Skip to main content
Erschienen in: Telecommunication Systems 3/2020

13.02.2020

eeTMFO/GA: a secure and energy efficient cluster head selection in wireless sensor networks

verfasst von: Richa Sharma, Vasudha Vashisht, Umang Singh

Erschienen in: Telecommunication Systems | Ausgabe 3/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Proliferation of technologies in wireless sensor networks is grabbing huge attention across scientific community due to its vast coverage in real life applications. It has emerged as an important technology with lots of potential as it provides useful information to the end users about a target region through real time sensing. Wireless sensor networks due to their characteristics like infrastructure-less deployment, resource restricted nature introduce several issues which may affect the performance of the system. Among these issues, most challenging issues such as energy efficiency, appropriate cluster head selection, secure data delivery and network lifetime enhancement require important concern for enhancement of WSNs which is still herculean task. This paper introduces a secure and energy aware clustering algorithm named energy efficient trusted moth flame optimization and genetic algorithm based clustering algorithm (eeTMFO/GA). Selection of most deserving trustworthy head node (also known as cluster head) is done by using moth flame optimization in clustered WSN framework. In eeTMFO/GA, the fitness function is evaluated on the basis of five important parameters including direct trust metrics such as packet forwarding progress, residual energy of elected node, connected node density, average cluster distance and average delay of transmission. Simulation outcomes have shown significant improvement in energy conservation and network stability period enhancement for eeTMFO/GA in comparison to the existing clustering schemes by 60% in comparison to LEACH protocol, 56.09% when compared to HEED protocol and has shown 42.22% and 16.36% improvement in comparison to ABC and QABC protocols respectively.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
3.
Zurück zum Zitat Hoang, D. C., Yadav, P., Kumar, R., & Panda, S. K. (2010). A robust harmony search algorithm based clustering protocol for wireless sensor networks. In Communications workshops (ICC), 2010 IEEE international conference (pp. 1–5). Hoang, D. C., Yadav, P., Kumar, R., & Panda, S. K. (2010). A robust harmony search algorithm based clustering protocol for wireless sensor networks. In Communications workshops (ICC), 2010 IEEE international conference (pp. 1–5).
4.
Zurück zum Zitat Song, M. A. O., & Zhao, C. L. (2011). Unequal clustering algorithm for WSN based on fuzzy logic and improved ACO. The Journal of China Universities of Posts and Telecommunications,18(6), 89–97.CrossRef Song, M. A. O., & Zhao, C. L. (2011). Unequal clustering algorithm for WSN based on fuzzy logic and improved ACO. The Journal of China Universities of Posts and Telecommunications,18(6), 89–97.CrossRef
5.
Zurück zum Zitat Enami, N., Moghadam, R. A., & Ahmadi, K. D. (2010). A new neural network based energy efficient clustering protocol for wireless sensor networks. In Computer sciences and convergence information technology (ICCIT), 2010 5th international conference (pp. 40–45). Enami, N., Moghadam, R. A., & Ahmadi, K. D. (2010). A new neural network based energy efficient clustering protocol for wireless sensor networks. In Computer sciences and convergence information technology (ICCIT), 2010 5th international conference (pp. 40–45).
6.
Zurück zum Zitat Bagci, H., & Yazici, A. (2010). An energy aware fuzzy unequal clustering algorithm for wireless sensor networks. In Fuzzy systems (FUZZ), 2010 IEEE international conference (pp. 1–8). Bagci, H., & Yazici, A. (2010). An energy aware fuzzy unequal clustering algorithm for wireless sensor networks. In Fuzzy systems (FUZZ), 2010 IEEE international conference (pp. 1–8).
7.
Zurück zum Zitat Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In System sciences, 2000 proceedings of the 33rd annual Hawaii international conference (p. 10). Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In System sciences, 2000 proceedings of the 33rd annual Hawaii international conference (p. 10).
8.
Zurück zum Zitat Younis, O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing,3(4), 366–379.CrossRef Younis, O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing,3(4), 366–379.CrossRef
9.
Zurück zum Zitat Lindsey, S., & Raghavendra, C. S. (2002). PEGASIS: Power-efficient gathering in sensor information systems. Aerospace Conference Proceedings,3, 1125–1130. Lindsey, S., & Raghavendra, C. S. (2002). PEGASIS: Power-efficient gathering in sensor information systems. Aerospace Conference Proceedings,3, 1125–1130.
10.
Zurück zum Zitat Song, F., & Zhao, B. (2008). Trust-based LEACH protocol for wireless sensor networks. In Future generation communication and networking, FGCN’08 second international conference (Vol. 1, pp. 202–207). Song, F., & Zhao, B. (2008). Trust-based LEACH protocol for wireless sensor networks. In Future generation communication and networking, FGCN’08 second international conference (Vol. 1, pp. 202–207).
11.
Zurück zum Zitat Shaikh, R. A., Jameel, H., d’Auriol, B. J., Lee, H., Lee, S., & Song, Y. J. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems,20(11), 1698–1712.CrossRef Shaikh, R. A., Jameel, H., d’Auriol, B. J., Lee, H., Lee, S., & Song, Y. J. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems,20(11), 1698–1712.CrossRef
12.
Zurück zum Zitat Guo, W. W., & Looi, M. (2012). A framework of trust-energy balanced procedure for cluster head selection in wireless sensor networks. Journal of Networks,7(10), 1592.CrossRef Guo, W. W., & Looi, M. (2012). A framework of trust-energy balanced procedure for cluster head selection in wireless sensor networks. Journal of Networks,7(10), 1592.CrossRef
13.
Zurück zum Zitat Sahoo, R. R., Singh, M., Sardar, A. R., Mohapatra, S., & Sarkar, S. K. (2013). TREE-CR: Trust based secure and energy efficient clustering in WSN. In Emerging trends in computing, communication and nanotechnology (ICE-CCN), 2013 international conference (pp. 532–538). Sahoo, R. R., Singh, M., Sardar, A. R., Mohapatra, S., & Sarkar, S. K. (2013). TREE-CR: Trust based secure and energy efficient clustering in WSN. In Emerging trends in computing, communication and nanotechnology (ICE-CCN), 2013 international conference (pp. 532–538).
14.
Zurück zum Zitat Sahoo, R. R., Singh, M., Sahoo, B. M., Majumder, K., Ray, S., & Sarkar, S. K. (2013). A light weight trust based secure and energy efficient clustering in wireless sensor network: Honey bee mating intelligence approach. Procedia Technology,10, 515–523.CrossRef Sahoo, R. R., Singh, M., Sahoo, B. M., Majumder, K., Ray, S., & Sarkar, S. K. (2013). A light weight trust based secure and energy efficient clustering in wireless sensor network: Honey bee mating intelligence approach. Procedia Technology,10, 515–523.CrossRef
16.
Zurück zum Zitat Juliana, R., & Maheswari, P. U. (2016). An energy efficient cluster head selection technique using network trust and swarm intelligence. Wireless Personal Communications,89(2), 351–364.CrossRef Juliana, R., & Maheswari, P. U. (2016). An energy efficient cluster head selection technique using network trust and swarm intelligence. Wireless Personal Communications,89(2), 351–364.CrossRef
17.
Zurück zum Zitat Nimbalkar, N. B., Das, S. S., & Wagh, S. J. (2015). Trust based energy efficient clustering using genetic algorithm in wireless sensor networks (teecga). International Journal of Computer Applications,112(9), 30–33. Nimbalkar, N. B., Das, S. S., & Wagh, S. J. (2015). Trust based energy efficient clustering using genetic algorithm in wireless sensor networks (teecga). International Journal of Computer Applications,112(9), 30–33.
18.
Zurück zum Zitat Tolba, F. D., Ajib, W., & Obaid, A. (2013). Distributed clustering algorithm for mobile wireless sensors networks. In SENSORS (pp. 1–4). Tolba, F. D., Ajib, W., & Obaid, A. (2013). Distributed clustering algorithm for mobile wireless sensors networks. In SENSORS (pp. 1–4).
19.
Zurück zum Zitat Dahane, A., Berrached, N. E., & Loukil, A. (2015). Balanced and safe weighted clustering algorithm for mobile wireless sensor networks. In IFIP international conference on computer science and its applications (pp. 429–441). Dahane, A., Berrached, N. E., & Loukil, A. (2015). Balanced and safe weighted clustering algorithm for mobile wireless sensor networks. In IFIP international conference on computer science and its applications (pp. 429–441).
20.
Zurück zum Zitat Rehman, E., Sher, M., Naqvi, S. H. A., Badar Khan, K., & Ullah, K. (2017). Energy efficient secure trust based clustering algorithm for mobile wireless sensor network. Journal of Computer Networks and Communications, 2017, 1630673. Rehman, E., Sher, M., Naqvi, S. H. A., Badar Khan, K., & Ullah, K. (2017). Energy efficient secure trust based clustering algorithm for mobile wireless sensor network. Journal of Computer Networks and Communications, 2017, 1630673.
21.
Zurück zum Zitat Mittal, N. (2019). Moth flame optimization based energy efficient stable clustered routing approach for wireless sensor networks. Wireless Personal Communications,104(2), 677–694.CrossRef Mittal, N. (2019). Moth flame optimization based energy efficient stable clustered routing approach for wireless sensor networks. Wireless Personal Communications,104(2), 677–694.CrossRef
22.
Zurück zum Zitat Kukreja, D., Singh, U., & Reddy, B. V. R. (2012). Analytical models for trust based routing protocols in wireless ad hoc networks. ACM SIGSOFT Software Engineering Notes,37(4), 1–16.CrossRef Kukreja, D., Singh, U., & Reddy, B. V. R. (2012). Analytical models for trust based routing protocols in wireless ad hoc networks. ACM SIGSOFT Software Engineering Notes,37(4), 1–16.CrossRef
23.
Zurück zum Zitat Umang, S., Reddy, B. V. R., & Hoda, M. N. (2010). Enhanced intrusion detection system for malicious node detection in ad hoc routing protocols using minimal energy consumption. IET Communications,4(17), 2084–2094.CrossRef Umang, S., Reddy, B. V. R., & Hoda, M. N. (2010). Enhanced intrusion detection system for malicious node detection in ad hoc routing protocols using minimal energy consumption. IET Communications,4(17), 2084–2094.CrossRef
24.
Zurück zum Zitat Ahmad, A., Ahmad, S., Rehmani, M. H., & Hassan, N. U. (2015). A survey on radio resource allocation in cognitive radio sensor networks. IEEE Communications Surveys & Tutorials,17(2), 888–917.CrossRef Ahmad, A., Ahmad, S., Rehmani, M. H., & Hassan, N. U. (2015). A survey on radio resource allocation in cognitive radio sensor networks. IEEE Communications Surveys & Tutorials,17(2), 888–917.CrossRef
25.
Zurück zum Zitat Talapatra, S., & Roy, A. (2014). Mobility based cluster head selection algorithm for mobile ad-hoc network. International Journal of Computer Network and Information Security,6(7), 42.CrossRef Talapatra, S., & Roy, A. (2014). Mobility based cluster head selection algorithm for mobile ad-hoc network. International Journal of Computer Network and Information Security,6(7), 42.CrossRef
26.
Zurück zum Zitat Ren, M., Khoukhi, L., Labiod, H., Zhang, J., & Veque, V. (2017). A mobility-based scheme for dynamic clustering in vehicular ad-hoc networks (VANETs). Vehicular Communications,9, 233–241.CrossRef Ren, M., Khoukhi, L., Labiod, H., Zhang, J., & Veque, V. (2017). A mobility-based scheme for dynamic clustering in vehicular ad-hoc networks (VANETs). Vehicular Communications,9, 233–241.CrossRef
27.
Zurück zum Zitat Wang, J., Yin, Y., Zhang, J., Lee, S., & Sherratt, R. S. (2013). Mobility based energy efficient and multi-sink algorithms for consumer home networks. IEEE Transactions on Consumer Electronics,59(1), 77–84.CrossRef Wang, J., Yin, Y., Zhang, J., Lee, S., & Sherratt, R. S. (2013). Mobility based energy efficient and multi-sink algorithms for consumer home networks. IEEE Transactions on Consumer Electronics,59(1), 77–84.CrossRef
28.
Zurück zum Zitat Choudhary, P., Dwivedi, R. K., & Singh, U. (2020). Novel algorithm for leader election process in virtual traffic light protocol. International Journal of Information Technology, 12(1), 113–117.CrossRef Choudhary, P., Dwivedi, R. K., & Singh, U. (2020). Novel algorithm for leader election process in virtual traffic light protocol. International Journal of Information Technology, 12(1), 113–117.CrossRef
29.
Zurück zum Zitat Mirjalili, S. (2015). Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm. Knowledge-Based Systems,89, 228–249.CrossRef Mirjalili, S. (2015). Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm. Knowledge-Based Systems,89, 228–249.CrossRef
30.
Zurück zum Zitat Yamany, W., Fawzy, M., Tharwat, A., & Hassanien, A. E. (2015). Moth-flame optimization for training multi-layer perceptrons. In Computer engineering conference (ICENCO), 2015 11th international conference (pp. 267–272). Yamany, W., Fawzy, M., Tharwat, A., & Hassanien, A. E. (2015). Moth-flame optimization for training multi-layer perceptrons. In Computer engineering conference (ICENCO), 2015 11th international conference (pp. 267–272).
31.
Zurück zum Zitat El Aziz, M. A., Ewees, A. A., & Hassanien, A. E. (2017). Whale optimization algorithm and moth-flame optimization for multilevel thresholding image segmentation. Expert Systems with Applications,83, 242–256.CrossRef El Aziz, M. A., Ewees, A. A., & Hassanien, A. E. (2017). Whale optimization algorithm and moth-flame optimization for multilevel thresholding image segmentation. Expert Systems with Applications,83, 242–256.CrossRef
32.
Zurück zum Zitat Ewees, A. A., Sahlol, A. T., & Amasha, M. A. (2017). A bio-inspired moth-flame optimization algorithm for Arabic handwritten letter recognition. In Control, artificial intelligence, robotics & optimization (ICCAIRO), 2017 international conference (pp. 154–159). Ewees, A. A., Sahlol, A. T., & Amasha, M. A. (2017). A bio-inspired moth-flame optimization algorithm for Arabic handwritten letter recognition. In Control, artificial intelligence, robotics & optimization (ICCAIRO), 2017 international conference (pp. 154–159).
33.
Zurück zum Zitat Jangir, N., Pandya, M. H., Trivedi, I. N., Bhesdadiya, R. H., Jangir, P., & Kumar, A. (2016). Moth-flame optimization algorithm for solving real challenging constrained engineering optimization problems. In Electrical, electronics and computer science (SCEECS), 2016 IEEE students’ conference (pp. 1–5). Jangir, N., Pandya, M. H., Trivedi, I. N., Bhesdadiya, R. H., Jangir, P., & Kumar, A. (2016). Moth-flame optimization algorithm for solving real challenging constrained engineering optimization problems. In Electrical, electronics and computer science (SCEECS), 2016 IEEE students’ conference (pp. 1–5).
34.
Zurück zum Zitat Salleh, M. N. M., Hussain, K., Cheng, S., Shi, Y., Muhammad, A., Ullah, G., & Naseem, R. (2018). Exploration and exploitation measurement in swarm-based metaheuristic algorithms: An empirical analysis. In International conference on soft computing and data mining (pp. 24–32). Salleh, M. N. M., Hussain, K., Cheng, S., Shi, Y., Muhammad, A., Ullah, G., & Naseem, R. (2018). Exploration and exploitation measurement in swarm-based metaheuristic algorithms: An empirical analysis. In International conference on soft computing and data mining (pp. 24–32).
35.
Zurück zum Zitat Holland, J. H. (1992). Genetic algorithms. Scientific American,267(1), 66–73.CrossRef Holland, J. H. (1992). Genetic algorithms. Scientific American,267(1), 66–73.CrossRef
36.
Zurück zum Zitat Tsoulos, I. G. (2009). Solving constrained optimization problems using a novel genetic algorithm. Applied Mathematics and Computation,208(1), 273–283.CrossRef Tsoulos, I. G. (2009). Solving constrained optimization problems using a novel genetic algorithm. Applied Mathematics and Computation,208(1), 273–283.CrossRef
37.
Zurück zum Zitat Herrmann, J. W. (1999). A genetic algorithm for minimax optimization problems. In Evolutionary computation, 1999. CEC 99. Proceedings of the 1999 congress (Vol. 2, pp. 1099–1103). Herrmann, J. W. (1999). A genetic algorithm for minimax optimization problems. In Evolutionary computation, 1999. CEC 99. Proceedings of the 1999 congress (Vol. 2, pp. 1099–1103).
38.
Zurück zum Zitat Basagni, S., Carosi, A., & Petrioli, C. (2008). Mobility in wireless sensor networks. In Algorithms and protocols for wireless sensor networks (pp. 267–305). Basagni, S., Carosi, A., & Petrioli, C. (2008). Mobility in wireless sensor networks. In Algorithms and protocols for wireless sensor networks (pp. 267–305).
39.
Zurück zum Zitat Patel, R., Porwal, V., & Kapoor, R. K. (2014). A review of mobility-based wireless sensor networks. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET),3(8), 2811–2815. Patel, R., Porwal, V., & Kapoor, R. K. (2014). A review of mobility-based wireless sensor networks. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET),3(8), 2811–2815.
40.
Zurück zum Zitat Kumar, G. S., Vinu, P. M., & Jacob, K. P. (2008). Mobility metric based leach-mobile protocol. In Advanced computing and communications, ADCOM 2008, 16th international conference (pp. 248–253). Kumar, G. S., Vinu, P. M., & Jacob, K. P. (2008). Mobility metric based leach-mobile protocol. In Advanced computing and communications, ADCOM 2008, 16th international conference (pp. 248–253).
41.
Zurück zum Zitat Wang, H., Chen, Y., & Dong, S. (2016). Research on efficient-efficient routing protocol for WSNs based on improved artificial bee colony algorithm. IET Wireless Sensor Systems,7(1), 15–20.CrossRef Wang, H., Chen, Y., & Dong, S. (2016). Research on efficient-efficient routing protocol for WSNs based on improved artificial bee colony algorithm. IET Wireless Sensor Systems,7(1), 15–20.CrossRef
Metadaten
Titel
eeTMFO/GA: a secure and energy efficient cluster head selection in wireless sensor networks
verfasst von
Richa Sharma
Vasudha Vashisht
Umang Singh
Publikationsdatum
13.02.2020
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 3/2020
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-020-00654-0

Weitere Artikel der Ausgabe 3/2020

Telecommunication Systems 3/2020 Zur Ausgabe

Neuer Inhalt