A Cognitive Energy Efficient and Trusted Routing Model for the Security of Wireless Sensor Networks: CEMT

There are many smart applications evolved in the area of the wireless sensor networks. The applications of WSNs are exponentially increasing every year which creates a lot of security challenges that need to be addressed to safeguard the devices in WSN. Due to the dynamic characteristics of these re...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless personal communications 2021-08, Vol.119 (4), p.3149-3159
Hauptverfasser: Feroz Khan, A. B., Anandharaj, G.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3159
container_issue 4
container_start_page 3149
container_title Wireless personal communications
container_volume 119
creator Feroz Khan, A. B.
Anandharaj, G.
description There are many smart applications evolved in the area of the wireless sensor networks. The applications of WSNs are exponentially increasing every year which creates a lot of security challenges that need to be addressed to safeguard the devices in WSN. Due to the dynamic characteristics of these resource constrained devices in WSN, there must be high level security requirements to be considered to create a high secure environments. This paper presents an efficient multi attribute based routing algorithm to provide secure routing of information for WSNs. The work proposed in this paper can decrease the energy and enhances the performance of the network than the currently available routing algorithm such as multi-attribute pheromone ant secure routing algorithm based on reputation value and ant-colony optimization algorithm. The proposed work secures the network environment with the improved detection techniques based on nodes’ higher coincidence rates to find the malicious behavior using trust calculation algorithm. This algorithm uses some QoS parameters such as reliability rate, elapsed time to detect impersonation attacks, and stability rate for trust related attacks, to perform an efficient trust calculation of the nodes in communication. The outcome of the simulation show that the proposed method enhances the performance of the network with the improved detection rate and secure routing service.
doi_str_mv 10.1007/s11277-021-08391-6
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2565483234</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2565483234</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-581bd1389cc155f59db61e684c3f0e5e66c15392cd88bc5556a9146bf425dc3e3</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhoMoWKt_wFPA82o-NtmNt1LqB7QKWtFb6GYnNbVuNMkq_fdGK3jzNPDO-8zAg9AxJaeUkOosUsqqqiCMFqTmihZyBw2oqFhR8_JpFw2IYqqQjLJ9dBDjipCMKTZAboTHftm55D4ATzoIyw2eWOuMgy7hRdfieehjghbf-T65bolnvoU1tj7g9Az4HkwfXNpgb_GjC7CGGHPYxby_gfTpw0s8x-PJbH6I9uxiHeHodw7Rw8VkPr4qpreX1-PRtDCcqlSImjYt5bUyhgphhWobSUHWpeGWgAApc84VM21dN0YIIReKlrKxJROt4cCH6GR79y349x5i0ivfhy6_1ExIUdac8TK32LZlgo8xgNVvwb0uwkZTor-V6q1SnZXqH6VaZohvoZjL3RLC3-l_qC9hfXkH</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2565483234</pqid></control><display><type>article</type><title>A Cognitive Energy Efficient and Trusted Routing Model for the Security of Wireless Sensor Networks: CEMT</title><source>Springer Nature - Complete Springer Journals</source><creator>Feroz Khan, A. B. ; Anandharaj, G.</creator><creatorcontrib>Feroz Khan, A. B. ; Anandharaj, G.</creatorcontrib><description>There are many smart applications evolved in the area of the wireless sensor networks. The applications of WSNs are exponentially increasing every year which creates a lot of security challenges that need to be addressed to safeguard the devices in WSN. Due to the dynamic characteristics of these resource constrained devices in WSN, there must be high level security requirements to be considered to create a high secure environments. This paper presents an efficient multi attribute based routing algorithm to provide secure routing of information for WSNs. The work proposed in this paper can decrease the energy and enhances the performance of the network than the currently available routing algorithm such as multi-attribute pheromone ant secure routing algorithm based on reputation value and ant-colony optimization algorithm. The proposed work secures the network environment with the improved detection techniques based on nodes’ higher coincidence rates to find the malicious behavior using trust calculation algorithm. This algorithm uses some QoS parameters such as reliability rate, elapsed time to detect impersonation attacks, and stability rate for trust related attacks, to perform an efficient trust calculation of the nodes in communication. The outcome of the simulation show that the proposed method enhances the performance of the network with the improved detection rate and secure routing service.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-021-08391-6</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Communications Engineering ; Computer Communication Networks ; Dynamic characteristics ; Engineering ; Networks ; Nodes ; Optimization ; Signal,Image and Speech Processing ; Trust ; Wireless networks ; Wireless sensor networks</subject><ispartof>Wireless personal communications, 2021-08, Vol.119 (4), p.3149-3159</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-581bd1389cc155f59db61e684c3f0e5e66c15392cd88bc5556a9146bf425dc3e3</citedby><cites>FETCH-LOGICAL-c319t-581bd1389cc155f59db61e684c3f0e5e66c15392cd88bc5556a9146bf425dc3e3</cites><orcidid>0000-0002-9395-9493</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-021-08391-6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-021-08391-6$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Feroz Khan, A. B.</creatorcontrib><creatorcontrib>Anandharaj, G.</creatorcontrib><title>A Cognitive Energy Efficient and Trusted Routing Model for the Security of Wireless Sensor Networks: CEMT</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>There are many smart applications evolved in the area of the wireless sensor networks. The applications of WSNs are exponentially increasing every year which creates a lot of security challenges that need to be addressed to safeguard the devices in WSN. Due to the dynamic characteristics of these resource constrained devices in WSN, there must be high level security requirements to be considered to create a high secure environments. This paper presents an efficient multi attribute based routing algorithm to provide secure routing of information for WSNs. The work proposed in this paper can decrease the energy and enhances the performance of the network than the currently available routing algorithm such as multi-attribute pheromone ant secure routing algorithm based on reputation value and ant-colony optimization algorithm. The proposed work secures the network environment with the improved detection techniques based on nodes’ higher coincidence rates to find the malicious behavior using trust calculation algorithm. This algorithm uses some QoS parameters such as reliability rate, elapsed time to detect impersonation attacks, and stability rate for trust related attacks, to perform an efficient trust calculation of the nodes in communication. The outcome of the simulation show that the proposed method enhances the performance of the network with the improved detection rate and secure routing service.</description><subject>Algorithms</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Dynamic characteristics</subject><subject>Engineering</subject><subject>Networks</subject><subject>Nodes</subject><subject>Optimization</subject><subject>Signal,Image and Speech Processing</subject><subject>Trust</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kE1LAzEQhoMoWKt_wFPA82o-NtmNt1LqB7QKWtFb6GYnNbVuNMkq_fdGK3jzNPDO-8zAg9AxJaeUkOosUsqqqiCMFqTmihZyBw2oqFhR8_JpFw2IYqqQjLJ9dBDjipCMKTZAboTHftm55D4ATzoIyw2eWOuMgy7hRdfieehjghbf-T65bolnvoU1tj7g9Az4HkwfXNpgb_GjC7CGGHPYxby_gfTpw0s8x-PJbH6I9uxiHeHodw7Rw8VkPr4qpreX1-PRtDCcqlSImjYt5bUyhgphhWobSUHWpeGWgAApc84VM21dN0YIIReKlrKxJROt4cCH6GR79y349x5i0ivfhy6_1ExIUdac8TK32LZlgo8xgNVvwb0uwkZTor-V6q1SnZXqH6VaZohvoZjL3RLC3-l_qC9hfXkH</recordid><startdate>20210801</startdate><enddate>20210801</enddate><creator>Feroz Khan, A. B.</creator><creator>Anandharaj, G.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-9395-9493</orcidid></search><sort><creationdate>20210801</creationdate><title>A Cognitive Energy Efficient and Trusted Routing Model for the Security of Wireless Sensor Networks: CEMT</title><author>Feroz Khan, A. B. ; Anandharaj, G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-581bd1389cc155f59db61e684c3f0e5e66c15392cd88bc5556a9146bf425dc3e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Dynamic characteristics</topic><topic>Engineering</topic><topic>Networks</topic><topic>Nodes</topic><topic>Optimization</topic><topic>Signal,Image and Speech Processing</topic><topic>Trust</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Feroz Khan, A. B.</creatorcontrib><creatorcontrib>Anandharaj, G.</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Feroz Khan, A. B.</au><au>Anandharaj, G.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Cognitive Energy Efficient and Trusted Routing Model for the Security of Wireless Sensor Networks: CEMT</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2021-08-01</date><risdate>2021</risdate><volume>119</volume><issue>4</issue><spage>3149</spage><epage>3159</epage><pages>3149-3159</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>There are many smart applications evolved in the area of the wireless sensor networks. The applications of WSNs are exponentially increasing every year which creates a lot of security challenges that need to be addressed to safeguard the devices in WSN. Due to the dynamic characteristics of these resource constrained devices in WSN, there must be high level security requirements to be considered to create a high secure environments. This paper presents an efficient multi attribute based routing algorithm to provide secure routing of information for WSNs. The work proposed in this paper can decrease the energy and enhances the performance of the network than the currently available routing algorithm such as multi-attribute pheromone ant secure routing algorithm based on reputation value and ant-colony optimization algorithm. The proposed work secures the network environment with the improved detection techniques based on nodes’ higher coincidence rates to find the malicious behavior using trust calculation algorithm. This algorithm uses some QoS parameters such as reliability rate, elapsed time to detect impersonation attacks, and stability rate for trust related attacks, to perform an efficient trust calculation of the nodes in communication. The outcome of the simulation show that the proposed method enhances the performance of the network with the improved detection rate and secure routing service.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-021-08391-6</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0002-9395-9493</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0929-6212
ispartof Wireless personal communications, 2021-08, Vol.119 (4), p.3149-3159
issn 0929-6212
1572-834X
language eng
recordid cdi_proquest_journals_2565483234
source Springer Nature - Complete Springer Journals
subjects Algorithms
Communications Engineering
Computer Communication Networks
Dynamic characteristics
Engineering
Networks
Nodes
Optimization
Signal,Image and Speech Processing
Trust
Wireless networks
Wireless sensor networks
title A Cognitive Energy Efficient and Trusted Routing Model for the Security of Wireless Sensor Networks: CEMT
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T21%3A50%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Cognitive%20Energy%20Efficient%20and%20Trusted%20Routing%20Model%20for%20the%20Security%20of%20Wireless%20Sensor%20Networks:%20CEMT&rft.jtitle=Wireless%20personal%20communications&rft.au=Feroz%20Khan,%20A.%20B.&rft.date=2021-08-01&rft.volume=119&rft.issue=4&rft.spage=3149&rft.epage=3159&rft.pages=3149-3159&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-021-08391-6&rft_dat=%3Cproquest_cross%3E2565483234%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2565483234&rft_id=info:pmid/&rfr_iscdi=true