Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Anitha, A.
- Robust Tristate Security Mechanism to Protect Against Selective Forwarding Attack and Black Hole Attack in Intra-Cluster Multi-Hop Communication
Abstract Views :99 |
PDF Views:0
Authors
A. Anitha
1,
S. Mythili
2
Affiliations
1 Department of Computer Science, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu., IN
2 Department of Information Technology, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu., IN
1 Department of Computer Science, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu., IN
2 Department of Information Technology, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu., IN
Source
International Journal of Computer Networks and Applications, Vol 10, No 3 (2023), Pagination: 443-455Abstract
Security is the most vital issue to be addressed in Wireless Sensor Networks (WSNs). The WSN dominates since it has an effectiveness of applications in numerous fields. Though it has effectiveness towards its applications likewise it is susceptible to two different kinds of attacks (i.e.) external attacks and internal attacks existence of constrained reckoning resources, low memory, inadequate battery lifetime, handling control, and nonexistence of interfere resilient packet. Handle internal attacks such as selective forwarding attacks (SFAs) and black hole attacks (BHA) are considered to be the most common security extortions in wireless sensor networks. The attacker nodes will execute mischievous activities during data communication by creating traffic load, delaying packet delivery, dropping packets selectively or dropping all packets, energy consumption, and depleting all network resources. These attacks can be handled efficiently by implementing the proposed methodology for detecting, preventing, and recovering Cluster Heads (CHs), Cluster Members (CMs), and Transient Nodes (TNs) from SFAs and BHA in intra-cluster multi-hop. It is accomplished by proposing a robust strategy for overcoming internal attacks on cluster head, cluster member, and transient node. The Fuzzy C-Means clustering is used to discover the prominent cluster head. The uncertainty entropy model is used to detect internal attacks by removing the malicious node from the transition path. The intermediate node is been selected based on the degree and dimension. The experimental results of the proposed Robust Tristate Security Mechanism (RTSSM) against SFAs and BHA are evaluated with packet delivery ratio, throughput, and packet drop and the results prove the effectiveness of the proposed methodology and it also aids in the extension of the network lifetime.Keywords
Cluster Head, Cluster Member, Intra-Cluster, Multi-Hop, Clustering, Wireless Sensor Networks, Uncertainty, Robust, Fuzzy Membership, Entropy.References
- Jayachandran J, Vimala Devi K, "A Survey on Clustering Algorithms and Proposed Architectural Framework for Border Surveillance System in Wireless Sensor Networks", International Journal of Computer Networks and Applications (IJCNA), 9(6), PP: 785-805, 2022, DOI: 10.22247/ijcna/2022/217710.
- Iqbal, U., & Mir, A. H. (2022). Secure and practical access control mechanism for WSN with node privacy. Journal of King Saud University-Computer and Information Sciences, 34(6), 3630-3646.
- Feng H, Fu W. Study of recent development about privacy and security of the internet of things. In: 2010 international conference on web information systems and mining, Sanya, China, 23 October 2010. IEEE, pp. 91–95.
- Anitha, S.Mythili, “An Approach for Detection and Prevention of Cluster Head and Cluster Member from Selective Forwarding Attacks and Black Hole Attack in Intra-Cluster Multi-Hop Communication,” Design Engineering, Vol. 2021, Issue.06, pp. 1032-1060.
- Bouarourou, Soukaina & Zannou, Abderrahim & Boulaalam, Abdelhak & Nfaoui, El Habib. (2022). Sensors Deployment in IoT Environment. 10.1007/978-3-031-01942-5_27.
- Munir, A.; Gordon-Ross, A.; Ranka, S. Multi-core Embedded Wireless Sensor Networks: Architecture and Applications. In IEEE Transactions on Parallel and Distributed Systems (TPDS); IEEE: Piscataway, NJ, USA, 2014; Volume 25, pp. 1553–1562
- Faris M, Mahmud MN, Salleh MFM, Alnoor A. Wireless sensor network security: A recent review based on state-of-the-art works. International Journal of Engineering Business Management. 2023;15.
- Tam, Nguyen & Dat, Vi & Lan, Phan & Binh, Huynh & Vinh, Le & Swami, Ananthram. (2021). Multifactorial evolutionary optimization to maximize lifetime of wireless sensor network. Information Sciences. 576. 10.1016/j.ins.2021.06.056.
- Maivizhi, Radhakrishnan & Yogesh, Palanichamy. (2021). Q-learning based routing for in-network aggregation in wireless sensor networks. Wireless Networks. 27. 1-20. 10.1007/s11276-021-02564-8.
- Lalitha, K., Thangaraja, R., Siba, K. U., Poongodi, C., & Prasad, S. A. (2017). GCCR: An efficient grid based clustering and combinational routing in wireless sensor networks. Wireless Personal Communications.
- Turgut, “Analysing Multi-hop Intra-Cluster Communication in Cluster-Based Wireless Sensor Networks”, Natural and Engineering Sciences (2019).
- Mezghani, M, “An Efficient Multi-Hops Clustering and Data Routing for WSNs based on Khalimsky IpekAbasıkeleş Shortest Paths,” Journal of Ambient and Intelligence and Humanized Computing, Vol. 10, 1275-1288, 2019.
- D.Wu, S. Gene, X. Cai, G. Zhang and F.Xue, “ A Many-Objective Optimization WSN Energy Balance Model,” KSSII Transactions on Internet and Informatiom Systems, Vol.14, No. 2, pp. 514-537, 2020.
- H. El Alami and A. Najid, “ECH: An Enhanced Clustering Hierarchy Approach To Maximize Lifetime of Wireless Sensor Networks,” IEEE Access, Vol. 7,pp. 107145-107153,2019.
- Gohar Ali, Fernando Moreira, Omar Alfandi, Babar Shah and Mohammed Ilyas, “A New Intra-Cluster Scheduling Scheme for Real-Time Flows in Wireless Sensor Networks,” Electronics 9, No.4, 2020.
- Hasan A, Khan MA, Shabir B, Munir A, Malik AW, Anwar Z, Ahmad J. Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things. Applied Sciences. 2022; 12(22):11442.
- Malik A, Khan MZ, Faisal M, Khan F, Seo J-T. An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in VANETs. Sensors. 2022; 22(5):189
- Ali, Haider & Tariq, Umair & Hussain, Mubashir & Lu, Liu & Panneerselvam, John & Zhai, Xiaojun. (2020). ARSH-FATI a Novel Metaheuristic for Cluster Head Selection in Wireless Sensor Networks. IEEE Systems Journal. PP. 1-12. 10.1109/JSYST.2020.2986811.
- Amutha, J. & Sharma, Sandeep & Sharma, Sanjay. (2021). Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions. Computer Science Review. 40. 100376. 10.1016/j.cosrev.2021.100376.
- Rawat, Piyush & Chauhan, Siddhartha. (2021). Clustering protocols in wireless sensor network: A survey, classification, issues, and future directions. Computer Science Review. 40. 100396. 10.1016/j.cosrev.2021.100396.
- S. Ramesh, R. Rajalakshmi, Jaiprakash Narain Dwivedi , S. Selvakanmani, Bhaskar Pant, N. Bharath Kumar , Zelalem Fissiha Demssie, Optimization of Leach Protocol in Wireless Sensor Network Using Machine Learning, Computational Intelligence and Neuroscience Volume 2022, Article ID 53932, 8 pages.
- M. Sangeetha, and A. Sabari, “Genetic optimization of hybrid clustering algorithm in mobile wireless sensor networks,” Sensor Review, vol. 38, no. 4, pp. 526-533, 2018.
- Zannou, A., Boulaalam, A., & Nfaoui, E. H. (2022). Data Flow Optimization in the Internet of Things. Statistics, Optimization & Information Computing, 10(1), 93-106. https://doi.org/10.19139/soic-2310-5070-1166. How to cite this article:
- Firas Ali Al-Juboori & Ismail, E. S. F. (2014). A modified fuzzy C-means cluster-based approach for wireless sensor network. The Mediterranean Journal of Electronics and Communications, 10(2).
- D. Hongjun, J. Zhiping and D. Xiaona, "An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks," 2008 International Conference on Embedded Software and Systems, Chengdu, China, 2008, pp. 27-34.
- Empowered Chicken Swarm Optimization with Intuitionistic Fuzzy Trust Model for Optimized Secure and Energy Aware Data Transmission in Clustered Wireless Sensor Networks
Abstract Views :99 |
PDF Views:1
Authors
A. Anitha
1,
S. Mythili
2
Affiliations
1 Department of Computer Science, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu, IN
2 Department of Information Technology, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu, IN
1 Department of Computer Science, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu, IN
2 Department of Information Technology, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 10, No 4 (2023), Pagination: 511-526Abstract
Each sensor node functions autonomously to conduct data transmission in wireless sensor networks. It is very essential to focus on energy dissipation and sensor nodes lifespan. There are many existing energy consumption models, and the problem of selecting optimized cluster head along with efficient path selection is still challenging. To address this energy consumption issue in an effective way the proposed work is designed with a two-phase model for performing cluster head selection, clustering, and optimized route selection for the secure transmission of data packets with reduced overhead. The scope of the proposed methodology is to choose the most prominent cluster head and assistant cluster head which aids in prolonging the network lifespan and also securing the inter-cluster components from selective forwarding attack (SFA) and black hole attack (BHA). The proposed methodology is Empowered Chicken Swarm Optimization (ECSO) with Intuitionistic Fuzzy Trust Model (IFTM) in Inter-Cluster communication. ECSO provides an efficient clustering technique and cluster head selection and IFTM provides a secure and fast routing path from SFA and BHA for Inter-Cluster Single-Hop and Multi-Hop Communication. ESCO uses chaos theory for local optima in cluster head selection. The IFTM incorporates reliance of neighbourhood nodes, derived confidence of nodes, estimation of data propagation of nodes and an element of trustworthiness of nodes are used to implement security in inter-cluster communication. Experimental results prove that the proposed methodology outperforms the existing approaches by increasing packet delivery ratio and throughput, and minimizing packet drop ratio and energy consumption.Keywords
Wireless Sensor Networks, Chicken Swarm Optimization, Intuitionistic Fuzzy Trust Model, Energy Aware, Security, Cluster Head, Clustering and Inter-Cluster Communication.References
- M. Jain and H. Kandwal, “A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks,” in International Conference Advances in Computing, Control, and Telecomm. Technologies (ACT ’09), pp. 555-558 (2009).
- He Z, Chen L, Li F, Jin G (2023) A fuzzy model for content-centric routing in Zigbee-based wireless sensor networks (WSNs). PLoS ONE 18(6): e0286913. https://doi.org/10.1371/journal.pone.0286913
- Sathish kumar, R., Ramesh C, “A modified method for preventing black-hole attack in mobile ad hoc networks,” in J. Eng. Appl. Sci. 11(2), 182–191 (2016)
- M. Shinde and D. C. Mehetre, “Black Hole and Selective Forwarding Attack Detection and Prevention in WSN,” in 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India, pp. 1-6,(2017).
- Saleh, A.; Joshi, P.; Rathore, R.S.; Sengar, S.S. Trust-Aware Routing Mechanism through an Edge Node for IoT-Enabled Sensor Networks. Sensors 2022, 22, 7820. https://doi.org/10.3390/s22207820
- Yao, Y., Chen, W., Guo, J. et al. Simplified clustering and improved intercluster cooperation approach for wireless sensor network energy balanced routing. J Wireless Com Network 2020, 131 (2020). https://doi.org/10.1186/s13638-020-01748-8
- Srinivas, T. A., S-S, M, “Black Hole and Selective Forwarding Attack Detection and Prevention in IoT in Health Care Sector: Hybrid meta-heuristic-based shortest path routing,” in Journal of Ambient Intelligence and Smart Environments, 13(2):133–156, (2021).
- C. Lai, H. Li, R. Lu and X. S. Shen, “SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks,” in Comput. Netw., vol. 57, no. 17, pp. 3492-3510, December (2013).
- El Khediri, Salim Khan, Rehanullah Nejah, Nasri Kachouri, Abdennaceur, “MW-LEACH: Low energy adaptive clustering hierarchy approach for WSN,” in IET Wireless Sensor Systems. Vol 10(4), (2020).
- Hicham Qabouche, Aicha Sahel, Abdelmajid Badri, and Ilham El Mourabit, “Novel Reliable and Dynamic Energy-Aware Routing Protocol for Large Scale Wireless Sensor Networks,” in International Journal of Electrical and Computer Engineering, ISSN: 2088-8708, Vol. 12, No. 6, Decemeber 2022, pp. 6440-6448.
- S. Srinivasa Rao, K. Chenna Keshava Reddy and S. Ravi Chand (2022), A Novel Optimization based Energy Efficient and Secured Routing Scheme using SRFIS-CWOSRR for Wireless Sensor Networks. IJEER 10(3), 644-650. DOI: 10.37397/IJEER.100338.
- Mehetre, D.C., Roslin, S.E. & Wagh, S.J, “ Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust,” in Cluster Comput 22 (Suppl 1), 1313–1328 (2019).
- Yadav R. K., & Mahapatra R. P. (2021). Energy aware optimized clustering for hierarchical routing in wireless sensor network. Computer Science Review, 41, 100417
- A. Mehbodniya, S. Bhatia, A. Mashat, M. Elangovan and S. Sengan, “Proportional fairness based energy efficient routing in wireless sensor network,” Computer Systems Science and Engineering, vol. 41, no.3, pp. 1071–1082, 2022.
- Vinodhini R., & Gomathy C. (2021). Fuzzy Based Unequal Clustering and Context-Aware Routing Based on Glow-Worm Swarm Optimization in Wireless Sensor Networks: Forest Fire Detection. Wireless Personal Communications, 118(4), 3501–3522.
- Udhayavani, M., & Chandrasekaran, M. (2019). Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: A trust-aware routing framework for wireless sensor networks. Cluster Computing, 22(5), 11919-11927.
- Meng, X., Liu, Y., Gao, X., Zhang, H. (2014). A New Bio-inspired Algorithm: Chicken Swarm Optimization. In: Tan, Y., Shi, Y., Coello, C.A.C. (eds) Advances in Swarm Intelligence. ICSI 2014. Lecture Notes in Computer Science, Vol. 8794. Springer
- Smith, C.L., Zielinski, S.L.: The Startling Intelligence of the Common Chicken. Scientific American 310(2) (2014).
- Gehad Ismail Sayed, Alaa Tharwat and Aboul Ella Hassanien, “Chaotic dragonfly algorithm: an improved metaheuristic algorithm for feature selection” in Journal: Applied Intelligence, Volume 49, Number 1, Page 188 (2019).
- Wang, Zhenwu, Chao Qin, Benting Wan, William Wei Song, and Guoqiang Yang. “An adaptive fuzzy chicken swarm optimization algorithm.” Mathematical Problems in Engineering 2021 (2021): 1-17.
- Atanassov K.T, “Intuitionistic Fuzzy Sets” in Fuzzy Sets Syst. 1986; 20:87–96.
- Xu Z., Yager R.R, “Some Geometric Aggregation Operators Based on Intuitionistic Fuzzy Sets,” in Int. J. Gen. Syst. 2006; 35:417–433.
- Shen F., Ma X., Li Z., Xu Z., Cai D, “ An Extended Intuitionistic Fuzzy TOPSIS Method Based on a New Distance Measure with an Application to Credit Risk Evaluation,” in Inf. Sci. 2018; 428:105–119.