Open Access
Subscription Access
Energy-Efficient Trust and Quarantine-Based Secure Data Transmission in Wireless Sensor Networks
Wireless Sensor Networks (WSN) are comprised of a significant amount of sensors that are dispersed to acquire data regarding a certain region. The sensor nodes are self-contained and create an ad-hoc inter-communication topology with one another. On the other hand, sensors are limited by their limited resources for managing energy, storing data, communication, and computing power. The hacked nodes make the information more susceptible to security issues. The safety of an unreliable network is a source of concern for researchers. To reduce energy consumption and provide secure communication this research work aims to present an energy-efficient secure data transmission system for WSNs that use the trust concept to detect and prevent data compromise while providing high performance. The proposed method comprises two main steps: First, it presents a new data security scheme that includes data confidentiality and integrity. Second, use the trust concept for analyzing the quality of data links for secure transmission and quarantine nodes and edges based on the trust value. The outcomes of the simulation showed that the suggested protocol increases the effectiveness of network lifetime and energy usage.
Keywords
WSN, Energy-Efficient, Trust, Encryption, Data Transmission, Security.
User
Font Size
Information
- Liu, X., Qiu, T., & Wang, T. (2019). Load-balanced data dissemination for wireless sensor networks: A nature-inspired approach. IEEE Internet of Things Journal, 6(6), 9256-9265.
- Rimal, B. P., Maier, M., & Satyanarayanan, M. (2018). Experimental testbed for edge computing in fiber-wireless broadband access networks. IEEE Communications Magazine, 56(8), 160-167.
- Fernandez-Prieto, J. A., Cañada-Bago, J., & Gadeo-Martos, M. A. (2019). Wireless acoustic sensor nodes for noise monitoring in the city of linares (Jaén). Sensors, 20(1), 124.
- Ávila, K., Sanmartin, P., Jabba, D., & Gómez, J. (2022). An analytical survey of attack scenario parameters on the techniques of attack mitigation in WSN. Wireless Personal Communications, 1-32.
- Iqbal, U., & Mir, A. H. (2022). Secure and practical access control mechanism for WSN with node privacy. Journal of King Saud University-Computer and Information Sciences, 34(6), 3630-3646.
- Nels, S. N., & Singh, J. A. P. (2020). Analysis of data aggregation methods and related issues in Wireless Sensor Networks. Control and Cybernetics, 49(4), 419-446.
- Haseeb, K., Islam, N., Almogren, A., Din, I. U., Almajed, H. N., & Guizani, N. (2019). Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs. IEEE Access, 7, 79980-79988.
- Binu, G. S., & Shajimohan, B. (2020). A novel heuristic based energy efficient routing strategy in wireless sensor network. Peer-to-Peer Networking and Applications, 13, 1853-1871.
- Al Hayajneh, A., Bhuiyan, M. Z. A., & McAndrew, I. (2020). A novel security protocol for wireless sensor networks with cooperative communication. Computers, 9(1), 4.
- Haseeb, K., Almustafa, K. M., Jan, Z., Saba, T., & Tariq, U. (2020). Secure and energy-aware heuristic routing protocol for wireless sensor network. IEEE Access, 8, 163962-163974.
- Huang, D. C., Chu, Y. Y., Tzeng, Y. K., Chen, Y. Y., & Chen, W. M. (2019). Secure routing for WSN-based tactical-level intelligent transportation systems. Journal of Internet Technology, 20(4), 1013-1026.
- Kumar, K. A., Krishna, A. V., & Chatrapati, K. S. (2017). New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks. Journal of Information and Optimization Sciences, 38(2), 341-365.
- Han, Y., Hu, H., & Guo, Y. (2022). Energy-aware and trust-based secure routing protocol for wireless sensor networks using adaptive genetic algorithm. IEEE Access, 10, 11538-11550.
- Lai, X., & Wang, H. (2018). RNOB: Receiver negotiation opportunity broadcast protocol for trustworthy data dissemination in wireless sensor networks. IEEE Access, 6, 53235-53242.
- Qiu, Y., Li, S., Li, Z., Zhang, Y., & Yang, Z. (2017). Multi-gradient routing protocol for wireless sensor networks. China Communications, 14(3), 118-129.
- Liu, X., Liu, A., Wang, T., Ota, K., Dong, M., Liu, Y., & Cai, Z. (2020). Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks. Journal of Parallel and Distributed Computing, 135, 140-155.
- Elhoseny, M., Elminir, H., Riad, A., & Yuan, X. (2016). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences, 28(3), 262-275.
- Anitha, R., Bapu, B. T., Kuppusamy, P. G., Partheeban, N., & Sasikumar, A. N. (2022). FEBSRA: Fuzzy Trust Based Energy Aware Balanced Secure Routing Algorithm for Secured Communications in WSNs. Wireless Personal Communications, 125(1), 63-86.
- Awan, S., Javaid, N., Ullah, S., Khan, A. U., Qamar, A. M., & Choi, J. G. (2022). Blockchain based secure routing and trust management in wireless sensor networks. Sensors, 22(2), 411.
- Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2020). QoS aware trust based routing algorithm for wireless sensor networks. Wireless Personal Communications, 110, 1637-1658.
- Bangotra, D. K., Singh, Y., Selwal, A., Kumar, N., & Singh, P. K. (2022). A trust based secure intelligent opportunistic routing protocol for wireless sensor networks. Wireless Personal Communications, 127(2), 1045-1066.
- Hajiee, M., Fartash, M., & Osati Eraghi, N. (2021). An energy-aware trust and opportunity based routing algorithm in wireless sensor networks using multipath routes technique. Neural Processing Letters, 53(4), 2829-2852.
- Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science, 78, 617-624.
- Wahid, M. N. A., Ali, A., Esparham, B., & Marwan, M. (2018). A comparison of cryptographic algorithms: DES, 3DES, AES, RSA and blowfish for guessing attacks prevention. Journal Computer Science Applications and Information Technology, 3(2), 1-7.
- Zhou, C., Zhu, G., Zhao, B., & Wei, W. (2006, November). Study of one-way hash function to digital signature technology. In 2006 International Conference on Computational Intelligence and Security (Vol. 2, pp. 1503-1506). IEEE.
- Fang, W., Zhang, W., Chen, W., Pan, T., Ni, Y., & Yang, Y. (2020). Trust-based attack and defense in wireless sensor networks: a survey. Wireless Communications and Mobile Computing, 2020, 1-20.
- Sun B, Li D (2017) A comprehensive trust-aware routing protocol with Multi-attributes for WSNs. IEEE Access, vol. 6, pp. 4725–4741
- Strona, G., & Castellano, C. (2018). Rapid decay in the relative efficiency of quarantine to halt epidemics in networks. Physical Review E, 97(2), 022308.
- Airehrour, D., Gutierrez, J. A., & Ray, S. K. (2019). SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Generation Computer Systems, 93, 860-876.
- Yin, H., Yang, H., & Shahmoradi, S. (2022). EATMR: an energy-aware trust algorithm based the AODV protocol and multi-path routing approach in wireless sensor networks. Telecommunication Systems, 81(1), 1-19.
Abstract Views: 213
PDF Views: 1