science, Menoufia University, Shebin El-Kom
关键词
Activation function; Direct trust evaluation; Transigmoid function; Trusted neighbor selection; Wireless sensor network;
D O I
10.1007/s12652-018-0885-1
中图分类号
学科分类号
摘要
Wireless sensor network (WSN) nodes rely on their neighbors to transmit the sensed information to a sink node. A transmitting node assumes that its neighbor is secure and relays its information in an optimal manner. A network’s wireless communication medium and decentralized nature retards its performance by exposing it to internal and external attacks. Therefore, secure networks are placed and vital in selecting trusted neighbors to secure transmission. Trust models and the reputation management system takes advantage of the network’s limitation, resulting in the weekly node detection of malicious neighbors and inconsistent network performance. This paper proposes an activation function-based trusted neighbor selection (AF-TNS) for resource-constrained WSNs to enhance network security. AF-TNS works in two phases: trust evaluation with energy constraint and additive metric-based node evaluation to retain the trustworthiness of the neighbors. The random transigmoid function employed simplifies the complex decision-making process of the AF by distinguishing trusted and un-trusted node to retain network performance. Simulation results show that AF-TNS improves network performance by improving the malicious detection rate and retaining the network’s lifetime. From the experimental result, AF-TNS method ensures minimum delay (8.5 s), minimum energy (8.53 J), high throughput (149 kbs), high network lifetime (390 s), also have less false detective rate (1.5%) while transmitting the network information. © 2018 Springer-Verlag GmbH Germany, part of Springer Nature
引用
收藏
页码:1 / 11
页数:10
相关论文
共 50 条
  • [41] Trust-based Selfish Node Detection Mechanism using Beta Distribution in Wireless Sensor Network
    Devi, Kanchana, V
    Ganesan, R.
    JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2019, 13 (01) : 79 - 91
  • [42] Cautious Rating for Trust-Enabled Routing in Wireless Sensor Networks
    Ismat Maarouf
    Uthman Baroudi
    A. R. Naseer
    EURASIP Journal on Wireless Communications and Networking, 2009
  • [43] Secure Multicast Routing for Wireless Sensor Networks using ACO-AODV with DHKE Cryptosystem
    Sreevidya, R. C.
    Nagaraja, G. S.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2018), 2018, : 733 - 737
  • [44] Improved trust management based on the strength of ties for secure data aggregation in wireless sensor networks
    Yun Liu
    Chen-xu Liu
    Qing-An Zeng
    Telecommunication Systems, 2016, 62 : 319 - 325
  • [45] Improved trust management based on the strength of ties for secure data aggregation in wireless sensor networks
    Liu, Yun
    Liu, Chen-xu
    Zeng, Qing-An
    TELECOMMUNICATION SYSTEMS, 2016, 62 (02) : 319 - 325
  • [46] Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks
    Fang, Weidong
    Zhang, Wuxiong
    Yang, Wei
    Li, Zhannan
    Gao, Weiwei
    Yang, Yinxuan
    DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (04) : 470 - 478
  • [47] An Energy-Aware Trust and Opportunity Based Routing Algorithm in Wireless Sensor Networks Using Multipath Routes Technique
    Hajiee, Maryam
    Fartash, Mehdi
    Eraghi, Naiseh Osati
    NEURAL PROCESSING LETTERS, 2021, 53 (04) : 2829 - 2852
  • [48] An Energy-Aware Trust and Opportunity Based Routing Algorithm in Wireless Sensor Networks Using Multipath Routes Technique
    Maryam Hajiee
    Mehdi Fartash
    Naiseh Osati Eraghi
    Neural Processing Letters, 2021, 53 : 2829 - 2852
  • [49] Advanced Lightweight, Dependable and Secure Trust System for Clustered Wireless Sensor Networks
    Shakkira, K.
    Mubarak, Mohamed T.
    2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [50] Using UAVs to Secure Linear Wireless Sensor Networks
    Mohamed, Nader
    AlDhaheri, Haya
    Almurshidi, Khadeijah
    Al-Hammoudi, Mahra
    Al-Yalyali, Salama
    Jawhar, Imad
    Al-Jaroodi, Jameela
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 424 - 429