Skip to main content
Log in

GWO-SMSLO: Grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Wireless Sensor Networks (WSNs) is a distributed collection of sensor nodes which are employed to sense the natural phenomena from the environment which have been deployed. The sensed information is transmitted to the Base Station by using in network processing and collaborative processing. Due to the advancement of MEMS technology, WSN are applied in numerous applications including environment monitoring and military application for tracking and monitoring. However, the nodes of WSNs are deployed in harsh and unfriendly open environment and considering the resource constrained nature, providing efficient security with energy optimization is a major concern. To address the issues of energy optimization and security in this work Grey Wolf Optimization (GWO) has been employed to provide efficient clustering of the nodes and modified Sea Lion Optimization (SLO) has been employed to perform efficient routing. The security of the proposed scheme is ensured by Elliptic Curve Cryptography (ECC) by employing certificate less aggregate signature scheme with supporting conditional privacy. The simulation of the proposed protocol is carried out by using NS3 simulator with realistic simulation parameters. This simulation results shows that proposed protocol improves average energy consumption by 12%, packet delivery ratio by 8%, end to end delay by 15%, network lifetime by 15% and network throughput by 11% when it is compared with other existing protocols. Moreover, the proposed protocol improves security of the network by withstanding various malicious attacks in the network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availability

Data is available based on the request.

References

  1. Liu J, Zhao Z, Ji J, Hu M (2020) Research and application of wireless sensor network technology in power transmission and distribution system. Intell Converg Netw 1(2):199–220

    Article  Google Scholar 

  2. BenSaleh MS, Saida R, Kacem YH, Abid M (2020) Wireless sensor network design methodologies: A survey. J Sens 2020:1–13

    Article  Google Scholar 

  3. Babu N, Santhosh Kumar SVN (2022) Comprehensive analysis on sensor node fault management schemes in wireless sensor networks. Int J Commun Syst 35(18):e5342

  4. Kandris D, Nakas C, Vomvas D, Koulouras G (2020) Applications of wireless sensor networks: an up-to-date survey. Appl Syst Innov 3(1):14

    Article  Google Scholar 

  5. Sadeghi S, Soltanmohammadlou N, Nasirzadeh F (2022) Applications of wireless sensor networks to improve occupational safety and health in underground mines. J Safety Res

  6. Yao YD, Li X, Cui YP, Wang JJ, Wang C (2022) Energy-efficient routing protocol based on multi-threshold segmentation in wireless sensors networks for precision agriculture. IEEE Sens J 22(7):6216–6231

    Article  Google Scholar 

  7. Moussa N, Khemiri-Kallel S, El Belrhiti El Alaoui A (2022) Fog-assisted hierarchical data routing strategy for IoT-enabled WSN: Forest fire detection. Peer Peer Netw Appl 15(5):2307–2325

  8. Naghibi M, Barati H (2020) EGRPM: Energy efficient geographic routing protocol based on mobile sink in wireless sensor networks. Sustain Comput Inform Syst 25:100377

  9. Guleria K, Verma AK (2019) Comprehensive review for energy efficient hierarchical routing protocols on wireless sensor networks. Wireless Netw 25:1159–1183

  10. Wang J, Gao Y, Liu W, Sangaiah AK, Kim HJ (2019) Energy efficient routing algorithm with mobile sink support for wireless sensor networks. Sensors 19(7):1494

    Article  Google Scholar 

  11. El Alami H, Najid A (2019) ECH: An enhanced clustering hierarchy approach to maximize lifetime of wireless sensor networks. Ieee Access 7:107142–107153

    Article  Google Scholar 

  12. Lin D, Wang Q, Min W, Xu J, Zhang Z (2020) A survey on energy-efficient strategies in static wireless sensor networks. ACM Trans Sens Netw (TOSN) 17(1):1–48

    Google Scholar 

  13. C Nakas D Kandris G Visvardis 2020 Energy efficient routing in wireless sensor networks: A comprehensive survey Algorithms. 13(3):72

  14. Maivizhi R, Yogesh P (2022) Fuzzy routing for in-network aggregation in wireless sensor networks. Peer-to-Peer Netw Appl 15(1):592–611

    Article  Google Scholar 

  15. Zivkovic M, Bacanin N, Zivkovic T, Strumberger I, Tuba E, Tuba M (2020) Enhanced grey wolf algorithm for energy efficient wireless sensor networks. In 2020 zooming innovation in consumer technologies conference (ZINC) (pp. 87–92). IEEE

  16. Hao S, Hong Y, He Y (2022) An energy-efficient routing algorithm based on greedy strategy for energy harvesting wireless sensor networks. Sensors 22(4):1645

    Article  Google Scholar 

  17. Ramya R, Brindha T (2022) A comprehensive review on optimal cluster head selection in WSN-IOT. Adv Eng Softw 171:103170

  18. Logambigai R, Kannan A (2016) Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Netw 22:945–957

    Article  Google Scholar 

  19. Gao Q, Gadekallu TR (2022) Design of telemedicine information query system based on wireless sensor network. EAI Endorsed Trans Pervasive Health Technol 8(4)

  20. Liu X, Yu J, Yu K, Wang G, Feng X (2022) Trust secure data aggregation in WSN-based IIoT with single mobile sink. Ad Hoc Netw 136:102956

  21. Asaad MS, Croock MS (2021) Adaptive security approach for wireless sensor network using RSA algorithm. Indone J Electr Eng Comput Sci 22(1):361–368

  22. Sutrala AK, Das AK, Kumar N, Reddy AG, Vasilakos AV, Rodrigues JJ (2018) On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC. Int J Commun Syst 31(8):e3514

  23. Harn L, Hsu CF, Xia Z, He Z (2021) Lightweight aggregated data encryption for wireless sensor networks (WSNs). IEEE Sens Lett 5(4):1–4

    Article  Google Scholar 

  24. Bettoumi B, Bouallegue R (2018) Evaluation of authentication based elliptic curve cryptography in wireless sensor networks in IoT context. In 2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)(pp. 1–5). IEEE

  25. Yang Z, Li L, Gu F, Ling X, Hajiee M (2022) TADR-EAODV: A trust-aware dynamic routing algorithm based on extended AODV protocol for secure communications in wireless sensor networks. Internet of Things 20:100627

  26. Elsmany EFA, Omar MA, Wan TC, Altahir AA (2019) EESRA: Energy efficient scalable routing algorithm for wireless sensor networks. IEEE Access 7:96974–96983

    Article  Google Scholar 

  27. Lv Z, Qiao L, Nowak R (2022) Energy-efficient resource allocation of wireless energy transfer for the internet of everything in digital twins. IEEE Commun Mag 60(8):68–73

    Article  Google Scholar 

  28. Yang X, Wang X, Wang S, Puig V (2023) Switching-based adaptive fault-tolerant control for uncertain nonlinear systems against actuator and sensor faults. J Frank Inst 360(16):11462–11488

  29. Lata S, Mehfuz S, Urooj S, Alrowais F (2020) Fuzzy clustering algorithm for enhancing reliability and network lifetime of wireless sensor networks. IEEE Access 8:66013–66024

    Article  Google Scholar 

  30. Dwivedi AK, Sharma AK (2021) EE-LEACH: energy enhancement in LEACH using fuzzy logic for homogeneous WSN. Wireless Pers Commun 120(4):3035–3055

    Article  Google Scholar 

  31. Liu G (2023) A Q-Learning-based distributed routing protocol for frequency-switchable magnetic induction-based wireless underground sensor networks. Futur Gener Comput Syst 139:253–266

    Article  Google Scholar 

  32. Mehra PS, Doja MN, Alam B (2020) Fuzzy based enhanced cluster head selection (FBECS) for WSN. Journal of King Saud University-Science 32(1):390–401

    Article  Google Scholar 

  33. Benmahdi MB, Lehsaini M (2021) Greedy forwarding routing schemes using an improved K-means approach for wireless sensor networks. Wireless Pers Commun 119:1619–1642

    Article  Google Scholar 

  34. Santhosh Kumar SVN, Palanichamy Y, Selvi M, Ganapathy S, Kannan A, Perumal SP (2021) Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks. Wireless Netw 27:3873–3894

    Article  Google Scholar 

  35. Selvi M, Santhosh Kumar SVN, Ganapathy S, Ayyanar A, Khanna Nehemiah H, Kannan A (2021) An energy efficient clustered gravitational and fuzzy based routing algorithm in WSNs. Wireless Pers Commun 116:61–90

    Article  Google Scholar 

  36. Sekaran K, Rajakumar R, Dinesh K, Rajkumar Y, Latchoumi TP, Kadry S, Lim S (2020) An energy-efficient cluster head selection in wireless sensor network using grey wolf optimization algorithm. TELKOMNIKA (Telecommunication Computing Electronics and Control) 18(6):2822–2833

    Article  Google Scholar 

  37. Subramani S, Selvi M, Kumar SS, Kannan A (2021) Energy Efficient Clustering Routing Protocol and ACO Algorithm in WSN. InAdvances in Computing and Data Sciences: 5th International Conference, ICACDS 2021, Nashik, India, April 23–24, 2021, Revised Selected Papers, Part I 5(pp. 68–80). Springer International Publishing

  38. Yadav RK, Mahapatra RP (2021) Energy aware optimized clustering for hierarchical routing in wireless sensor network. Comput Sci Rev 41:100417

  39. Osamy W, El-Sawy AA, Salim A (2020) CSOCA: Chicken swarm optimization based clustering algorithm for wireless sensor networks. IEEE Access 8:60676–60688

  40. Mishra R, Yadav RK (2023) Energy Efficient Cluster-Based Routing Protocol for WSN Using Nature Inspired Algorithm. Wireless Pers Commun 130(4):2407–2440

    Article  Google Scholar 

  41. Chaurasia S, Kumar K, Kumar N (2023) Mocraw: A meta-heuristic optimized cluster head selection based routing algorithm for wsns. Ad Hoc Netw 141:103079

  42. Cao B, Zhao J, Gu Y, Fan S, Yang P (2019) Security-aware industrial wireless sensor network deployment optimization. IEEE Trans Industr Inf 16(8):5309–5316

    Article  Google Scholar 

  43. Qureshi SG, Shandilya SK (2021) Novel fuzzy based crow search optimization algorithm for secure node-to-node data transmission in WSN. Wirel Pers Commun 1–21

  44. Vinitha A, Rukmini MSS (2022) Secure and energy aware multi-hop routing protocol in WSN using Taylor-based hybrid optimization algorithm. J King Saud Univ Comput Inf Sci 34(5):1857–1868

    Google Scholar 

  45. Li B, Zhou X, Ning Z, Guan X, Yiu KFC (2022) Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach. Inf Sci 612:384–398

    Article  Google Scholar 

  46. Zhang H, Mi Y, Fu Y, Liu X, Zhang Y, Wang J, Tan J (2023) Security defense decision method based on potential differential game for complex networks. Comput Secur 129:103187

  47. Kumar V, Ray S (2022) Pairing-free identity-based digital signature algorithm for broadcast authentication based on modified ECC using battle royal optimization algorithm. Wirel Pers Commun 1–25

  48. Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13(3):361–396, 2000

  49. Poonguzhali PK, Ananthamoorthy NP (2020) Improved energy efficient WSN using ACO based HSA for optimal cluster head selection. Peer Peer Netw Appl 13:1102–1108

    Article  Google Scholar 

  50. Selvi M, Thangaramya K, Ganapathy S, Kulothungan K, Khannah Nehemiah H, Kannan A (2019) An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Pers Commun 105:1475–1490

    Article  Google Scholar 

  51. Haseeb K, Almustafa KM, Jan Z, Saba T, Tariq U (2020) Secure and energy-aware heuristic routing protocol for wireless sensor network. IEEE Access 8:163962–163974

    Article  Google Scholar 

Download references

Funding

None.

Author information

Authors and Affiliations

Authors

Contributions

All the authors have contributed in equal manner.

Corresponding author

Correspondence to Santhosh Kumar SVN.

Ethics declarations

Ethics approval

Authors provide the ethics approval for the given manuscript.

Consent to publish

All the authors gave permission to consent to publish.

Conflict of interest

There is no conflict of interest among the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dinesh, K., SVN, S.K. GWO-SMSLO: Grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networks. Peer-to-Peer Netw. Appl. 17, 585–611 (2024). https://doi.org/10.1007/s12083-023-01603-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-023-01603-9

Keywords

Navigation