Skip to main content
Log in

Secure and Energy-Aware Data Transmission for IoT-WSNs with the Help of Cluster-Based Secure Optimal Routing

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In a variety of applications like military, healthcare, and industrial monitoring, Internet of Things (IoT) centered Wireless Sensor Networks (WSNs) are broadly utilized. The data is transmitted from the source Sensor Nodes (SNs) to the destination SNs. These are likely to be done in a secure way; also, in less time. In this paper, via proposing a Mutation grounded Multi-Layer Perceptron (MUMLP), energy and secure aware optimal routing are executed to provide secure data transmission along with reducing the transmission time. For Data Aggregation (DA), by proposing the Boltzmann Selection Probability-centric Gravitational Search Algorithm (BSP-GSA), the optimal Cluster Heads (CHs) are selected. These are done after node initialization in the network. After that, the non-cluster members are combined with an adjacent CH to form a cluster. The data are gathered by the CHs as of the non-cluster members; also, the gathered data, which are encrypted utilizing the Improved Elliptical Curve Cryptography (IECC) mechanism, are secured. Through the optimal route selected by a Deep Learning (DL) algorithm (MUMLP) with the consideration of a novel fitness function, the encrypted data is then dispatched to the Base Station (BS). For user access, the data in the BS is stored in a cloud server. The BlockChain (BC)-enabled authentication, which permits only the authorized user for data access, is executed to prevent unauthorized access. To evaluate the proposed approach’s efficiency, simulations are performed. The outcomes display that when analogized to the prevailing mechanisms, the presented algorithm performs data transmission in a secure as well as energy-aware manner.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no datasets were generated or analysed during the current study.

References

  1. SobinC, C. (2020). A survey on architecture, protocols and challenges in IoT. Wireless Personal Communications, 112(4), 1383–1429.

    Article  Google Scholar 

  2. Ray, P. P. (2016). A survey on internet of things architectures. Journal of King Saud University-Computer and Information Sciences, 30(3), 291–319.

    Article  Google Scholar 

  3. Talal, M., ZaidanA, A., ZaidanB, B., AlbahriA, S., AlamoodiA, H., AlbahriO, S., AlsalemM, A., LimC, K., TanK, L., ShirW, L., & MohammedK, I. (2019). Smart home-based IoT for real-time and secure remote healthmonitoring of triage and priority system using body sensors multi-driven systematic review. Journal of Medical Systems, 4(3), 1–34.

    Google Scholar 

  4. Prasanth, A., & Jayachitra, S. (2020). A novel multi-objective optimization strategy for enhancing quality of service in IoT-enabled WSN applications. Peer-to-Peer Networking and Applications, 13(6), 1905–1920.

    Article  Google Scholar 

  5. Mini Sharma, Aditya Tandon, Subhashini Narayan, and Bharat Bhushan, (2017) Classification and analysis of security attacks in WSNs and IEEE 802.15. 4 standards: A survey. In 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA)(Fall), IEEE, pp. 1–5,

  6. Khan, T., Singh, K., Hasan, MohdHilmi, Ahmad, K., ReddyG, T., Mohan, S., & Ahmadian, A. (2021). ETERS a comprehensive energy aware trust-based efficient routingscheme for adversarial WSNs. Future Generation Computer Systems, 125, 921–943.

    Article  Google Scholar 

  7. Carlos-Mancilla, M., Lopez-Mellado, E., & Siller, M. (2016). Wireless sensor networks formation approaches and techniques. Journal of Sensors. https://doi.org/10.1155/2016/2081902

    Article  Google Scholar 

  8. Rajasoundaran, S., Kumar, S. S., Selvi, M., Ganapathy, S., Rakesh, R., & Kannan, A. (2021). Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks. Wireless Networks, 27(7), 4513–4534.

    Article  Google Scholar 

  9. Kavitha, M., & Geetha, B. G. (2019). An efficient city energy management system with secure routing communication using WSN. Cluster Computing, 22, 13131–13142.

    Article  Google Scholar 

  10. Khalaf, O. I., & Abdulsahib, G. M. (2021). Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks. Peer-to-Peer Networking and Applications, 14(5), 2858–2873.

    Article  Google Scholar 

  11. Shende, D. K., & Sonavane, S. S. (2020). CrowWhale-ETR: CrowWhale optimization algorithm for energy and trust aware multicast routing in WSN for IoT applications. Wireless Networks, 26, 4011–4029.

    Article  Google Scholar 

  12. Yousefpoor, M. S., Yousefpoor, E., Barati, H., Barati, A., Movaghar, A., & Hosseinzadeh, M. (2021). Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review. Journal of Network and Computer Applications, 190, 103118.

    Article  Google Scholar 

  13. Abbasian Dehkordi, S., Farajzadeh, K., Rezazadeh, J., Farahbakhsh, R., Sandrasegaran, K., & Abbasian Dehkordi, M. (2020). A survey on data aggregation techniques in IoT sensor networks. Wireless Networks, 26(2), 1243–1263.

    Article  Google Scholar 

  14. Silva, L. V., Barbosa, P., Marinho, R., & Brito, A. (2018). Security and privacy aware data aggregation on cloud computing. Journal of Internet Services and Applications, 9(1), 1–13.

    Article  Google Scholar 

  15. Rachit, S. B., & Ragiri, P. R. (2021). Security trends in internet of things a survey. SN Applied Sciences, 3(1), 1–14.

    Article  Google Scholar 

  16. Singh, P., Khari, M., & Vimal, S. (2022). EESSMT: An energy efficient hybrid scheme for securing mobile ad hoc networks using IoT. Wireless Personal Communications, 126(3), 2149–2173.

    Article  Google Scholar 

  17. Pingale, R. P., & Shinde, S. N. (2021). Multi-objective sunflower based grey wolf optimization algorithm for multipath routing in IoT network. Wireless Personal Communications, 117(3), 1909–1930.

    Article  Google Scholar 

  18. Dhumane, A. V., & Prasad, R. S. (2018). Fractional gravitational grey wolf optimization to multi-path data transmission in IoT. Wireless Personal Communications, 102(2), 411–436.

    Article  Google Scholar 

  19. Qureshi, S. G., & Shandilya, S. K. (2022). Novel fuzzy based crow search optimization algorithm for secure node-to-node data transmission in WSN. Wireless Personal Communications, 127(1), 577–597.

    Article  Google Scholar 

  20. Deebak, B. D., & Al-Turjman, F. (2020). A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Networks, 97, 102022.

    Article  Google Scholar 

  21. Reegan, A. S., & Kabila, V. (2021). Highly secured cluster based wsn using novel FCM and enhanced ECC-ElGamal encryption in IoT. Wireless Personal Communications, 118(1), 1313–1329.

    Article  Google Scholar 

  22. Jain, J. K. (2019). Secure and energy-efficient route adjustment model for internet of things. Wireless Personal Communications, 108, 633–657.

    Article  Google Scholar 

  23. Bangotra, D. K., Singh, Y., Selwal, A., Kumar, N., & Singh, P. K. (2022). A trust based secure intelligent opportunistic routing protocol for wireless sensor networks. Wireless Personal Communications, 127(2), 1045–1066.

    Article  Google Scholar 

  24. Cicioğlu, M., & Çalhan, A. (2021). Energy efficiency solutions for IEEE 802.15. 6 based wireless body sensor networks. Wireless Personal Communications, 119, 1499–1513. https://doi.org/10.1007/s11277-021-08292-8

    Article  Google Scholar 

  25. Ramalingam, S., Dhanasekaran, S., Sinnasamy, S. S., Salau, A. O., & Alagarsamy, M. (2024). Performance enhancement of efficient clustering and routing protocol for wireless sensor networks using improved elephant herd optimization algorithm. Wireless Networks, 1–17. https://doi.org/10.1007/s11276-023-03617-w

  26. Ravi, G., Das, M. S., & Karmakonda, K. (2023). Reliable cluster based data aggregation scheme for IoT network using hybrid deep learning techniques. Measurement: Sensors, 27, 100744.

    Google Scholar 

  27. Sharma, V., Beniwal, R., & Kumar, V. (2024). Multi-level trust-based secure and optimal IoT-WSN routing for environmental monitoring applications. In Journal of Supercomputing. Springer US. https://doi.org/10.1007/s11227-023-05875-z

  28. Tay, M., & Senturk, A. (2022). A new energy-aware cluster head selection algorithm for wireless sensor networks. Wireless Personal Communications, 122(3), 2235–2251. https://doi.org/10.1007/s11277-021-08990-3

    Article  Google Scholar 

  29. Bayrakdar, M. E. (2020). Energy-efficient technique for monitoring of agricultural areas with terrestrial wireless sensor networks. Journal of Circuits, Systems and Computers, 29(9), 1–17. https://doi.org/10.1142/S0218126620501418

    Article  Google Scholar 

Download references

Acknowledgements

We thank the anonymous referees for their useful suggestions.

Funding

This work has no funding resource.

Author information

Authors and Affiliations

Authors

Contributions

Primary author: VV has written the manuscript and Corresponding author: VKJ has reviewed and supervised the work.

Corresponding author

Correspondence to Vanita Verma.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Consent of publication

Not applicable.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Verma, V., Jha, V.K. Secure and Energy-Aware Data Transmission for IoT-WSNs with the Help of Cluster-Based Secure Optimal Routing. Wireless Pers Commun 134, 1665–1686 (2024). https://doi.org/10.1007/s11277-024-10983-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-024-10983-x

Keywords

Navigation