Energy, Reliability, and Trust-Based Security Framework for Clustering-Based Routing Model in WSN

被引:0
|
作者
Biradar, Mallanagouda [1 ]
Mathapathi, Basavaraj [2 ]
机构
[1] Sharnbasva Univ, Dept Comp Sci & Amp Engn, Kalaburagi, India
[2] Sharnbasva Univ, Kalaburagi, India
关键词
Cluster Head; Path quality; Security; Trust; WSN clustering; WIRELESS SENSOR NETWORK; HEAD SELECTION; PROTOCOL; STRATEGY; SCHEME;
D O I
10.4018/IJISP.315817
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Currently, analysts in a variety of countries have developed various protocols for WSN clustering. Among them, the significant one is LEACH (low-energy adaptive cluster hierarchical) that accomplishes the objective of energy balancing by occasionally varying the CHs in the region. Nevertheless, since it implements a random number method, the appropriateness of the CH is full of suspicions. As a result, this work intends to discover the optimal cluster head selection (CHS) model for maximizing energy aware and secured routing in WSN. Here, optimal CH is chosen based upon constraints such as "trust evaluation (direct and indirect trust), distance, security (risk level evaluation), distance, energy and delay". In addition, the routing model considers the path quality determination of cluster (reliability). For choosing the best CH in WSN, slime wrap food update with cat and mouse optimization (SWFU-CMO) is deployed. Finally, the simulated outcomes verify the efficacy of presented approach related to residual energy, throughput, delay, etc.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] A Trust-Based Framework for Increasing MAC Layer Reliability in Cognitive Radio VANETs
    Salman Goli-Bidgoli
    Naser Movahhedinia
    Wireless Personal Communications, 2017, 95 : 2873 - 2893
  • [42] A TRUST-BASED SECURITY ARCHITECTURE FOR TACTICAL MANETS
    Lacharite, Yannick
    Nguyen, Dang Quan
    Wang, Maoyu
    Lamont, Louise
    2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 1227 - 1233
  • [43] A clustering-based selective probing framework to support Internet Quality of Service routing
    Jariyakul, N
    Znati, T
    DISTRIBUTED COMPUTING - IWDC 2005, PROCEEDINGS, 2005, 3741 : 368 - 379
  • [44] Trust-based Security for the Spanning Tree Protocol
    Lai, Yingxu
    Liu, Zenghui
    Pan, Qiuyue
    Chen, Yinong
    Zhou, Zhizheng
    PROCEEDINGS OF 2014 IEEE INTERNATIONAL PARALLEL & DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2014, : 1339 - 1344
  • [45] Trust-based security in pervasive computing environments
    Kagal, L
    Finin, T
    Joshi, A
    COMPUTER, 2001, 34 (12) : 154 - 157
  • [46] Multidimensional Trust-based Energy Aware Routing Protocols in Multihop Wireless Networks
    Shet, Jyoti
    Shetty, Deepa
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, INSTRUMENTATION AND CONTROL TECHNOLOGIES (ICICICT), 2017, : 1520 - 1523
  • [47] Trust-based security model and enforcement mechanism for Web service technology
    Yang, SK
    Lam, H
    Su, SYW
    TECHNOLOGIES FOR E-SERVICES, PROCEEDINGS, 2002, 2444 : 151 - 160
  • [48] Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks
    RahimiZadeh, Keyvan
    Kabiri, Peyman
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1746 - 1763
  • [49] Power Trust: Energy Auditing Aware Trust-Based System to Detect Security Attacks in IoT
    Subhash, P.
    Chandra, Gollapudi Ramesh
    Surya, K. Samrat
    2021 SIXTH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2021, : 265 - 269
  • [50] A trust-based geographical routing scheme in sensor networks
    Hung, Ka-Shun
    Lui, King-Shan
    Kwok, Yu-Kwong
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 3125 - 3129