Trust aware clustering based secure routing techniques in wireless sensor network

Wireless Sensor Networks are becoming increasingly popular in everyday life since they offer a variety of network structures for developing cutting-edge real-time applications. Wireless sensor devices have high energy consumption limitations, so it is necessary to handle excessive energy consumption...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of intelligent & fuzzy systems 2023-05, Vol.44 (5), p.8785-8800
Hauptverfasser: Hemanand, D., Sridhar, P., Priya, C., Sathish Kumar, P.J.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 8800
container_issue 5
container_start_page 8785
container_title Journal of intelligent & fuzzy systems
container_volume 44
creator Hemanand, D.
Sridhar, P.
Priya, C.
Sathish Kumar, P.J.
description Wireless Sensor Networks are becoming increasingly popular in everyday life since they offer a variety of network structures for developing cutting-edge real-time applications. Wireless sensor devices have high energy consumption limitations, so it is necessary to handle excessive energy consumption by malicious nodes properly to improve network performance. Even though numerous studies have been conducted to increase the dependability of routing in WSNs, the existing routing strategies do not meet the required security constraints by using intelligent methods to protect the sensor nodes from malicious attack. To overcome this challenge a novel Trust Aware Clustering based Secure Routing Techniques (TAC-SRT) has been proposed to minimize the overall energy consumption, improved security to nodes and to maximize the network lifetime. The proposed method is carried out in three phases. In the first phase, the cluster head is selected by using K mean clustering. In the second phase, the trust value of each node is evaluated by using Mamdani fuzzy inference rule. In the third phase, the Tversky similarity index is used to find the normal or malicious node and establishes the shortest route. The Fully Homomorphic Elliptic Curve Cryptography technique is then used to perform secure data transmission. The effectiveness of the proposed strategy is examined using several parameters, such as the lifetime of the network, data confidentiality, active nodes, and energy consumption. The proposed technique improves the network lifetime by 23.01%, 17.4%, and 13.2% better than MOSFA, SecDL, and CAR-MOSOA respectively. Finally, the proposed method demonstrated superior performance in terms of delay, throughput, encryption time, network lifetime, and packet delivery ratio compared with existing techniques.
doi_str_mv 10.3233/JIFS-223197
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2809666989</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2809666989</sourcerecordid><originalsourceid>FETCH-LOGICAL-c219t-ec74362705bd00cb413ea3b44ece2d0378c04007c20ef4619d4a5ada1238e9e33</originalsourceid><addsrcrecordid>eNotkE1Lw0AQhhdRsFZP_oEFjxKd_chu9ijF1kpBxHpeNpupptakziYU_70J9TQvLw8zw8PYtYA7JZW6f17O3zIplXD2hE1EYfOscMaeDhmMzoTU5pxdpLQFEDaXMGGva-pTx8MhEPK4GzJS3XzwMiSseMLYDz21fTeWHcbPpv7pMfG64YeacIcpDVSTWuINdoeWvi7Z2SbsEl79zyl7nz-uZ0_Z6mWxnD2ssiiF6zKMVisjLeRlBRBLLRQGVWqNEWUFyhYRNICNEnCjjXCVDnmogpCqQIdKTdnNce-e2vGlzm_bnprhpJcFOGOMK9xA3R6pSG1KhBu_p_o70K8X4EdnfnTmj87UH9pOX44</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2809666989</pqid></control><display><type>article</type><title>Trust aware clustering based secure routing techniques in wireless sensor network</title><source>Business Source Complete</source><creator>Hemanand, D. ; Sridhar, P. ; Priya, C. ; Sathish Kumar, P.J.</creator><creatorcontrib>Hemanand, D. ; Sridhar, P. ; Priya, C. ; Sathish Kumar, P.J.</creatorcontrib><description>Wireless Sensor Networks are becoming increasingly popular in everyday life since they offer a variety of network structures for developing cutting-edge real-time applications. Wireless sensor devices have high energy consumption limitations, so it is necessary to handle excessive energy consumption by malicious nodes properly to improve network performance. Even though numerous studies have been conducted to increase the dependability of routing in WSNs, the existing routing strategies do not meet the required security constraints by using intelligent methods to protect the sensor nodes from malicious attack. To overcome this challenge a novel Trust Aware Clustering based Secure Routing Techniques (TAC-SRT) has been proposed to minimize the overall energy consumption, improved security to nodes and to maximize the network lifetime. The proposed method is carried out in three phases. In the first phase, the cluster head is selected by using K mean clustering. In the second phase, the trust value of each node is evaluated by using Mamdani fuzzy inference rule. In the third phase, the Tversky similarity index is used to find the normal or malicious node and establishes the shortest route. The Fully Homomorphic Elliptic Curve Cryptography technique is then used to perform secure data transmission. The effectiveness of the proposed strategy is examined using several parameters, such as the lifetime of the network, data confidentiality, active nodes, and energy consumption. The proposed technique improves the network lifetime by 23.01%, 17.4%, and 13.2% better than MOSFA, SecDL, and CAR-MOSOA respectively. Finally, the proposed method demonstrated superior performance in terms of delay, throughput, encryption time, network lifetime, and packet delivery ratio compared with existing techniques.</description><identifier>ISSN: 1064-1246</identifier><identifier>EISSN: 1875-8967</identifier><identifier>DOI: 10.3233/JIFS-223197</identifier><language>eng</language><publisher>Amsterdam: IOS Press BV</publisher><subject>Clustering ; Cryptography ; Curves ; Data transmission ; Energy consumption ; Nodes ; Sensors ; Wireless sensor networks</subject><ispartof>Journal of intelligent &amp; fuzzy systems, 2023-05, Vol.44 (5), p.8785-8800</ispartof><rights>Copyright IOS Press BV 2023</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c219t-ec74362705bd00cb413ea3b44ece2d0378c04007c20ef4619d4a5ada1238e9e33</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Hemanand, D.</creatorcontrib><creatorcontrib>Sridhar, P.</creatorcontrib><creatorcontrib>Priya, C.</creatorcontrib><creatorcontrib>Sathish Kumar, P.J.</creatorcontrib><title>Trust aware clustering based secure routing techniques in wireless sensor network</title><title>Journal of intelligent &amp; fuzzy systems</title><description>Wireless Sensor Networks are becoming increasingly popular in everyday life since they offer a variety of network structures for developing cutting-edge real-time applications. Wireless sensor devices have high energy consumption limitations, so it is necessary to handle excessive energy consumption by malicious nodes properly to improve network performance. Even though numerous studies have been conducted to increase the dependability of routing in WSNs, the existing routing strategies do not meet the required security constraints by using intelligent methods to protect the sensor nodes from malicious attack. To overcome this challenge a novel Trust Aware Clustering based Secure Routing Techniques (TAC-SRT) has been proposed to minimize the overall energy consumption, improved security to nodes and to maximize the network lifetime. The proposed method is carried out in three phases. In the first phase, the cluster head is selected by using K mean clustering. In the second phase, the trust value of each node is evaluated by using Mamdani fuzzy inference rule. In the third phase, the Tversky similarity index is used to find the normal or malicious node and establishes the shortest route. The Fully Homomorphic Elliptic Curve Cryptography technique is then used to perform secure data transmission. The effectiveness of the proposed strategy is examined using several parameters, such as the lifetime of the network, data confidentiality, active nodes, and energy consumption. The proposed technique improves the network lifetime by 23.01%, 17.4%, and 13.2% better than MOSFA, SecDL, and CAR-MOSOA respectively. Finally, the proposed method demonstrated superior performance in terms of delay, throughput, encryption time, network lifetime, and packet delivery ratio compared with existing techniques.</description><subject>Clustering</subject><subject>Cryptography</subject><subject>Curves</subject><subject>Data transmission</subject><subject>Energy consumption</subject><subject>Nodes</subject><subject>Sensors</subject><subject>Wireless sensor networks</subject><issn>1064-1246</issn><issn>1875-8967</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNotkE1Lw0AQhhdRsFZP_oEFjxKd_chu9ijF1kpBxHpeNpupptakziYU_70J9TQvLw8zw8PYtYA7JZW6f17O3zIplXD2hE1EYfOscMaeDhmMzoTU5pxdpLQFEDaXMGGva-pTx8MhEPK4GzJS3XzwMiSseMLYDz21fTeWHcbPpv7pMfG64YeacIcpDVSTWuINdoeWvi7Z2SbsEl79zyl7nz-uZ0_Z6mWxnD2ssiiF6zKMVisjLeRlBRBLLRQGVWqNEWUFyhYRNICNEnCjjXCVDnmogpCqQIdKTdnNce-e2vGlzm_bnprhpJcFOGOMK9xA3R6pSG1KhBu_p_o70K8X4EdnfnTmj87UH9pOX44</recordid><startdate>20230504</startdate><enddate>20230504</enddate><creator>Hemanand, D.</creator><creator>Sridhar, P.</creator><creator>Priya, C.</creator><creator>Sathish Kumar, P.J.</creator><general>IOS Press BV</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20230504</creationdate><title>Trust aware clustering based secure routing techniques in wireless sensor network</title><author>Hemanand, D. ; Sridhar, P. ; Priya, C. ; Sathish Kumar, P.J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c219t-ec74362705bd00cb413ea3b44ece2d0378c04007c20ef4619d4a5ada1238e9e33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Clustering</topic><topic>Cryptography</topic><topic>Curves</topic><topic>Data transmission</topic><topic>Energy consumption</topic><topic>Nodes</topic><topic>Sensors</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hemanand, D.</creatorcontrib><creatorcontrib>Sridhar, P.</creatorcontrib><creatorcontrib>Priya, C.</creatorcontrib><creatorcontrib>Sathish Kumar, P.J.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Journal of intelligent &amp; fuzzy systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hemanand, D.</au><au>Sridhar, P.</au><au>Priya, C.</au><au>Sathish Kumar, P.J.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Trust aware clustering based secure routing techniques in wireless sensor network</atitle><jtitle>Journal of intelligent &amp; fuzzy systems</jtitle><date>2023-05-04</date><risdate>2023</risdate><volume>44</volume><issue>5</issue><spage>8785</spage><epage>8800</epage><pages>8785-8800</pages><issn>1064-1246</issn><eissn>1875-8967</eissn><abstract>Wireless Sensor Networks are becoming increasingly popular in everyday life since they offer a variety of network structures for developing cutting-edge real-time applications. Wireless sensor devices have high energy consumption limitations, so it is necessary to handle excessive energy consumption by malicious nodes properly to improve network performance. Even though numerous studies have been conducted to increase the dependability of routing in WSNs, the existing routing strategies do not meet the required security constraints by using intelligent methods to protect the sensor nodes from malicious attack. To overcome this challenge a novel Trust Aware Clustering based Secure Routing Techniques (TAC-SRT) has been proposed to minimize the overall energy consumption, improved security to nodes and to maximize the network lifetime. The proposed method is carried out in three phases. In the first phase, the cluster head is selected by using K mean clustering. In the second phase, the trust value of each node is evaluated by using Mamdani fuzzy inference rule. In the third phase, the Tversky similarity index is used to find the normal or malicious node and establishes the shortest route. The Fully Homomorphic Elliptic Curve Cryptography technique is then used to perform secure data transmission. The effectiveness of the proposed strategy is examined using several parameters, such as the lifetime of the network, data confidentiality, active nodes, and energy consumption. The proposed technique improves the network lifetime by 23.01%, 17.4%, and 13.2% better than MOSFA, SecDL, and CAR-MOSOA respectively. Finally, the proposed method demonstrated superior performance in terms of delay, throughput, encryption time, network lifetime, and packet delivery ratio compared with existing techniques.</abstract><cop>Amsterdam</cop><pub>IOS Press BV</pub><doi>10.3233/JIFS-223197</doi><tpages>16</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1064-1246
ispartof Journal of intelligent & fuzzy systems, 2023-05, Vol.44 (5), p.8785-8800
issn 1064-1246
1875-8967
language eng
recordid cdi_proquest_journals_2809666989
source Business Source Complete
subjects Clustering
Cryptography
Curves
Data transmission
Energy consumption
Nodes
Sensors
Wireless sensor networks
title Trust aware clustering based secure routing techniques in wireless sensor network
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T16%3A19%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Trust%20aware%20clustering%20based%20secure%20routing%20techniques%20in%20wireless%20sensor%20network&rft.jtitle=Journal%20of%20intelligent%20&%20fuzzy%20systems&rft.au=Hemanand,%20D.&rft.date=2023-05-04&rft.volume=44&rft.issue=5&rft.spage=8785&rft.epage=8800&rft.pages=8785-8800&rft.issn=1064-1246&rft.eissn=1875-8967&rft_id=info:doi/10.3233/JIFS-223197&rft_dat=%3Cproquest_cross%3E2809666989%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2809666989&rft_id=info:pmid/&rfr_iscdi=true