Skip to main content
Erschienen in: Wireless Personal Communications 2/2016

01.07.2016

An Energy Efficient Cluster Head Selection Technique Using Network Trust and Swarm Intelligence

verfasst von: R. Juliana, P. Uma Maheswari

Erschienen in: Wireless Personal Communications | Ausgabe 2/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless sensor networks (WSN) have started appearing in our daily life including home, office, industry and vehicles to name a few. The incremental usage of WSN for environmental monitoring demands safety and security enhancement. Strong security mechanisms incurred by WSN leads to resource and energy utilization overhead resulting in faster drainage of energy. Trust and reputation have been extensively used in literature to detect misbehaving nodes and thus improve overall network Quality of Service (QoS) by avoiding them. This work proposed a trust mechanism for effective cluster head selection in a multi hop WSN using Artificial Bee Colony algorithm. The results show that the proposed method successfully avoids nodes with selfish behavior and malicious nature that enable Black Hole, Denial of Service, or packet dropping. Results illustrates improvements in the packet delivery ratio and energy utilization.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yuan, Y., Li, C., Yang, Y., Zhang, X., & Li, L. (2014). CAF: Cluster algorithm and a-star with fuzzy approach for lifetime enhancement in wireless sensor networks. Abstract and Applied Analysis, 2014, 936376. doi:10.1155/2014/936376. Yuan, Y., Li, C., Yang, Y., Zhang, X., & Li, L. (2014). CAF: Cluster algorithm and a-star with fuzzy approach for lifetime enhancement in wireless sensor networks. Abstract and Applied Analysis, 2014, 936376. doi:10.​1155/​2014/​936376.
2.
Zurück zum Zitat Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–105.CrossRef Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–105.CrossRef
3.
Zurück zum Zitat Sen, J. (2009). A survey on wireless sensor network security. In International journal of communication networks and information security (IJCNIS) (Vol. 1, pp. 2), August 2009. Sen, J. (2009). A survey on wireless sensor network security. In International journal of communication networks and information security (IJCNIS) (Vol. 1, pp. 2), August 2009.
4.
Zurück zum Zitat Pawlowski, A., Guzman, J. L., Rodríguez, F., Berenguel, M., Sánchez, J., & Dormido, S. (2009). Simulation of greenhouse climate monitoring and control with wireless sensor network and event-based control. Sensors, 9(1), 232–252.CrossRef Pawlowski, A., Guzman, J. L., Rodríguez, F., Berenguel, M., Sánchez, J., & Dormido, S. (2009). Simulation of greenhouse climate monitoring and control with wireless sensor network and event-based control. Sensors, 9(1), 232–252.CrossRef
5.
Zurück zum Zitat Ayadi, A. (2011). Energy-efficient and reliable transport protocols for wireless sensor networks: State-of-art. Wireless Sensor Network, 3(3), 106–113.CrossRef Ayadi, A. (2011). Energy-efficient and reliable transport protocols for wireless sensor networks: State-of-art. Wireless Sensor Network, 3(3), 106–113.CrossRef
6.
Zurück zum Zitat Bhuyan, B., Sarma, H. K. D., Sarma, N., Kar, A., & Mall, R. (2010). Quality of service (QoS) provisions in wireless sensor networks and related challenges. Wireless Sensor Network, 2(11), 861–868.CrossRef Bhuyan, B., Sarma, H. K. D., Sarma, N., Kar, A., & Mall, R. (2010). Quality of service (QoS) provisions in wireless sensor networks and related challenges. Wireless Sensor Network, 2(11), 861–868.CrossRef
7.
Zurück zum Zitat Singh, S. K. (2010). A survey of energy-efficient hierarchical cluster-based routing in wireless sensor networks. International Journal of Advanced Networking and Application, 02(02), 570–580. Singh, S. K. (2010). A survey of energy-efficient hierarchical cluster-based routing in wireless sensor networks. International Journal of Advanced Networking and Application, 02(02), 570–580.
8.
Zurück zum Zitat Selvam, R. P. (2011 January). An efficient cluster based approach for multi-source multicast routing protocol in mobile ad hoc networks. International Journal of Computer Networks & Communications (IJCNC), 3(1), 154–166. Selvam, R. P. (2011 January). An efficient cluster based approach for multi-source multicast routing protocol in mobile ad hoc networks. International Journal of Computer Networks & Communications (IJCNC), 3(1), 154–166.
9.
Zurück zum Zitat Singh, S. K. (2010 November). Routing protocols in wireless sensor networks—A survey. International Journal of Computer Science & Engineering Survey (IJCSES), 1(2), 63–83. Singh, S. K. (2010 November). Routing protocols in wireless sensor networks—A survey. International Journal of Computer Science & Engineering Survey (IJCSES), 1(2), 63–83.
10.
Zurück zum Zitat Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and counter measures. Journalof Network and Computer Applications, 35(3), 867–880.CrossRef Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and counter measures. Journalof Network and Computer Applications, 35(3), 867–880.CrossRef
11.
Zurück zum Zitat Sun, Y. L., Han, Z., Yu, W., & Liu, K. J. R. (2006). A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In Proceedings of the 25th IEEE international conference on computer communications (INFOCOM’06), April 2006, pp. 1–13. Sun, Y. L., Han, Z., Yu, W., & Liu, K. J. R. (2006). A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In Proceedings of the 25th IEEE international conference on computer communications (INFOCOM’06), April 2006, pp. 1–13.
12.
Zurück zum Zitat Safiqul Islam, Md. (2011 November). Anomaly intrusion detection system in wireless sensor networks: Security threats and existing approaches. International Journal of Advanced, Science and Technology, 36(1), 8. Safiqul Islam, Md. (2011 November). Anomaly intrusion detection system in wireless sensor networks: Security threats and existing approaches. International Journal of Advanced, Science and Technology, 36(1), 8.
13.
Zurück zum Zitat Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.CrossRef Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.CrossRef
14.
Zurück zum Zitat Douceur, J. R. (2002). The sybil attack. In R. Clayton (Ed.), Peer-to-peer Systems (pp. 251–260). Berlin: Springer.CrossRef Douceur, J. R. (2002). The sybil attack. In R. Clayton (Ed.), Peer-to-peer Systems (pp. 251–260). Berlin: Springer.CrossRef
15.
Zurück zum Zitat Sharma, K., & Ghose, M. K. (2010). Wireless sensor networks: An overview on its security threats. IJCA, Special Issue on “Mobile Ad hoc Networks” MANETs, pp. 42–45. Sharma, K., & Ghose, M. K. (2010). Wireless sensor networks: An overview on its security threats. IJCA, Special Issue on “Mobile Ad hoc Networks” MANETs, pp. 42–45.
16.
Zurück zum Zitat Sangi, A. R., Liu, J., & Liu, Z. (2010). Performance comparison of single and multi-path routing protocol in MANET with selfish behaviors. World Academy of Science, Engineering and Technology, 41, 828–832. Sangi, A. R., Liu, J., & Liu, Z. (2010). Performance comparison of single and multi-path routing protocol in MANET with selfish behaviors. World Academy of Science, Engineering and Technology, 41, 828–832.
17.
Zurück zum Zitat Gupta, S., Nagpal, C. K., & Singla, C. (2011). Impact of selfish node concentration in MANETS. International Journal of Wireless & Mobile Networks (IJWMN), 3, 29–37.CrossRef Gupta, S., Nagpal, C. K., & Singla, C. (2011). Impact of selfish node concentration in MANETS. International Journal of Wireless & Mobile Networks (IJWMN), 3, 29–37.CrossRef
18.
Zurück zum Zitat Hussain, S., & Matin, A. W. (2006). Hierarchical cluster-based routing in wireless sensor networks. In Proceeding of 5th international conference on information processing in sensor network (IPSN06), USA. Hussain, S., & Matin, A. W. (2006). Hierarchical cluster-based routing in wireless sensor networks. In Proceeding of 5th international conference on information processing in sensor network (IPSN06), USA.
19.
Zurück zum Zitat Zarei, B., Zeynali, M., & Majid Nezhad, V. (2010). Novel cluster based routing protocol in wireless sensor networks. IJCSI International Journal of Computer Science, 7(4), 32–36. Zarei, B., Zeynali, M., & Majid Nezhad, V. (2010). Novel cluster based routing protocol in wireless sensor networks. IJCSI International Journal of Computer Science, 7(4), 32–36.
20.
Zurück zum Zitat Nguyen, D., Minet, P., Kunz, T., & Lamont, L. (2011). New findings on the complexity of cluster head selection algorithms. In World of wireless, mobile and multimedia networks (WoWMoM), 2011 IEEE international symposium on a IEEE, pp. 1–10. Nguyen, D., Minet, P., Kunz, T., & Lamont, L. (2011). New findings on the complexity of cluster head selection algorithms. In World of wireless, mobile and multimedia networks (WoWMoM), 2011 IEEE international symposium on a IEEE, pp. 1–10.
21.
Zurück zum Zitat Ferdous, R., Muthukkumarasamy, V., & Sithirasenan, E. (2011). Trust-based cluster head selection algorithm for mobile ad hoc networks. In Trust, security and privacy in computing and communications (TrustCom), 2011 IEEE 10th international conference on, IEEE, pp. 589–596. Ferdous, R., Muthukkumarasamy, V., & Sithirasenan, E. (2011). Trust-based cluster head selection algorithm for mobile ad hoc networks. In Trust, security and privacy in computing and communications (TrustCom), 2011 IEEE 10th international conference on, IEEE, pp. 589–596.
22.
Zurück zum Zitat Zhou, Y., Huang, T., & Wang, W. (2009). A trust establishment scheme for cluster-based sensor networks. In Wireless communications, networking and mobile computing, 2009. WiCom’09. 5th international conference on, IEEE, pp. 1–4. Zhou, Y., Huang, T., & Wang, W. (2009). A trust establishment scheme for cluster-based sensor networks. In Wireless communications, networking and mobile computing, 2009. WiCom’09. 5th international conference on, IEEE, pp. 1–4.
23.
Zurück zum Zitat Crosby, G. V., & Pissinou, N. (2007). Cluster-based reputation and trust for wireless sensor networks. In Consumer communications and networking conference. Crosby, G. V., & Pissinou, N. (2007). Cluster-based reputation and trust for wireless sensor networks. In Consumer communications and networking conference.
24.
Zurück zum Zitat Zahariadis, T., Leligou, H. C., Trakadas, P., & Voliotis, S. (2010). Trust management in wireless sensor networks. European Transactions on Telecommunications, 21(4), 386–395. Zahariadis, T., Leligou, H. C., Trakadas, P., & Voliotis, S. (2010). Trust management in wireless sensor networks. European Transactions on Telecommunications, 21(4), 386–395.
25.
Zurück zum Zitat Singh, S. I., & Sinha, S. K. (2009, June). A new trust model based on social characteristics and reputation mechanisms using best local prediction selection approach. In New trends in information and service science, 2009. NISS’09. international conference on, IEEE, pp. 329–335. Singh, S. I., & Sinha, S. K. (2009, June). A new trust model based on social characteristics and reputation mechanisms using best local prediction selection approach. In New trends in information and service science, 2009. NISS’09. international conference on, IEEE, pp. 329–335.
26.
Zurück zum Zitat Singh, S. I., & Sinha, S. K. (2009). A new trust model based on social characteristics and reputation mechanisms using best local prediction selection approach. In New trends in information and service science, 2009. NISS’09. international conference on, IEEE, pp. 329–335. Singh, S. I., & Sinha, S. K. (2009). A new trust model based on social characteristics and reputation mechanisms using best local prediction selection approach. In New trends in information and service science, 2009. NISS’09. international conference on, IEEE, pp. 329–335.
27.
Zurück zum Zitat Paris, S., Nita-Rotaru, C., Martignon, F., & Capone, A. (2011). EFW: A cross-layermetric for reliable routing in wireless mesh networks with selfish participants. In Proceedings of the IEEE INFOCOM, April 2011, pp. 576–580. Paris, S., Nita-Rotaru, C., Martignon, F., & Capone, A. (2011). EFW: A cross-layermetric for reliable routing in wireless mesh networks with selfish participants. In Proceedings of the IEEE INFOCOM, April 2011, pp. 576–580.
28.
Zurück zum Zitat Buchegger, S., & Le Boudec, J.-Y. (2002). Performance analysis of the CONFIDANT protocol. (cooperation of nodes: Fairness). In International symposium on mobile ad hoc networking andcomputing (MOBIHOC’02), June 2002, pp. 226–236. Buchegger, S., & Le Boudec, J.-Y. (2002). Performance analysis of the CONFIDANT protocol. (cooperation of nodes: Fairness). In International symposium on mobile ad hoc networking andcomputing (MOBIHOC’02), June 2002, pp. 226–236.
29.
Zurück zum Zitat Duan, J., Yang, D., Zhu, H., Zhang, S., & Zhao, J. (2014). TSRF: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks, 2014, 209436. doi:10.1155/2014/209436. Duan, J., Yang, D., Zhu, H., Zhang, S., & Zhao, J. (2014). TSRF: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks, 2014, 209436. doi:10.​1155/​2014/​209436.
30.
Zurück zum Zitat Zhang, C., Zhu, X., Song, Y., & Fang, Y. (2010). A formal study of trust based routing in wireless ad hoc networks. In Proceedings of theIEEE INFOCOM, March 2010. Zhang, C., Zhu, X., Song, Y., & Fang, Y. (2010). A formal study of trust based routing in wireless ad hoc networks. In Proceedings of theIEEE INFOCOM, March 2010.
31.
Zurück zum Zitat Theodorakopoulos, G., & Baras, J. S. (2006). On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 318–328.CrossRef Theodorakopoulos, G., & Baras, J. S. (2006). On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 318–328.CrossRef
32.
Zurück zum Zitat Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184–197.CrossRef Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184–197.CrossRef
33.
Zurück zum Zitat Pirzada, A. A., McDonald, C., & Datta, A. (2006). Performance comparison of trust-based reactive routing protocols. IEEE Transactions on Mobile Computing, 5(6), 695–710.CrossRef Pirzada, A. A., McDonald, C., & Datta, A. (2006). Performance comparison of trust-based reactive routing protocols. IEEE Transactions on Mobile Computing, 5(6), 695–710.CrossRef
34.
Zurück zum Zitat Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.MathSciNetCrossRef Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.MathSciNetCrossRef
35.
Zurück zum Zitat Lopez, J., Roman, R., Agudo, I., & Fernandez-Gago, C. (2010). Trust management systems for wireless sensor networks: Best practices. Computer Communications, 33(9), 1086–1093.CrossRef Lopez, J., Roman, R., Agudo, I., & Fernandez-Gago, C. (2010). Trust management systems for wireless sensor networks: Best practices. Computer Communications, 33(9), 1086–1093.CrossRef
36.
Zurück zum Zitat Ganeriwal, S., Balzano, L. K., & Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(3), 15.CrossRef Ganeriwal, S., Balzano, L. K., & Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(3), 15.CrossRef
37.
Zurück zum Zitat Patel, J., Teacy, W. L., Jennings, N. R., & Luck, M. (2005). A probabilistic trust model for handling inaccurate reputation sources. In Trust management (pp. 193–209). Berlin: Springer. Patel, J., Teacy, W. L., Jennings, N. R., & Luck, M. (2005). A probabilistic trust model for handling inaccurate reputation sources. In Trust management (pp. 193–209). Berlin: Springer.
38.
Zurück zum Zitat Jsang, A., & Ismail, R. (2002). The beta reputation system. In Proceedings of the 15th bled electronic commerce conference, pp. 41–55. Jsang, A., & Ismail, R. (2002). The beta reputation system. In Proceedings of the 15th bled electronic commerce conference, pp. 41–55.
39.
Zurück zum Zitat Zou, W., Zhu, Y., Chen, H., & Sui, X. (2010). A clustering approach using cooperative artificial bee colony algorithm. Discrete dynamics in nature and society, 2010. Zou, W., Zhu, Y., Chen, H., & Sui, X. (2010). A clustering approach using cooperative artificial bee colony algorithm. Discrete dynamics in nature and society, 2010.
40.
Zurück zum Zitat Akay, B., & Karaboga, D. (2009). Parameter tuning for the artificial bee colony algorithm. In Proceeding of the 1st international conference on computational collective intelligence (ICCCI’09), Wroclaw, Poland, 2009, pp. 608–619. Akay, B., & Karaboga, D. (2009). Parameter tuning for the artificial bee colony algorithm. In Proceeding of the 1st international conference on computational collective intelligence (ICCCI’09), Wroclaw, Poland, 2009, pp. 608–619.
Metadaten
Titel
An Energy Efficient Cluster Head Selection Technique Using Network Trust and Swarm Intelligence
verfasst von
R. Juliana
P. Uma Maheswari
Publikationsdatum
01.07.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3269-x

Weitere Artikel der Ausgabe 2/2016

Wireless Personal Communications 2/2016 Zur Ausgabe

Neuer Inhalt