An Adapted Fire Hawk Cluster-Based Trust Coati Optimal Routing for Effectual Security in WSN
International Journal of Electronics and Communication Engineering |
© 2024 by SSRG - IJECE Journal |
Volume 11 Issue 1 |
Year of Publication : 2024 |
Authors : R. Kennady, K. Thinakaran |
How to Cite?
R. Kennady, K. Thinakaran, "An Adapted Fire Hawk Cluster-Based Trust Coati Optimal Routing for Effectual Security in WSN," SSRG International Journal of Electronics and Communication Engineering, vol. 11, no. 1, pp. 86-100, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I1P107
Abstract:
Wireless Sensor Networks (WSNs) are growing, improving human well-being, and being used for medical and military operations has highlighted the importance of data security. This is essential to avoid data handling, and thus, trust administration is an excellent way to handle these concerns by establishing Sensor Node (SN) trust associations. The Adapted Fire Hawk Cluster-based Novel Trust Coati Optimal Routing (AFHC-NTCOR) technique considers node energy restrictions to improve WSNs network security. The methodology also uses the Fire Hawk Optimizer (FHO) algorithm for clustering that selects Cluster Heads (CHs) from candidate SNs. They are chosen based on their energy reserves and trustworthiness stages, which must be above the network’s averages. AFHC-NTCOR uses a trustworthy routing algorithm to determine inter-cluster routing paths. Information is sent from CHs to the Base Station (BS) via these pathways. With the Coati Optimization (CO) algorithm, the suggested route construction strategy considers energy and dependability. The Network Simulator version 2 (NS2) platform compares the AFHC-NTCOR protocol to other safe routing systems in energy consumption, data transfer rate, detection ratio, packet loss frequency, accuracy, and latency. This research shows that AFHC-NTCOR surpasses other methods in usefulness and effectiveness.
Keywords:
WSN, Clustering, Trust management, Network security, Modified fire hawk, Coati Optimal Routing, Network lifetime.
References:
[1] Efat Yousefpoor, Hamid Barati, and Ali Barati, “A Hierarchical Secure Data Aggregation Method Using the Dragonfly Algorithm in Wireless Sensor Networks,” Peer-to-Peer Networking and Applications, vol. 14, pp. 1917-1942, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Mohammad Sadegh Yousefpoor, and Hamid Barati, “DSKMS: A Dynamic Smart Key Management System Based on Fuzzy Logic in Wireless Sensor Networks,” Wireless Networks, vol. 26, pp. 2515-2535, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Mohammad Sadegh Yousefpoor, and Hamid Barati, “Dynamic Keys Management Algorithms in Wireless Sensor Networks: A Survey,” Computers Communications, vol. 134, pp. 52-69, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Amir Masoud Rahmani et al., “An Energy-Aware and Q-Learning-Based Area Coverage for Oil Pipeline Monitoring Systems Using Sensors and Internet of Things,” Scientific Reports, vol. 12, pp. 1-17, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Hojjatollah Esmaeili, Behrouz Minaei Bidgoli, and Vesal Hakami, “CMML: Combined Metaheuristic-Machine Learning for Adaptable Routing in Clustered Wireless Sensor Networks,” Applied Soft Computing, vol. 118, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Natalie Temene et al., “A Survey on Mobility in Wireless Sensor Networks,” Ad Hoc Networks, vol. 125, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Amir Masoud Rahmani et al., “An Area Coverage Scheme Based on Fuzzy Logic and Shuffled Frog-Leaping Algorithm (SFLA) in Heterogeneous Wireless Sensor Networks,” Mathematics, vol. 9, no. 18, pp. 1-41, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Mohammad Sadegh Yousefpoor et al., “Secure Data Aggregation Methods and Countermeasures against Various Attacks in Wireless Sensor Networks: A Comprehensive Review,” Journal of Network and Computer Applications, vol. 190, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Asha Jerlin Manuel et al., “Optimizations of Routing-Based Clustering Approach in Wireless Sensor Network: Review and Open Research Issues,” Electronics, vol. 9, no. 10, pp. 1-29, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Chao Chen, Li-Chun Wang, and Chih-Min Yu, “D2CRP: A Novel Distributed 2-Hop Cluster Routing Protocol for Wireless Sensor Networks,” IEEE Internet of Things Journal, vol. 9, no. 20, pp. 19575-19588, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Salim El Khediri, “Wireless Sensor Networks: A Survey, Categorization, Main Issues, and Future Orientations for Clustering Protocols,” Computing, vol. 104, pp. 1775-1837, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Adnan Ahmed et al., “A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network,” Mobile Networks and Applications, vol. 21, pp. 272-285, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Mahmood Salehi et al., “Towards a Novel Trust-Based Opportunistic Routing Protocol for Wireless Networks,” Wireless Networks, vol. 22, pp. 927-943, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Abdulhamid Zahedi, and Faryad Parma, “An Energy-Aware Trust-Based Routing Algorithm Using Gravitational Search Approach in Wireless Sensor Networks,” Peer-to-Peer Networking and Applications, vol. 12, pp. 167-176, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Deep Kumar Bangotra et al., “An Intelligent Opportunistic Routing Algorithm for Wireless Sensor Networks and Its Application towards e-Healthcare,” Sensors, vol. 20, no. 14, pp. 1-21, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Thangaramya Kalidoss et al., “QoS Aware Trust Based Routing Algorithm for Wireless Sensor Networks,” Wireless Personal Communications, vol. 110, pp. 1637-1658, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Deep Kumar Bangotra et al., “A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks,” Wireless Personal Communications, vol. 127, pp. 1045-1066, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Adam Raja Basha, “Energy Efficient Aggregation Technique-Based Realizable Secure Aware Routing Protocol for Wireless Sensor Network,” IET Wireless Sensor Systems, vol. 10, no. 4, pp. 166-174, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Liu Yang et al., “A Dynamic Behavior Monitoring Game-Based Trust Evaluation Scheme for Clustering in Wireless Sensor Networks,” IEEE Access, vol. 6, pp. 71404-71412, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Nor Azimah Khalid, Quan Bai, and Adnan Al-Anbuky, “Adaptive Trust-Based Routing Protocol for Large Scale WSNs,” IEEE Access, vol. 7, pp. 143539-143549, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Mohammed Zaki Hasan, Fadi Al-Turjman, and Hussain Al-Rizzo, “Analysis of Cross-Layer Design of Quality-of-Service Forward Geographic Wireless Sensor Network Routing Strategies in Green Internet of Things,” IEEE Access, vol. 6, pp. 20371-20389, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Boyuan Sun, and Donghui Li, “A Comprehensive Trust-Aware Routing Protocol with Multi-Attributes for WSNs,” IEEE Access, vol. 6, pp. 4725-4741, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Richa Sharma, Vasudha Vashisht, and Umang Singh, “WOATCA: A Secure and Energy Aware Scheme Based on Whale Optimization in Clustered Wireless Sensor Networks,” IET Communication, vol. 14, no. 8, pp. 1199-1208, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Changsun Shin, and Meonghun Lee, “Swarm-Intelligence-Centric Routing Algorithm for Wireless Sensor Networks,” Sensors, vol. 20, no. 18, pp. 1-13, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Amirhossein Barzin et al., “A Hybrid Swarm Intelligence Algorithm for Clustering-Based Routing in Wireless Sensor Networks,” Journal of Circuits, Systems and Computers, vol. 29, no. 10, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Rajathi Natarajan et al., “Energy and Distance Based Multi-Objective Red Fox Optimization Algorithm in Wireless Sensor Network,” Sensors, vol. 22, no. 10, pp. 1-19, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Xingsi Xue et al., “A Hybrid Cross Layer with Harris-Hawk Optimization-Based Efficient Routing for Wireless Sensor Networks,” Symmetry, vol. 15, no. 2, pp. 1-25, 2023.
[CrossRef] [Google Scholar] [Publisher Link]