A Cognitive Energy Efficient and Trusted Routing Model for the Security of Wireless Sensor Networks: CEMT
There are many smart applications evolved in the area of the wireless sensor networks. The applications of WSNs are exponentially increasing every year which creates a lot of security challenges that need to be addressed to safeguard the devices in WSN. Due to the dynamic characteristics of these re...
Gespeichert in:
Veröffentlicht in: | Wireless personal communications 2021-08, Vol.119 (4), p.3149-3159 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3159 |
---|---|
container_issue | 4 |
container_start_page | 3149 |
container_title | Wireless personal communications |
container_volume | 119 |
creator | Feroz Khan, A. B. Anandharaj, G. |
description | There are many smart applications evolved in the area of the wireless sensor networks. The applications of WSNs are exponentially increasing every year which creates a lot of security challenges that need to be addressed to safeguard the devices in WSN. Due to the dynamic characteristics of these resource constrained devices in WSN, there must be high level security requirements to be considered to create a high secure environments. This paper presents an efficient multi attribute based routing algorithm to provide secure routing of information for WSNs. The work proposed in this paper can decrease the energy and enhances the performance of the network than the currently available routing algorithm such as multi-attribute pheromone ant secure routing algorithm based on reputation value and ant-colony optimization algorithm. The proposed work secures the network environment with the improved detection techniques based on nodes’ higher coincidence rates to find the malicious behavior using trust calculation algorithm. This algorithm uses some QoS parameters such as reliability rate, elapsed time to detect impersonation attacks, and stability rate for trust related attacks, to perform an efficient trust calculation of the nodes in communication. The outcome of the simulation show that the proposed method enhances the performance of the network with the improved detection rate and secure routing service. |
doi_str_mv | 10.1007/s11277-021-08391-6 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2565483234</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2565483234</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-581bd1389cc155f59db61e684c3f0e5e66c15392cd88bc5556a9146bf425dc3e3</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhoMoWKt_wFPA82o-NtmNt1LqB7QKWtFb6GYnNbVuNMkq_fdGK3jzNPDO-8zAg9AxJaeUkOosUsqqqiCMFqTmihZyBw2oqFhR8_JpFw2IYqqQjLJ9dBDjipCMKTZAboTHftm55D4ATzoIyw2eWOuMgy7hRdfieehjghbf-T65bolnvoU1tj7g9Az4HkwfXNpgb_GjC7CGGHPYxby_gfTpw0s8x-PJbH6I9uxiHeHodw7Rw8VkPr4qpreX1-PRtDCcqlSImjYt5bUyhgphhWobSUHWpeGWgAApc84VM21dN0YIIReKlrKxJROt4cCH6GR79y349x5i0ivfhy6_1ExIUdac8TK32LZlgo8xgNVvwb0uwkZTor-V6q1SnZXqH6VaZohvoZjL3RLC3-l_qC9hfXkH</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2565483234</pqid></control><display><type>article</type><title>A Cognitive Energy Efficient and Trusted Routing Model for the Security of Wireless Sensor Networks: CEMT</title><source>Springer Nature - Complete Springer Journals</source><creator>Feroz Khan, A. B. ; Anandharaj, G.</creator><creatorcontrib>Feroz Khan, A. B. ; Anandharaj, G.</creatorcontrib><description>There are many smart applications evolved in the area of the wireless sensor networks. The applications of WSNs are exponentially increasing every year which creates a lot of security challenges that need to be addressed to safeguard the devices in WSN. Due to the dynamic characteristics of these resource constrained devices in WSN, there must be high level security requirements to be considered to create a high secure environments. This paper presents an efficient multi attribute based routing algorithm to provide secure routing of information for WSNs. The work proposed in this paper can decrease the energy and enhances the performance of the network than the currently available routing algorithm such as multi-attribute pheromone ant secure routing algorithm based on reputation value and ant-colony optimization algorithm. The proposed work secures the network environment with the improved detection techniques based on nodes’ higher coincidence rates to find the malicious behavior using trust calculation algorithm. This algorithm uses some QoS parameters such as reliability rate, elapsed time to detect impersonation attacks, and stability rate for trust related attacks, to perform an efficient trust calculation of the nodes in communication. The outcome of the simulation show that the proposed method enhances the performance of the network with the improved detection rate and secure routing service.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-021-08391-6</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Communications Engineering ; Computer Communication Networks ; Dynamic characteristics ; Engineering ; Networks ; Nodes ; Optimization ; Signal,Image and Speech Processing ; Trust ; Wireless networks ; Wireless sensor networks</subject><ispartof>Wireless personal communications, 2021-08, Vol.119 (4), p.3149-3159</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-581bd1389cc155f59db61e684c3f0e5e66c15392cd88bc5556a9146bf425dc3e3</citedby><cites>FETCH-LOGICAL-c319t-581bd1389cc155f59db61e684c3f0e5e66c15392cd88bc5556a9146bf425dc3e3</cites><orcidid>0000-0002-9395-9493</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-021-08391-6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-021-08391-6$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Feroz Khan, A. B.</creatorcontrib><creatorcontrib>Anandharaj, G.</creatorcontrib><title>A Cognitive Energy Efficient and Trusted Routing Model for the Security of Wireless Sensor Networks: CEMT</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>There are many smart applications evolved in the area of the wireless sensor networks. The applications of WSNs are exponentially increasing every year which creates a lot of security challenges that need to be addressed to safeguard the devices in WSN. Due to the dynamic characteristics of these resource constrained devices in WSN, there must be high level security requirements to be considered to create a high secure environments. This paper presents an efficient multi attribute based routing algorithm to provide secure routing of information for WSNs. The work proposed in this paper can decrease the energy and enhances the performance of the network than the currently available routing algorithm such as multi-attribute pheromone ant secure routing algorithm based on reputation value and ant-colony optimization algorithm. The proposed work secures the network environment with the improved detection techniques based on nodes’ higher coincidence rates to find the malicious behavior using trust calculation algorithm. This algorithm uses some QoS parameters such as reliability rate, elapsed time to detect impersonation attacks, and stability rate for trust related attacks, to perform an efficient trust calculation of the nodes in communication. The outcome of the simulation show that the proposed method enhances the performance of the network with the improved detection rate and secure routing service.</description><subject>Algorithms</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Dynamic characteristics</subject><subject>Engineering</subject><subject>Networks</subject><subject>Nodes</subject><subject>Optimization</subject><subject>Signal,Image and Speech Processing</subject><subject>Trust</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kE1LAzEQhoMoWKt_wFPA82o-NtmNt1LqB7QKWtFb6GYnNbVuNMkq_fdGK3jzNPDO-8zAg9AxJaeUkOosUsqqqiCMFqTmihZyBw2oqFhR8_JpFw2IYqqQjLJ9dBDjipCMKTZAboTHftm55D4ATzoIyw2eWOuMgy7hRdfieehjghbf-T65bolnvoU1tj7g9Az4HkwfXNpgb_GjC7CGGHPYxby_gfTpw0s8x-PJbH6I9uxiHeHodw7Rw8VkPr4qpreX1-PRtDCcqlSImjYt5bUyhgphhWobSUHWpeGWgAApc84VM21dN0YIIReKlrKxJROt4cCH6GR79y349x5i0ivfhy6_1ExIUdac8TK32LZlgo8xgNVvwb0uwkZTor-V6q1SnZXqH6VaZohvoZjL3RLC3-l_qC9hfXkH</recordid><startdate>20210801</startdate><enddate>20210801</enddate><creator>Feroz Khan, A. B.</creator><creator>Anandharaj, G.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-9395-9493</orcidid></search><sort><creationdate>20210801</creationdate><title>A Cognitive Energy Efficient and Trusted Routing Model for the Security of Wireless Sensor Networks: CEMT</title><author>Feroz Khan, A. B. ; Anandharaj, G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-581bd1389cc155f59db61e684c3f0e5e66c15392cd88bc5556a9146bf425dc3e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Dynamic characteristics</topic><topic>Engineering</topic><topic>Networks</topic><topic>Nodes</topic><topic>Optimization</topic><topic>Signal,Image and Speech Processing</topic><topic>Trust</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Feroz Khan, A. B.</creatorcontrib><creatorcontrib>Anandharaj, G.</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Feroz Khan, A. B.</au><au>Anandharaj, G.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Cognitive Energy Efficient and Trusted Routing Model for the Security of Wireless Sensor Networks: CEMT</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2021-08-01</date><risdate>2021</risdate><volume>119</volume><issue>4</issue><spage>3149</spage><epage>3159</epage><pages>3149-3159</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>There are many smart applications evolved in the area of the wireless sensor networks. The applications of WSNs are exponentially increasing every year which creates a lot of security challenges that need to be addressed to safeguard the devices in WSN. Due to the dynamic characteristics of these resource constrained devices in WSN, there must be high level security requirements to be considered to create a high secure environments. This paper presents an efficient multi attribute based routing algorithm to provide secure routing of information for WSNs. The work proposed in this paper can decrease the energy and enhances the performance of the network than the currently available routing algorithm such as multi-attribute pheromone ant secure routing algorithm based on reputation value and ant-colony optimization algorithm. The proposed work secures the network environment with the improved detection techniques based on nodes’ higher coincidence rates to find the malicious behavior using trust calculation algorithm. This algorithm uses some QoS parameters such as reliability rate, elapsed time to detect impersonation attacks, and stability rate for trust related attacks, to perform an efficient trust calculation of the nodes in communication. The outcome of the simulation show that the proposed method enhances the performance of the network with the improved detection rate and secure routing service.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-021-08391-6</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0002-9395-9493</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0929-6212 |
ispartof | Wireless personal communications, 2021-08, Vol.119 (4), p.3149-3159 |
issn | 0929-6212 1572-834X |
language | eng |
recordid | cdi_proquest_journals_2565483234 |
source | Springer Nature - Complete Springer Journals |
subjects | Algorithms Communications Engineering Computer Communication Networks Dynamic characteristics Engineering Networks Nodes Optimization Signal,Image and Speech Processing Trust Wireless networks Wireless sensor networks |
title | A Cognitive Energy Efficient and Trusted Routing Model for the Security of Wireless Sensor Networks: CEMT |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T21%3A50%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Cognitive%20Energy%20Efficient%20and%20Trusted%20Routing%20Model%20for%20the%20Security%20of%20Wireless%20Sensor%20Networks:%20CEMT&rft.jtitle=Wireless%20personal%20communications&rft.au=Feroz%20Khan,%20A.%20B.&rft.date=2021-08-01&rft.volume=119&rft.issue=4&rft.spage=3149&rft.epage=3159&rft.pages=3149-3159&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-021-08391-6&rft_dat=%3Cproquest_cross%3E2565483234%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2565483234&rft_id=info:pmid/&rfr_iscdi=true |