Open Access
Subscription Access
Open Access
Subscription Access
Swarm Optimization bsed Imposter Nodes and Resource Limitation Aware Node Failure Detection
Subscribe/Renew Journal
This research work studies about node failures, which can be prevented pretty good by providing the necessary resources rather than by establishing a route path again. This is done by clustering the mobile nodes in accordance with the on node significance level like it is done in the earlier work and the resources among the cluster members are shared with one another to guarantee that sufficient resources are made available. The cluster is established using the Fuzzy K-means clustering technique. The cluster head is accountable for selecting those clusters members, which can share their resources with one another whereas in this technical work, the cluster head selection is carried out with the help of Cuckoo Search based Hill climbing algorithm (CS-HC). Also, to prevent the wrong information on the node failure being spread by the imposter nodes acting as credible neighbour nodes, this work presents the Imposter Node Detection algorithm. This technique guarantees the optimum detection and suppression of node failures occurring in the mobile wireless networks by presenting effective methodologies. The overall process of realization of the proposed research approach is carried out in the NS2 simulation environment, which shows that the proposed technique ensures improved performance compared to the available research approaches.
Keywords
Wireless Sensor Network, Clustering, Node Formation, Fuzzy KMeans Clustering, Cuckoo Search Algorithm, Hill Climbing Approach.
Subscription
Login to verify subscription
User
Font Size
Information
- J. Yick, B. Mukherjee and D. Ghosal, “Wireless Sensor Network Survey”, Computer Networks, Vol. 52, No. 12, pp. 2292-2330, 2008.
- Z. Rezaei and S. Mobininejad, “Energy Saving in Wireless Sensor Networks”, International Journal of Computer Science and Engineering Survey, Vol. 3, No. 1, pp. 23-37, 2012.
- M. Parvin, E. Jafari and R. Azizi, “A Multi-Armed Bandit Problem-Based Target Coverage Protocol for Wireless Sensor Network, Computing”, Proceedings of International Conference on Communication and Networking Technologies, pp. 1-5, 2014
- S. Getsy S.R. Kalaiarasi, S. Neelavathy Pari and D. Sridharan, “Energy Efficient Clustering and Routing in Mobile Wireless Sensor Network”, International Journal of Wireless and Mobile Networks, Vol. 2, No. 1, pp. 106-114, 2010.
- A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks”, Computer Communication, Vol. 30, pp. 2826-2841, 2007.
- Y.J. Oh and K.W. Lee, “A Clustering Algorithm based on Mobility Properties in Mobile Ad Hoc Networks”, International Journal of Distributed Sensor Networks, Vol. 11, No. 6, pp. 1-12, 2015.
- X.A. Shiny and R.J. Kannan, “Energy Efficient Clustering Protocol using Self Organizing Map in MANET”, Indian Journal of Science and Technology, Vol. 8, No. 28, pp. 23-36, 2015.
- M. Alinci, E. Spaho, A. Lala and V. Kolici, “Clustering Algorithms in MANETs: A Review”, Proceedings of IEEE International Conference on Complex, Intelligent, and Software Intensive Systems, pp. 330-335, 2015.
- E.A. Alrashed and M.H. Karaata, “Imposter Detection in Mobile Wireless Sensor Networks”, International Journal of Computer and Communication Engineering, Vol. 3, No. 6, pp. 1-14, 2014.
- T. Dimitriou, E.A. Alrashed, M.H. Karaata and A. Hamdan, “Imposter Detection for Replication Attacks in Mobile Sensor Networks”, Computer Networks, Vol. 108, pp. 210-222, 2016.
- I. Bhardwaj, N.D. Londhe and S.K. Kopparapu, “Study of Imposter Attacks on Novel Fingerprint Dynamics based Verification System”, IEEE Access, Vol. 5, pp. 595-606, 2017.
- W.T. Zhu, J. Zhou, R.H. Deng and F. Bao, “Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey”, Journal of Network and Computer Applications, Vol. 35, No. 3, pp. 1022-1034, 2012.
- A. Becher, Z. Benenson and M. Dornseif, “Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks”, Proceedings of International Conference on Security in Pervasive Computing, pp. 104-118, 2006.
- M.A. Simplicio, P.S. Barreto, C.B. Margi and T.C. Carvalho, “A Survey on Key Management Mechanisms for Distributed Wireless Sensor Networks”, Computer Networks, Vol. 54, No. 15, pp. 2591-2612, 2010.
- D. Wallner, E. Harder and R. Agee, “Key Management for Multicast: Issues and Architectures”, RFC Editor, 1999.
- X.S. Yang and S. Deb, “Cuckoo Search: Recent Advances and Applications”, Neural Computing and Applications, Vol. 24, No. 1, pp. 169-174, 2014.
- X.S. Yang and S. Deb, “Cuckoo Search Via Levy Flights”, Proceedings of World Congress on Nature and Biologically Inspired Computing, pp. 210-214, 2009.
Abstract Views: 270
PDF Views: 0