Skip to main content
Erschienen in: Soft Computing 21/2020

23.04.2020 | Methodologies and Application

Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN

verfasst von: K. Thangaramya, K. Kulothungan, S. Indira Gandhi, M. Selvi, S. V. N. Santhosh Kumar, Kannan Arputharaj

Erschienen in: Soft Computing | Ausgabe 21/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In wireless sensor networks (WSNs), energy optimization and the provision of security are the major design challenges. Since the wireless sensor devices are energy constrained, the issue of high energy consumption by the malicious nodes must be addressed well in order to enhance the network performance by making increased network lifetime, reduced energy consumption and delay. In the past, many researchers worked in the provision of new techniques for providing improved security to WSN in order to enhance the reliability in the routing process. However, most of the existing routing techniques are not able to achieve the required security through the use of intelligent techniques for safeguarding the sensor nodes from malicious attacks. In order to address these problems, a new fuzzy temporal clustering-based secured communication model with trust analysis and outlier detection has been developed in this research work. For this purpose, a new fuzzy temporal rule-based cluster-based routing algorithm with trust modelling and outlier detection for monitoring the nodes participating in the communication has been proposed. In addition, a fuzzy temporal rule- and distance-based outlier detection algorithm is also proposed in this paper for distinguishing the malicious nodes from other nodes within each cluster of the network and has been used in the secured routing algorithm. The proposed secure routing algorithm uses the temporal reasoning tasks of explanation-based learning and prediction as well as spatial constraints for making efficient routing decisions through the application of trust and key management techniques for performing effective authentication of nodes and thereby isolating the malicious nodes from communication through outlier detection. By applying these two proposed algorithms for communication in the proposed work, it is proved through experiments that the proposed secure routing algorithm and the outlier detection algorithm are able to perform secured and reliable routing through genuine cluster head nodes more effectively. Moreover, these two algorithms provide improved quality of service with respect to the reliability of communication, packet delivery ratio, reduction in end-to-end delay and reduced energy consumption.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Allen JF (1983) Maintaining knowledge about temporal intervals. Commun ACM 26(11):832–843MATHCrossRef Allen JF (1983) Maintaining knowledge about temporal intervals. Commun ACM 26(11):832–843MATHCrossRef
Zurück zum Zitat Alshammari H, Ghorbel O, Aseeri M, Abid M (2018) Non-negative matrix factorization (NMF) for outlier detection in wireless sensor networks, pp 506–511 Alshammari H, Ghorbel O, Aseeri M, Abid M (2018) Non-negative matrix factorization (NMF) for outlier detection in wireless sensor networks, pp 506–511
Zurück zum Zitat Anwar RW, Zainal A, Outay F, Yasar A, Iqbal S (2019) BTEM: belief based trust evaluation mechanism for wireless sensor networks. Future Gener Comput Syst 96:605–616CrossRef Anwar RW, Zainal A, Outay F, Yasar A, Iqbal S (2019) BTEM: belief based trust evaluation mechanism for wireless sensor networks. Future Gener Comput Syst 96:605–616CrossRef
Zurück zum Zitat Ayadi A, Ghorbel O, Obeidad AFM, Abid M (2017) Outlier detection approaches for wireless sensor networks: a survey. Comput Netw 129(1):319–333CrossRef Ayadi A, Ghorbel O, Obeidad AFM, Abid M (2017) Outlier detection approaches for wireless sensor networks: a survey. Comput Netw 129(1):319–333CrossRef
Zurück zum Zitat Bao F, Chen IR, Chang M, Cho JH (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Serv Manag 9(2):169–183CrossRef Bao F, Chen IR, Chang M, Cho JH (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Serv Manag 9(2):169–183CrossRef
Zurück zum Zitat Dang H, Wu H (2010) Clustering and cluster-based routing protocol for delay-tolerant mobile networks. IEEE Trans Wirel Commun 9(6):1874–1881CrossRef Dang H, Wu H (2010) Clustering and cluster-based routing protocol for delay-tolerant mobile networks. IEEE Trans Wirel Commun 9(6):1874–1881CrossRef
Zurück zum Zitat Das A, Islam MM (2012) Secured trust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Trans Dependable Secure Comput 9(2):261–274CrossRef Das A, Islam MM (2012) Secured trust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Trans Dependable Secure Comput 9(2):261–274CrossRef
Zurück zum Zitat Dean TL, McDermott DV (1987) Temporal database management. Artif Intell 32(1):1–55CrossRef Dean TL, McDermott DV (1987) Temporal database management. Artif Intell 32(1):1–55CrossRef
Zurück zum Zitat Deng H, Yang Y, Jin G, Xu R, Shi W (2010) Building a trust-aware dynamic routing solution for wireless sensor networks. In: Proceedings of the IEEE GLOBECOM workshop, pp 153–157 Deng H, Yang Y, Jin G, Xu R, Shi W (2010) Building a trust-aware dynamic routing solution for wireless sensor networks. In: Proceedings of the IEEE GLOBECOM workshop, pp 153–157
Zurück zum Zitat Donald DM, Sanchez S, Madria S, Ercal F (2015) A survey of methods for finding outliers in wireless sensor networks. J Netw Syst Manag 23(1):163–182CrossRef Donald DM, Sanchez S, Madria S, Ercal F (2015) A survey of methods for finding outliers in wireless sensor networks. J Netw Syst Manag 23(1):163–182CrossRef
Zurück zum Zitat Duan J, Qin Y, Zhang S, Zheng T, Zhang H (2011) Issues of trust management for mobile wireless sensor networks. In: 7th international conference on wireless communications, networking and mobile computing, pp 1–4 Duan J, Qin Y, Zhang S, Zheng T, Zhang H (2011) Issues of trust management for mobile wireless sensor networks. In: 7th international conference on wireless communications, networking and mobile computing, pp 1–4
Zurück zum Zitat Fawzy A, Mokhtar HMO, Hegazy O (2013) Outliers detection and classification in wireless sensor networks. Egypt Inform J 14:157–164CrossRef Fawzy A, Mokhtar HMO, Hegazy O (2013) Outliers detection and classification in wireless sensor networks. Egypt Inform J 14:157–164CrossRef
Zurück zum Zitat Ganeriwal S, Balzano LK, Srivastava MB (2008) Reputation based framework for high integrity sensor networks. ACM Trans Sens Netw 4(3):66–77CrossRef Ganeriwal S, Balzano LK, Srivastava MB (2008) Reputation based framework for high integrity sensor networks. ACM Trans Sens Netw 4(3):66–77CrossRef
Zurück zum Zitat Gilbert EPK, Kaliaperumal B, Rajsingh EB, Lydia M (2018) Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks. Comput Electr Eng 72:894–909CrossRef Gilbert EPK, Kaliaperumal B, Rajsingh EB, Lydia M (2018) Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks. Comput Electr Eng 72:894–909CrossRef
Zurück zum Zitat Hamdane B, Boussada R, Elhdhili ME, El Fatmi SG (2017) Hierarchical identity based cryptography for security and trust in named data networking. In: 2017 IEEE 26th international conference on enabling technologies: infrastructure for collaborative enterprises, pp 226–231 Hamdane B, Boussada R, Elhdhili ME, El Fatmi SG (2017) Hierarchical identity based cryptography for security and trust in named data networking. In: 2017 IEEE 26th international conference on enabling technologies: infrastructure for collaborative enterprises, pp 226–231
Zurück zum Zitat Han J, Kamber M, Pei J (2011) Data mining: concepts and techniques. The Morgan Kaufmann series in data management systems, 3rd edn. Morgan Kaufmann Publishers, Burlington Han J, Kamber M, Pei J (2011) Data mining: concepts and techniques. The Morgan Kaufmann series in data management systems, 3rd edn. Morgan Kaufmann Publishers, Burlington
Zurück zum Zitat Hodge V, Austin J (2003) A survey of outlier detection methodologies. Artif Intell Rev 22:85–126MATHCrossRef Hodge V, Austin J (2003) A survey of outlier detection methodologies. Artif Intell Rev 22:85–126MATHCrossRef
Zurück zum Zitat Izadi D, Abawajy J, Ghanavati S (2015) An alternative clustering scheme in WSN. IEEE Sens J 15(7):4148–4155CrossRef Izadi D, Abawajy J, Ghanavati S (2015) An alternative clustering scheme in WSN. IEEE Sens J 15(7):4148–4155CrossRef
Zurück zum Zitat Jabeen F, Fernandes AAA (2012) An algorithmic strategy for in network distributed spatial analysis in wireless sensor networks. J Parallel Distrib Comput 72:1628–1653CrossRef Jabeen F, Fernandes AAA (2012) An algorithmic strategy for in network distributed spatial analysis in wireless sensor networks. J Parallel Distrib Comput 72:1628–1653CrossRef
Zurück zum Zitat Jaisankar N, Ganapathy S, Yogesh P, Kannan A, Anand K (2012) An intelligent agent-based intrusion detection system using fuzzy rough set based outlier detection. Soft Comput Tech Vis Sci 395:147–153CrossRef Jaisankar N, Ganapathy S, Yogesh P, Kannan A, Anand K (2012) An intelligent agent-based intrusion detection system using fuzzy rough set based outlier detection. Soft Comput Tech Vis Sci 395:147–153CrossRef
Zurück zum Zitat Kerrache CA, Calafate CT, Cano J-C, Lagraa N, Manzoni P (2016) Trust management for vehicular networks: an adversary-oriented overview. IEEE Access 4:9293–9307CrossRef Kerrache CA, Calafate CT, Cano J-C, Lagraa N, Manzoni P (2016) Trust management for vehicular networks: an adversary-oriented overview. IEEE Access 4:9293–9307CrossRef
Zurück zum Zitat Kim J, Jang KY, Choo H, Kim W (2007) Energy efficient LEACH with TCP for wireless sensor networks. In: Computational science and its applications–ICCSA 2007, pp 275–285 Kim J, Jang KY, Choo H, Kim W (2007) Energy efficient LEACH with TCP for wireless sensor networks. In: Computational science and its applications–ICCSA 2007, pp 275–285
Zurück zum Zitat Lee S-B, Choi Y-H (2006) A secure alternate path routing in sensor networks. Comput Commun 30(1):153–165CrossRef Lee S-B, Choi Y-H (2006) A secure alternate path routing in sensor networks. Comput Commun 30(1):153–165CrossRef
Zurück zum Zitat Li S, Zhao S, Wang X, Zhang K, Li L (2014) Adaptive and secure load-balancing routing protocol for service-oriented wireless sensor networks. IEEE Syst J 8(3):858–867CrossRef Li S, Zhao S, Wang X, Zhang K, Li L (2014) Adaptive and secure load-balancing routing protocol for service-oriented wireless sensor networks. IEEE Syst J 8(3):858–867CrossRef
Zurück zum Zitat Lin H, Wang L, Kong R (2015) Energy efficient clustering protocol for large-scale sensor networks. IEEE Sens J 15(12):7150–7160CrossRef Lin H, Wang L, Kong R (2015) Energy efficient clustering protocol for large-scale sensor networks. IEEE Sens J 15(12):7150–7160CrossRef
Zurück zum Zitat Liu Y, Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensics Secur 11(9):2013–2027CrossRef Liu Y, Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensics Secur 11(9):2013–2027CrossRef
Zurück zum Zitat Logambigai R, Kannan A (2016) Fuzzy logic based unequal clustering for wireless sensor networks. Wirel Netw 22:945–957CrossRef Logambigai R, Kannan A (2016) Fuzzy logic based unequal clustering for wireless sensor networks. Wirel Netw 22:945–957CrossRef
Zurück zum Zitat Logambigai R, Ganapathy S, Kannan A (2018) Energy–efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Comput Electr Eng 68:62–75CrossRef Logambigai R, Ganapathy S, Kannan A (2018) Energy–efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Comput Electr Eng 68:62–75CrossRef
Zurück zum Zitat Mahmoud MEM, Lin X, Shen X (2015) Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Trans Parallel Distrib Syst 26(4):1140–1153CrossRef Mahmoud MEM, Lin X, Shen X (2015) Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Trans Parallel Distrib Syst 26(4):1140–1153CrossRef
Zurück zum Zitat Mazinani A, Mazinani SM, Mirzaie M (2019) FMCR-CT: an energy-efficient fuzzy multi cluster based routing with a constant threshold in wireless sensor network. Alex Eng J 58:127–141CrossRef Mazinani A, Mazinani SM, Mirzaie M (2019) FMCR-CT: an energy-efficient fuzzy multi cluster based routing with a constant threshold in wireless sensor network. Alex Eng J 58:127–141CrossRef
Zurück zum Zitat Miglani A, Bhatia T, Goel S (2015) Trust-based energy efficient routing in LEACH for wireless sensor networks. In: Proceedings of 2015 global conference on communication technologies, pp 361–365 Miglani A, Bhatia T, Goel S (2015) Trust-based energy efficient routing in LEACH for wireless sensor networks. In: Proceedings of 2015 global conference on communication technologies, pp 361–365
Zurück zum Zitat Moonesignhe HDK, Tan P-N (2006) Outlier detection using random walks. In: IEEE international conference on tools with artificial intelligence (ICTAI'06), pp 532–539 Moonesignhe HDK, Tan P-N (2006) Outlier detection using random walks. In: IEEE international conference on tools with artificial intelligence (ICTAI'06), pp 532–539
Zurück zum Zitat Muthurajkumar S, Ganapathy S, Vijayalakshmi M, Kannan A (2017) An intelligent secured and energy efficient routing algorithm for MANETs. Wirel Pers Commun 96(2):1753–1769CrossRef Muthurajkumar S, Ganapathy S, Vijayalakshmi M, Kannan A (2017) An intelligent secured and energy efficient routing algorithm for MANETs. Wirel Pers Commun 96(2):1753–1769CrossRef
Zurück zum Zitat Russell S, Norvig P (1994) Artificial intelligence: a modern approach. Prentice Hall, EnglewoodMATH Russell S, Norvig P (1994) Artificial intelligence: a modern approach. Prentice Hall, EnglewoodMATH
Zurück zum Zitat Saeed N, Al-Naffouri TY, Alouini M-S (2019) Outlier detection and optimal anchor placement for 3-D underwater optical wireless sensor network localization. IEEE Trans Commun 67(1):611–622CrossRef Saeed N, Al-Naffouri TY, Alouini M-S (2019) Outlier detection and optimal anchor placement for 3-D underwater optical wireless sensor network localization. IEEE Trans Commun 67(1):611–622CrossRef
Zurück zum Zitat Santhosh Kumar SVN, Palanichamy Y (2018) Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wirel Netw 24(4):1343–1360CrossRef Santhosh Kumar SVN, Palanichamy Y (2018) Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wirel Netw 24(4):1343–1360CrossRef
Zurück zum Zitat Sethukkarasi R, Ganapathy S, Yogesh P, Kannan A (2014) An intelligent neuro fuzzy temporal knowledge representation model for mining temporal patterns. Int J Fuzzy Syst 26(3):1167–1178MATH Sethukkarasi R, Ganapathy S, Yogesh P, Kannan A (2014) An intelligent neuro fuzzy temporal knowledge representation model for mining temporal patterns. Int J Fuzzy Syst 26(3):1167–1178MATH
Zurück zum Zitat Shahid N, Naqvi IH, Qaisar SB (2012) Quarter-sphere SVM: attribute and spatio-temporal correlations based outlier & event detection in wireless sensor networks. In: 2012 IEEE wireless communications and networking conference: mobile and wireless networks, pp 2048–2053 Shahid N, Naqvi IH, Qaisar SB (2012) Quarter-sphere SVM: attribute and spatio-temporal correlations based outlier & event detection in wireless sensor networks. In: 2012 IEEE wireless communications and networking conference: mobile and wireless networks, pp 2048–2053
Zurück zum Zitat Shaikh RA, Jameel H, d’Auriol BJ, Lee H, Lee S, Song YJ (2009) Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans Parallel Distrib Syst 20(11):1698–1712CrossRef Shaikh RA, Jameel H, d’Auriol BJ, Lee H, Lee S, Song YJ (2009) Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans Parallel Distrib Syst 20(11):1698–1712CrossRef
Zurück zum Zitat Shamim Hossain M, You X, Xiao W, Song JLE (2019) QoS-oriented multimedia transmission using multipath routing. Future Gener Comput Syst 99:226–234CrossRef Shamim Hossain M, You X, Xiao W, Song JLE (2019) QoS-oriented multimedia transmission using multipath routing. Future Gener Comput Syst 99:226–234CrossRef
Zurück zum Zitat Shiva Murthy G, D’Souza RJ, Varaprasad G (2012) Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks. IEEE Trans Sens J 12(10):2941–2949CrossRef Shiva Murthy G, D’Souza RJ, Varaprasad G (2012) Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks. IEEE Trans Sens J 12(10):2941–2949CrossRef
Zurück zum Zitat Sree Rathna Lakshmi NVS, Babu S, Bhalaji N (2017) Analysis of clustered QoS routing protocol for distributed wireless sensor network. Comput Electr Eng 64:173–181CrossRef Sree Rathna Lakshmi NVS, Babu S, Bhalaji N (2017) Analysis of clustered QoS routing protocol for distributed wireless sensor network. Comput Electr Eng 64:173–181CrossRef
Zurück zum Zitat Stallings W (2005) Cryptography and network security principles and practices, 4th edn. Prentice Hall, Englewood Stallings W (2005) Cryptography and network security principles and practices, 4th edn. Prentice Hall, Englewood
Zurück zum Zitat Sun G, Li Y, Hongfang Yu, Vasilakos AV, Xiaojiang D, Guizani M (2019) Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks. Future Gener Comput Syst 91:347–360CrossRef Sun G, Li Y, Hongfang Yu, Vasilakos AV, Xiaojiang D, Guizani M (2019) Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks. Future Gener Comput Syst 91:347–360CrossRef
Zurück zum Zitat Thangaramya K, Kulothungan K, Logambigai R, Selvi M, Ganapathy S, Kannan A (2019) Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. Comput Netw 151:211–223CrossRef Thangaramya K, Kulothungan K, Logambigai R, Selvi M, Ganapathy S, Kannan A (2019) Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. Comput Netw 151:211–223CrossRef
Zurück zum Zitat Weichao W, Fei D, Qijian X (2009) An improvement of LEACH routing protocol based on trust for wireless sensor networks, 2009. In: 5th conference on wireless communications and mobile computing, pp 1–4 Weichao W, Fei D, Qijian X (2009) An improvement of LEACH routing protocol based on trust for wireless sensor networks, 2009. In: 5th conference on wireless communications and mobile computing, pp 1–4
Zurück zum Zitat Younis O, Fahmy S (2004) HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Trans Mob Comput 3(4):366–379CrossRef Younis O, Fahmy S (2004) HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Trans Mob Comput 3(4):366–379CrossRef
Metadaten
Titel
Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN
verfasst von
K. Thangaramya
K. Kulothungan
S. Indira Gandhi
M. Selvi
S. V. N. Santhosh Kumar
Kannan Arputharaj
Publikationsdatum
23.04.2020
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 21/2020
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-020-04955-z

Weitere Artikel der Ausgabe 21/2020

Soft Computing 21/2020 Zur Ausgabe

Methodologies and Application

XACBench: a XACML policy benchmark