EPO Based Clustering and Secure Trust-Based Enhanced LEACH Routing in WSN

被引:1
作者
Rajesh, L. [1 ]
Mohan, H. S. [1 ]
机构
[1] SJB Inst Technol, Dept Informat Sci & Engn, Bengaluru, India
来源
SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2021 | 2022年 / 93卷
关键词
Wireless sensor network; Emperor penguin optimization; LEACH protocol; Trust value; Cluster head; Key signature generation; Key signature verification data aggregation and routing;
D O I
10.1007/978-981-16-6605-6_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Background: In wireless sensor network (WSN), one of the best method is data aggregation for energy conservation. In numerous WSN applications, privacy preserving has become a very important issues with the development of WSNs. Purpose: Sensors are vulnerable for security threats due to the open deployment. Moreover, most of the routing algorithms does not consider security. Various methods like trust management, key management, firewalls, and intrusion detection for providing security were considered in the existing work. Between them, enhanced security is given by the trust management. Thus, in this paper, we used the secure trust-based enhanced LEACH routing (STELR) protocol to resolve security concerns. Methods: Here, cluster head is selected by using emperor penguin optimization (EPO) algorithm for data aggregation, and STELR is used to enable the security for routing. We can enable secure communication by checking the trustworthiness of a node. Results: The work is implemented in MATLAB platform, and the results are measured in terms of packet delivery ratio (PDR), throughput, end-to-end (E2E) delay, detection accuracy, energy dissipated, and trust probability (TP). Conclusions: Finally, the security concerns are resolved, which shows proposed approach that gives better performance when compared to existing techniques like LEACH and SDILR protocols.
引用
收藏
页码:41 / 54
页数:14
相关论文
共 18 条
  • [1] [Anonymous], 2014, 2014 INT C ELECT COM
  • [2] Best ak Robert, 2019, J INF TECHNOL-UK, V1, P68
  • [3] Chandy A., 2019, J INF TECHNOL-UK, V1, P108, DOI [10.36548/jitdw.2019.2.006, DOI 10.36548/JITDW.2019.2.006]
  • [4] CSDA: a novel cluster-based secure data aggregation scheme for WSNs
    Fang, Wei
    Wen, XueZhi
    Xu, Jiang
    Zhu, JieZhong
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S5233 - S5244
  • [5] A Data Clustering Algorithm for Detecting Selective Forwarding Attack in Cluster-Based Wireless Sensor Networks
    Fu, Hao
    Liu, Yinghong
    Dong, Zhe
    Wu, Yuanming
    [J]. SENSORS, 2020, 20 (01)
  • [6] Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks
    Gomathy, V.
    Padhy, Neelamadhab
    Samanta, Debabrata
    Sivaram, M.
    Jain, Vishal
    Amiri, Iraj Sadegh
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) : 4995 - 5001
  • [7] An Energy-Efficient and Secure Routing Protocol for Intrusion Avoidance in IoT-Based WSN
    Haseeb, Khalid
    Almogren, Ahmad
    Islam, Naveed
    Din, Ikram Ud
    Jan, Zahoor
    [J]. ENERGIES, 2019, 12 (21)
  • [8] QoS Aware Trust Based Routing Algorithm for Wireless Sensor Networks
    Kalidoss, Thangaramya
    Rajasekaran, Logambigai
    Kanagasabai, Kulothungan
    Sannasi, Ganapathy
    Kannan, Arputharaj
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 110 (04) : 1637 - 1658
  • [9] Adaptive PSO with optimised firefly algorithms for secure cluster-based routing in wireless sensor networks
    Pavani, Movva
    Rao, Polipalli Trinatha
    [J]. IET WIRELESS SENSOR SYSTEMS, 2019, 9 (05) : 274 - 283
  • [10] Highly Secured Cluster Based WSN Using Novel FCM and Enhanced ECC-ElGamal Encryption in IoT
    Reegan, A. Selva
    Kabila, V.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 118 (02) : 1313 - 1329