Skip to main content
Erschienen in: Wireless Personal Communications 1/2020

25.04.2020

Towards Secure Data Forwarding with ANFIS and Trust Evaluation in Wireless Sensor Networks

verfasst von: P. N. Renjith

Erschienen in: Wireless Personal Communications | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The rapid growth of Wireless Networking and MEMS augmented the human lifestyle. The combination of Wireless Sensor Networks (WSN) with Artificial Intelligence (AI) payed way to development of enormous application which can think like human and predict better results. Nowadays, AI assisted WSN applications are used in many places like border security, traffic monitoring and management, automated vehicles and much more which helps and saves human life. However, the possibility of adverse attacks on sensor nodes are also increasing. There are several reports on malicious intrusions and data leakage in WSN due to poor security mechanism. In this proposal, a novel Trust based Routing solution is proposed with the employment of ANFIS and NN with Trust algorithm. The experimental results of ATE protocol has proven that the protocol secure the WSN with higher lifetime and confidential data forwarding.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Singh, A., Kumar, D., & Hötzel, J. (2018). IoT Based information and communication system for enhancing underground mines safety and productivity: Genesis, taxonomy and open issues. Ad Hoc Networks, 78, 115–129.CrossRef Singh, A., Kumar, D., & Hötzel, J. (2018). IoT Based information and communication system for enhancing underground mines safety and productivity: Genesis, taxonomy and open issues. Ad Hoc Networks, 78, 115–129.CrossRef
2.
Zurück zum Zitat Soderi, S. (2019). Acoustic-based security: A key enabling technology for wireless sensor networks. International Journal of Wireless Information Networks. Soderi, S. (2019). Acoustic-based security: A key enabling technology for wireless sensor networks. International Journal of Wireless Information Networks.
3.
Zurück zum Zitat Ostadal, R., Matyas, V., Svenda, P., & Nemec, L. (2019). Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification. Sensor. Ostadal, R., Matyas, V., Svenda, P., & Nemec, L. (2019). Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification. Sensor.
5.
Zurück zum Zitat Chatterjee, P. (2009). Trust based clustering and secure routing scheme for mobile ad hoc networks. International Journal of Computer Networks and Communication, 1(2), 84–97.MathSciNet Chatterjee, P. (2009). Trust based clustering and secure routing scheme for mobile ad hoc networks. International Journal of Computer Networks and Communication, 1(2), 84–97.MathSciNet
6.
Zurück zum Zitat Pandey, K., & Swaroop, A. (2011). A comprehensive performance analysis of proactive, reactive and hybrid MANETs routing protocols. International Journal of Computer Science Issues, 8(6), 432–441. Pandey, K., & Swaroop, A. (2011). A comprehensive performance analysis of proactive, reactive and hybrid MANETs routing protocols. International Journal of Computer Science Issues, 8(6), 432–441.
11.
Zurück zum Zitat Yoshikawa, M., & Otani, K. (2010). Ant colony optimization routing algorithm with Tabu search. In Proceedings of the International multiconference of engineers and computer scientist (IMECS 2010). Yoshikawa, M., & Otani, K. (2010). Ant colony optimization routing algorithm with Tabu search. In Proceedings of the International multiconference of engineers and computer scientist (IMECS 2010).
17.
Zurück zum Zitat Lindsey, S., & Raghavendra, C. S. (2002). PEGASIS: Power-efficient gathering in sensor information systems. In Proceedings, IEEE Aerospace Conference, Big Sky, MT, USA, 2002. Lindsey, S., & Raghavendra, C. S. (2002). PEGASIS: Power-efficient gathering in sensor information systems. In Proceedings, IEEE Aerospace Conference, Big Sky, MT, USA, 2002.
Metadaten
Titel
Towards Secure Data Forwarding with ANFIS and Trust Evaluation in Wireless Sensor Networks
verfasst von
P. N. Renjith
Publikationsdatum
25.04.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07392-1

Weitere Artikel der Ausgabe 1/2020

Wireless Personal Communications 1/2020 Zur Ausgabe

Neuer Inhalt