Abstract
In a variety of applications like military, healthcare, and industrial monitoring, Internet of Things (IoT) centered Wireless Sensor Networks (WSNs) are broadly utilized. The data is transmitted from the source Sensor Nodes (SNs) to the destination SNs. These are likely to be done in a secure way; also, in less time. In this paper, via proposing a Mutation grounded Multi-Layer Perceptron (MUMLP), energy and secure aware optimal routing are executed to provide secure data transmission along with reducing the transmission time. For Data Aggregation (DA), by proposing the Boltzmann Selection Probability-centric Gravitational Search Algorithm (BSP-GSA), the optimal Cluster Heads (CHs) are selected. These are done after node initialization in the network. After that, the non-cluster members are combined with an adjacent CH to form a cluster. The data are gathered by the CHs as of the non-cluster members; also, the gathered data, which are encrypted utilizing the Improved Elliptical Curve Cryptography (IECC) mechanism, are secured. Through the optimal route selected by a Deep Learning (DL) algorithm (MUMLP) with the consideration of a novel fitness function, the encrypted data is then dispatched to the Base Station (BS). For user access, the data in the BS is stored in a cloud server. The BlockChain (BC)-enabled authentication, which permits only the authorized user for data access, is executed to prevent unauthorized access. To evaluate the proposed approach’s efficiency, simulations are performed. The outcomes display that when analogized to the prevailing mechanisms, the presented algorithm performs data transmission in a secure as well as energy-aware manner.
Similar content being viewed by others
Data availability
Data sharing is not applicable to this article as no datasets were generated or analysed during the current study.
References
SobinC, C. (2020). A survey on architecture, protocols and challenges in IoT. Wireless Personal Communications, 112(4), 1383–1429.
Ray, P. P. (2016). A survey on internet of things architectures. Journal of King Saud University-Computer and Information Sciences, 30(3), 291–319.
Talal, M., ZaidanA, A., ZaidanB, B., AlbahriA, S., AlamoodiA, H., AlbahriO, S., AlsalemM, A., LimC, K., TanK, L., ShirW, L., & MohammedK, I. (2019). Smart home-based IoT for real-time and secure remote healthmonitoring of triage and priority system using body sensors multi-driven systematic review. Journal of Medical Systems, 4(3), 1–34.
Prasanth, A., & Jayachitra, S. (2020). A novel multi-objective optimization strategy for enhancing quality of service in IoT-enabled WSN applications. Peer-to-Peer Networking and Applications, 13(6), 1905–1920.
Mini Sharma, Aditya Tandon, Subhashini Narayan, and Bharat Bhushan, (2017) Classification and analysis of security attacks in WSNs and IEEE 802.15. 4 standards: A survey. In 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA)(Fall), IEEE, pp. 1–5,
Khan, T., Singh, K., Hasan, MohdHilmi, Ahmad, K., ReddyG, T., Mohan, S., & Ahmadian, A. (2021). ETERS a comprehensive energy aware trust-based efficient routingscheme for adversarial WSNs. Future Generation Computer Systems, 125, 921–943.
Carlos-Mancilla, M., Lopez-Mellado, E., & Siller, M. (2016). Wireless sensor networks formation approaches and techniques. Journal of Sensors. https://doi.org/10.1155/2016/2081902
Rajasoundaran, S., Kumar, S. S., Selvi, M., Ganapathy, S., Rakesh, R., & Kannan, A. (2021). Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks. Wireless Networks, 27(7), 4513–4534.
Kavitha, M., & Geetha, B. G. (2019). An efficient city energy management system with secure routing communication using WSN. Cluster Computing, 22, 13131–13142.
Khalaf, O. I., & Abdulsahib, G. M. (2021). Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks. Peer-to-Peer Networking and Applications, 14(5), 2858–2873.
Shende, D. K., & Sonavane, S. S. (2020). CrowWhale-ETR: CrowWhale optimization algorithm for energy and trust aware multicast routing in WSN for IoT applications. Wireless Networks, 26, 4011–4029.
Yousefpoor, M. S., Yousefpoor, E., Barati, H., Barati, A., Movaghar, A., & Hosseinzadeh, M. (2021). Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review. Journal of Network and Computer Applications, 190, 103118.
Abbasian Dehkordi, S., Farajzadeh, K., Rezazadeh, J., Farahbakhsh, R., Sandrasegaran, K., & Abbasian Dehkordi, M. (2020). A survey on data aggregation techniques in IoT sensor networks. Wireless Networks, 26(2), 1243–1263.
Silva, L. V., Barbosa, P., Marinho, R., & Brito, A. (2018). Security and privacy aware data aggregation on cloud computing. Journal of Internet Services and Applications, 9(1), 1–13.
Rachit, S. B., & Ragiri, P. R. (2021). Security trends in internet of things a survey. SN Applied Sciences, 3(1), 1–14.
Singh, P., Khari, M., & Vimal, S. (2022). EESSMT: An energy efficient hybrid scheme for securing mobile ad hoc networks using IoT. Wireless Personal Communications, 126(3), 2149–2173.
Pingale, R. P., & Shinde, S. N. (2021). Multi-objective sunflower based grey wolf optimization algorithm for multipath routing in IoT network. Wireless Personal Communications, 117(3), 1909–1930.
Dhumane, A. V., & Prasad, R. S. (2018). Fractional gravitational grey wolf optimization to multi-path data transmission in IoT. Wireless Personal Communications, 102(2), 411–436.
Qureshi, S. G., & Shandilya, S. K. (2022). Novel fuzzy based crow search optimization algorithm for secure node-to-node data transmission in WSN. Wireless Personal Communications, 127(1), 577–597.
Deebak, B. D., & Al-Turjman, F. (2020). A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Networks, 97, 102022.
Reegan, A. S., & Kabila, V. (2021). Highly secured cluster based wsn using novel FCM and enhanced ECC-ElGamal encryption in IoT. Wireless Personal Communications, 118(1), 1313–1329.
Jain, J. K. (2019). Secure and energy-efficient route adjustment model for internet of things. Wireless Personal Communications, 108, 633–657.
Bangotra, D. K., Singh, Y., Selwal, A., Kumar, N., & Singh, P. K. (2022). A trust based secure intelligent opportunistic routing protocol for wireless sensor networks. Wireless Personal Communications, 127(2), 1045–1066.
Cicioğlu, M., & Çalhan, A. (2021). Energy efficiency solutions for IEEE 802.15. 6 based wireless body sensor networks. Wireless Personal Communications, 119, 1499–1513. https://doi.org/10.1007/s11277-021-08292-8
Ramalingam, S., Dhanasekaran, S., Sinnasamy, S. S., Salau, A. O., & Alagarsamy, M. (2024). Performance enhancement of efficient clustering and routing protocol for wireless sensor networks using improved elephant herd optimization algorithm. Wireless Networks, 1–17. https://doi.org/10.1007/s11276-023-03617-w
Ravi, G., Das, M. S., & Karmakonda, K. (2023). Reliable cluster based data aggregation scheme for IoT network using hybrid deep learning techniques. Measurement: Sensors, 27, 100744.
Sharma, V., Beniwal, R., & Kumar, V. (2024). Multi-level trust-based secure and optimal IoT-WSN routing for environmental monitoring applications. In Journal of Supercomputing. Springer US. https://doi.org/10.1007/s11227-023-05875-z
Tay, M., & Senturk, A. (2022). A new energy-aware cluster head selection algorithm for wireless sensor networks. Wireless Personal Communications, 122(3), 2235–2251. https://doi.org/10.1007/s11277-021-08990-3
Bayrakdar, M. E. (2020). Energy-efficient technique for monitoring of agricultural areas with terrestrial wireless sensor networks. Journal of Circuits, Systems and Computers, 29(9), 1–17. https://doi.org/10.1142/S0218126620501418
Acknowledgements
We thank the anonymous referees for their useful suggestions.
Funding
This work has no funding resource.
Author information
Authors and Affiliations
Contributions
Primary author: VV has written the manuscript and Corresponding author: VKJ has reviewed and supervised the work.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Consent of publication
Not applicable.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Verma, V., Jha, V.K. Secure and Energy-Aware Data Transmission for IoT-WSNs with the Help of Cluster-Based Secure Optimal Routing. Wireless Pers Commun 134, 1665–1686 (2024). https://doi.org/10.1007/s11277-024-10983-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-024-10983-x