Skip to main content
Top
Published in: Wireless Personal Communications 4/2021

26-04-2021

A Cognitive Energy Efficient and Trusted Routing Model for the Security of Wireless Sensor Networks: CEMT

Authors: A. B. Feroz Khan, G. Anandharaj

Published in: Wireless Personal Communications | Issue 4/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

There are many smart applications evolved in the area of the wireless sensor networks. The applications of WSNs are exponentially increasing every year which creates a lot of security challenges that need to be addressed to safeguard the devices in WSN. Due to the dynamic characteristics of these resource constrained devices in WSN, there must be high level security requirements to be considered to create a high secure environments. This paper presents an efficient multi attribute based routing algorithm to provide secure routing of information for WSNs. The work proposed in this paper can decrease the energy and enhances the performance of the network than the currently available routing algorithm such as multi-attribute pheromone ant secure routing algorithm based on reputation value and ant-colony optimization algorithm. The proposed work secures the network environment with the improved detection techniques based on nodes’ higher coincidence rates to find the malicious behavior using trust calculation algorithm. This algorithm uses some QoS parameters such as reliability rate, elapsed time to detect impersonation attacks, and stability rate for trust related attacks, to perform an efficient trust calculation of the nodes in communication. The outcome of the simulation show that the proposed method enhances the performance of the network with the improved detection rate and secure routing service.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bao, F., Chen, I. R., Chang, M., & Cho, J. H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.CrossRef Bao, F., Chen, I. R., Chang, M., & Cho, J. H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.CrossRef
2.
go back to reference Butun, I., Morgera, S. D., & Sankar, R. (2013) A survey of intrusion detection systems in wireless sensor network. IEEE Communications Surveys & Tutorials, 16(1): 266–282. Butun, I., Morgera, S. D., & Sankar, R. (2013) A survey of intrusion detection systems in wireless sensor network. IEEE Communications Surveys & Tutorials, 16(1): 266–282.
5.
go back to reference Ganeriwal, S., & Srivastava, M. B. (2004). Reputation-based framework for high integrity sensor networks. In Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04), Washington, pp. 66–77. Ganeriwal, S., & Srivastava, M. B. (2004). Reputation-based framework for high integrity sensor networks. In Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04), Washington, pp. 66–77.
6.
go back to reference Yan, Z., Zhang, P., & Vasilakos, A. V. (2015). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks. Yan, Z., Zhang, P., & Vasilakos, A. V. (2015). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks.
7.
go back to reference Shaikh, R. A., Jameel, H., Auriol, J. B., & Lee, H. (2009). Groupbased trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712. Shaikh, R. A., Jameel, H., Auriol, J. B., & Lee, H. (2009). Groupbased trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712.
8.
go back to reference Zeng, B., & Dong, Y. (2016). An improved harmony search based energy-efficient routing algorithm for wireless sensor networks. Applied Soft Computing, 41, 135–147.CrossRef Zeng, B., & Dong, Y. (2016). An improved harmony search based energy-efficient routing algorithm for wireless sensor networks. Applied Soft Computing, 41, 135–147.CrossRef
9.
go back to reference Mei, J. P., Yu, H., Liu, Y., Shen, Z., & Miao, C. (2014). A social trust model considering trustees’ influence. In: H. K. Dam, J. Pitt, Y. Xu, G. Governatori, & T. Ito (Eds.) PRIMA 2014: Principles and Practice of Multi-Agent Systems. PRIMA 2014. Lecture Notes in Computer Science, vol 8861. Springer, Cambridge. Mei, J. P., Yu, H., Liu, Y., Shen, Z., & Miao, C. (2014). A social trust model considering trustees’ influence. In: H. K. Dam, J. Pitt, Y. Xu, G. Governatori, & T. Ito (Eds.) PRIMA 2014: Principles and Practice of Multi-Agent Systems. PRIMA 2014. Lecture Notes in Computer Science, vol 8861. Springer, Cambridge.
10.
go back to reference Liney, M. (2018) AIS Reputation Mechanism in MANET, Conference: 28th International Telecommunication Networks and Applications Conference (ITNAC). Liney, M. (2018) AIS Reputation Mechanism in MANET, Conference: 28th International Telecommunication Networks and Applications Conference (ITNAC).
11.
13.
go back to reference Momani, M., Challa, S., Alhmouz, R. B. N. W. S. N.: Bayesian network trust model for wireless sensor networks. In Proceedings of the Mosharaka International Conference on Communications, Computers and Applications (MIC-CCA 2008), Amman, Jordan, 8–10 2008, pp. 110–115. Momani, M., Challa, S., Alhmouz, R. B. N. W. S. N.: Bayesian network trust model for wireless sensor networks. In Proceedings of the Mosharaka International Conference on Communications, Computers and Applications (MIC-CCA 2008), Amman, Jordan, 8–10 2008, pp. 110–115.
14.
go back to reference Gupta, N., & Singh, S. N. (2016). Wormhole attacks in MANET. In 2016 6th International Conference—Cloud System and Big Data Engineering (Confluence), pp. 236–239. Gupta, N., & Singh, S. N. (2016). Wormhole attacks in MANET. In 2016 6th International Conference—Cloud System and Big Data Engineering (Confluence), pp. 236–239.
15.
go back to reference Parker, J., Undercoffer, J., Pinkston, J., & Joshi, A. (2004) On intru-sion detection and response for mobile ad hoc networks. In:IEEE International Conference on Performance, Computing, and Communications. Parker, J., Undercoffer, J., Pinkston, J., & Joshi, A. (2004) On intru-sion detection and response for mobile ad hoc networks. In:IEEE International Conference on Performance, Computing, and Communications.
16.
go back to reference Salim, D., & Iqbal, E. (2015). Adaptive trust threshold strategy for misbehaving node detection and isolation. IEEE Trustcom/BigDataSE/ISPA. Salim, D., & Iqbal, E. (2015). Adaptive trust threshold strategy for misbehaving node detection and isolation. IEEE Trustcom/BigDataSE/ISPA.
17.
go back to reference Sheltami, A., Basabaa, A., Shakshuki, E. (2014) A3ACKs: Adaptivethree acknowledgments intrusion detection system for MANETs. Journal of Ambient Intelligence and Humanized Computing, 1–10. Sheltami, A., Basabaa, A., Shakshuki, E. (2014) A3ACKs: Adaptivethree acknowledgments intrusion detection system for MANETs. Journal of Ambient Intelligence and Humanized Computing, 1–10.
18.
go back to reference Jhaveri, H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs. INFOCOMP Journal of Computer Science, 11 (1), 1–12. Jhaveri, H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs. INFOCOMP Journal of Computer Science, 11 (1), 1–12.
19.
go back to reference Wei, Z., Tang, H., Yu, F. R., Wang, M., & Mason P 2014 Security enhancements for mobile adhoc networks with trust management using uncertain reasoning. IEEE Transactions on Vehicular Technology, 63(9), 4647–4658. Wei, Z., Tang, H., Yu, F. R., Wang, M., & Mason P 2014 Security enhancements for mobile adhoc networks with trust management using uncertain reasoning. IEEE Transactions on Vehicular Technology, 63(9), 4647–4658.
20.
go back to reference Feroz Khan, A.B., Anandharaj, G. (2019). A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment: CKMT. SN Applied Sciences, 1(12). Feroz Khan, A.B., Anandharaj, G. (2019). A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment: CKMT. SN Applied Sciences, 1(12).
21.
go back to reference Feroz Khan, A. B., Anandharaj, G. (2020). AHKM: An improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in IoT. Egyptian Informatics Journal. Feroz Khan, A. B., Anandharaj, G. (2020). AHKM: An improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in IoT. Egyptian Informatics Journal.
22.
go back to reference Feroz Khan, A. B., Anandharaj, G. (2020). A Multi-layer Security approach for DDoS detection in Internet of Things. International Journal of Intelligent Unmanned Systems ahead-of-print (ahead-of-print). Feroz Khan, A. B., Anandharaj, G. (2020). A Multi-layer Security approach for DDoS detection in Internet of Things. International Journal of Intelligent Unmanned Systems ahead-of-print (ahead-of-print).
Metadata
Title
A Cognitive Energy Efficient and Trusted Routing Model for the Security of Wireless Sensor Networks: CEMT
Authors
A. B. Feroz Khan
G. Anandharaj
Publication date
26-04-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08391-6

Other articles of this Issue 4/2021

Wireless Personal Communications 4/2021 Go to the issue