Skip to main content
Log in

An energy efficient Swan Intelligent based Clustering Technique (SICT) with fuzzy based secure routing protocol in IoT

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) is the collection of physical objects which consists of integrated technologies to sense, interact and collaborate with other smart objects to collect the data from the deployed environment and send it to the base station. Data dissemination is a network management service which is provided to devices of IoT, by the base station to monitor and manage the device related configuration parameter in the network. In data dissemination, it is very much essential to identify the legitimate nodes which are required for reprogramming and reconfiguring for device configuration during data transmission in order to ensure the security and reliability of the network. Since a greater number of devices are being reprogrammed to exchange data and commands autonomously in IoT, providing security to the disseminated configuration parameters is very essential. Therefore, efficient security authentication mechanism is required to prevent the various types of attacks which occurs during data dissemination. In this paper, an energy efficient Swan Intelligent based Clustering Technique (SICT) has been proposed to provide efficient clustering of nodes in the network. Moreover, trust based secured lightweight authentication protocol is proposed to provide better authentication and secure data dissemination to the devices of IoT. Additionally, the proposed protocol employs fuzzy logic to discover optimal route by selecting only trusted nodes during routing process. The advantages of the proposed system are it improves the security during data dissemination and optimizes the energy by identifying the relevant devices which are required for configuration parameters during data dissemination. The proposed system is implemented in NS3 simulation with realistic simulation parameters namely energy efficiency, network lifetime, throughput, computational cost, communication cost, average signing time, average verification time, packet delivery ratio and network delay. The simulation results justifies that the proposed protocol improves average energy consumption by 34%, computational cost by 41.85%, communication cost by 36.83%, network delay by 31.66%, signing time by 26.25% and verification time by 33.46%. Moreover, the proposed system improves packet delivery ratio by 30% and provides efficient authentication to mitigate various types of attacks during data dissemination when it is compared with other existing protocols in IoT environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Fig. 2
Algorithm 5
Algorithm 6
Algorithm 7
Algorithm 8
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data availability

Data is available based on the request.

References

  1. Santhosh Kumar S, Palanichamy Y (2017) Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wireless Netw 24(4):1343–1360

    Article  Google Scholar 

  2. Shanmugapriya R, Santhosh Kumar SVN (2022) Comprehensive survey on data dissemination protocols for efficient reprogramming in Internet of Things. Concurrency and computation: practice and experience 34(26):e7280

  3. Santhosh Kumar S, Palanichamy Y, Selvi M, Ganapathy S, Kannan A, Perumal S (2021) Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks. Wireless Netw 27(6):3873–3894

    Article  Google Scholar 

  4. Thangaramya K, Kulothungan K, Logambigai R, Selvi M, Ganapathy S (2019) Energy aware cluster and neuro-fuzzy based directing route algorithm for wireless sensor networks in IoT. J Comput Netw 151:211–223

    Article  Google Scholar 

  5. Selvi M, Thangaramya K, Ganapathy S, Kulothungan K, Nehemiah HK, Kannan A (2019) An energy aware trust based secure directing route algorithm for effective communication in wireless sensor networks. Wirel Pers Commun 105(4):1475–1490

    Article  Google Scholar 

  6. Chandna M, Singla B (2019) An energy-efficient gossiping protocol for wireless sensor networks using Chebyshev interval. Procedia Comput Sci 151:1066–1071. https://doi.org/10.1016/j.procs.2019.04.151

    Article  Google Scholar 

  7. Haseeb K, Bakar KA, Abdullah AH, Darwish T (2017) Adaptive energy aware cluster-based directing route protocol for wireless sensor networks. Wireless Netw 23(3):1953–1966

    Article  Google Scholar 

  8. Mazumdar N, Roy S, Nag A, Nandi S (2021) An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network. J Netw Comput Appl 186:103097

    Article  Google Scholar 

  9. Seyfollahi A, Ghaffari A (2020) Reliable data dissemination for the Internet of Things using Harris hawks optimization. Peer Peer Netw Appl 13(6):1886–1902

    Article  Google Scholar 

  10. Yarinezhad R (2019) Reducing delay and prolonging the assume that time of wireless sensor network using efficient directing route protocol based on mobile sink and virtual infrastructure. Ad Hoc Netw 84:42–55. https://doi.org/10.1016/j.adhoc.2018.09.016

    Article  Google Scholar 

  11. Chowdhury S, Giri C (2019) EETC: energy efficient tree-clustering in delay constrained wireless sensor network. Wireless Pers Commun 109(1):189–210. https://doi.org/10.1007/s11277-019-06559-9

    Article  Google Scholar 

  12. Muthurajkumar S, Ganapathy S, Vijayalakshmi M, Kannan A (2017) An intelligent secured and energy efficient directing route algorithm for MANETs. Wirel Pers Commun 96(2):1753–1769

    Article  Google Scholar 

  13. Logambigai R, Ganapathy S, Kannan A (2018) Energy–efficient grid-based directing route algorithm using intelligent fuzzy rules for wireless sensor networks. Comput Electr Eng 68:62–75

    Article  Google Scholar 

  14. Li S, Zhao S, Wang X, Zhang K, Li L (2014) Adaptive and secure load-balancing directing route protocol for service-oriented wireless sensor networks. IEEE Syst J 8(3):858–867

    Article  Google Scholar 

  15. Mazinani A, Mazinani SM, Mirzaie M (2019) FMCR-CT: an energyefficient fuzzy multi cluster-based directing route with a constant threshold in wireless sensor network. Alex Eng J 58:127–141

    Article  Google Scholar 

  16. Saidi A, Benahmed K, Seddiki N (2020) Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks. Ad Hoc Netw 106:102215

    Article  Google Scholar 

  17. Maivizhi R, Yogesh P (2022) Fuzzy directing route for in-network aggregation in wireless sensor networks. Peer Peer Netw Appl 15(1):592–611

    Article  Google Scholar 

  18. Kalidoss T, Rajasekaran L, Kanagasabai K, Sannasi G, Kannan A (2019) QoS aware trust based directing route algorithm for wireless sensor networks. Wirel Pers Commun 110(4):1637–1658

    Article  Google Scholar 

  19. Hsu CM (2003) A group digital signature technique for authentication. In: IEEE 37th annual 2003 international Carnahan conference on security technology, 2003. Proceedings. IEEE, pp 253–256

  20. Gaber T, Abdelwahab S, Elhoseny M, Hassanien A (2018) Trust-based secure clustering in WSN-based intelligent transportation systems. Comput Netw 146:151–158

    Article  Google Scholar 

  21. Gulati K, Kumar Boddu R, Kapila D, Bangare S, Chandnani N, Saravanan G (2022) A review paper on wireless sensor network techniques in Internet of Things (IoT). Mater Today Proc 51:161–165

    Article  Google Scholar 

  22. Al-Omaisi H, Sundararajan E, Alsaqour R, Abdullah N, Abdelhaq M (2021) A survey of data dissemination schemes in vehicular named data networking. Veh Commun 30:100353

    Google Scholar 

  23. Abhishek Badholia K (2021) Cluster based directing route protocols in wsn sensor. Inf Technol Ind 9(1):198–206

    Google Scholar 

  24. Al-Naji F, Zagrouba R (2020) A survey on continuous authentication methods in Internet of Things environment. Comput Commun 163:109–133

    Article  Google Scholar 

  25. Fan Q, Chen J, Deborah L, Luo M (2021) A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain. J Syst Architect 117:102112

    Article  Google Scholar 

  26. Li J, Zhang Z, Hui L, Zhou Z (2020) A novel message authentication scheme with absolute privacy for the internet of things networks. IEEE Access 8:39689–39699

    Article  Google Scholar 

  27. Wu F, Li X, Xu L, Vijayakumar P, Kumar N (2021) A novel three-factor authentication protocol for wireless sensor networks with IoT notion. IEEE Syst J 15(1):1120–1129

    Article  Google Scholar 

  28. Kar J, Naik K, Abdelkader T (2021) A secure and lightweight protocol for message authentication in wireless sensor networks. IEEE Syst J 15(3):3808–3819

    Article  Google Scholar 

  29. Xiong L, Xiong N, Wang C, Yu X, Shuai M (2021) An efficient lightweight authentication scheme with adaptive resilience of asynchronization attacks for wireless sensor networks. IEEE Trans Syst Man Cybern Syst 51(9):5626–5638

    Article  Google Scholar 

  30. Hussain M, Mehmood A, Khan S, Khan M, Iqbal Z (2019) Authentication techniques and methodologies used in wireless body area networks. J Syst Architect 101:101655

    Article  Google Scholar 

  31. Harbi Y, Aliouat Z, Refoufi A, Harous S, Bentaleb A (2019) Enhanced authentication and key management scheme for securing data transmission in the internet of things. Ad Hoc Netw 94:101948

    Article  Google Scholar 

  32. Hu H, Han Y, Yao M, Song X (2022) Trust based secure and energy efficient directing route protocol for wireless sensor networks. IEEE Access 10:10585–10596

    Article  Google Scholar 

  33. Abbas Ahmad S, Krishnahari E, Yousuf Khan M, Prabhakara Rao S (2020) Neighbor node intimacy (N2i) for trust management in WSN. Mater Today Proc

  34. K.P A (2021) Comparison of fuzzy-based cluster head selection algorithm with LEACH algorithm in wireless sensor networks to maximize network LAssume thatetime. Rev Gestão Inovação Tecnol 11(4):1277–1288

    Article  Google Scholar 

  35. Abanto-Leon LF et al (2020) Swan: swarm-based low-complexity scheme for PAPR reduction. GLOBECOM 2020 - 2020 IEEE Global Communications Conference [Preprint]. https://doi.org/10.1109/globecom42002.2020.9322272

  36. Yang XS, Deb S (2010) Engineering optimisation by cuckoo search. Int J Math Model Numer Optim 1(4):330–343

  37. Afianti F, Wirawan, Suryani T (2019) Lightweight and DoS resistant multiuser authentication in wireless sensor networks for smart grid environments. IEEE Access 7:67107–67122

    Article  Google Scholar 

  38. Gope P, Sikdar B (2019) Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J 6(1):580–589

    Article  Google Scholar 

  39. Patil P, Deshpande R, Mane P (2020) Trust and opportunity based directing route framework in wireless sensor network using hybrid optimization algorithm. Wirel Pers Commun 115(1):415–437

    Article  Google Scholar 

  40. De P, Liu Y, Das SK (2008, March) ReMo: An energy efficient reprogramming protocol for mobile sensor networks. In: 2008 sixth annual IEEE international conference on pervasive computing and communications (PerCom). IEEE, pp 60–69

  41. Wang Q, Zhu Y, Cheng L (2006) Reprogramming wireless sensor networks: challenges and approaches. IEEE Network 20(3):48–55

    Article  Google Scholar 

  42. Wang, L. (2004). MNP: Multihop network reprogramming service for sensor networks. In: Proceedings of the 2nd ACM conference on embedded networked sensor systems, USA. 12. Hyun S, Ning P, Liu A, Du W (2008) – MOAP

  43. Hui JW, Culler D (2004) The dynamic behavior of a data dissemination protocol for network programming at scale. In: Proceedings of the 2nd international conference on embedded networked sensor systems (Sensys 04). ACM, New York, pp 81–94. - Deluge

  44. Hyun S, Ning P, Liu A, Du W (2008) Seluge: Secure and dos-resistant code dissemination in wireless sensor networks. In: 2008 international conference on information processing in sensor networks (IPSN 2008). IEEE, pp 445–456

  45. Zhang R, Zhang Y (2011) LR-Seluge: Loss-resilient and secure code dissemination in wireless sensor networks. In: 2011 31st international conference on distributed computing Systems. IEEE, pp 497–506

  46. Naik V, Arora A, Sinha P, Zhang H (2005) Sprinkler: A reliable and energy efficient data dissemination service for wireless embedded devices. In: 26th IEEE international real-time systems symposium (RTSS'05). IEEE, p 10

  47. Levis P, Patel N, Culler D, Shenker S (2004) Trickle: a self-regulating algorithm for code maintenance and propagation in wirelesssensor networks. In: Proceedings of 1st conference symposium network systems design implementation. 17, pp 15–28

  48. Huang L, Setia S (2008) CORD: Energy-efficient reliable bulk data dissemination in sensor networks. In: IEEE INFOCOM 2008-The 27th conference on computer communications. IEEE, pp 574–582

  49. Lin K, Levis P (2008) Data discovery and dissemination with dip. In: 2008 international conference on information processing in sensor networks (IPSN 2008). IEEE, pp 433–444

  50. He D, Chan S, Tang S, Guizani M (2013) Secure data discovery and dissemination based on hash tree for wireless sensor networks. IEEE Trans Wireless Commun 12(9):4638–4646

    Article  Google Scholar 

  51. He D, Chan S, Tang S, Guizani M (2015) Secure and distributed data discovery and dissemination in wireless sensor networks. IEEE Trans Wireless Commun 26(4):1129–1139

    Google Scholar 

  52. Hawbani A, Wang X, Kuhlani H, Karmoshi S, Ghoul R, Sharabi Y, Torbosh E (2018) Sink-oriented tree-based data dissemination protocol for mobile sinks in wireless sensor networks. Wireless Netw 24(7):2723–2734

    Article  Google Scholar 

  53. Ahim KA (2017) BASIS: a practical multi-user broadcast authentication scheme in wireless sensor networks. IEEE Trans Inf Forensics Secur 12(7):1545–1553

    Article  Google Scholar 

  54. Ma K et al (2021) Reliability-constrained throughput optimization of industrial wireless sensor networks with energy harvesting relay. IEEE Internet Things J 8(17):13343–13354. https://doi.org/10.1109/jiot.2021.3065966

    Article  Google Scholar 

  55. Cao K et al (2021) Achieving reliable and secure communications in wireless-powered Noma systems. IEEE Trans Veh Technol 70(2):1978–1983. https://doi.org/10.1109/tvt.2021.3053093

    Article  Google Scholar 

  56. Guo F et al (2022) Path extension similarity link prediction method based on matrix algebra in directed networks. Comput Commun 187:83–92. https://doi.org/10.1016/j.comcom.2022.02.002

    Article  Google Scholar 

  57. Li L, Yao L (2023) Fault tolerant control of fuzzy stochastic distribution systems with packet dropout and time delay. IEEE transactions on automation science and engineering. pp 1–10. https://doi.org/10.1109/tase.2023.3266065

  58. Dai X et al (2023) Task co-offloading for D2D-assisted Mobile edge computing in industrial internet of things. IEEE Trans Industr Inf 19(1):480–490. https://doi.org/10.1109/tii.2022.3158974

    Article  Google Scholar 

  59. Jiang H et al (2022) An energy-efficient framework for internet of things underlaying heterogeneous small cell networks. IEEE Trans Mob Comput 21(1):31–43. https://doi.org/10.1109/tmc.2020.3005908

    Article  Google Scholar 

  60. Luo J et al (2021) Using deep belief network to construct the agricultural information system based on internet of things. J Supercomput 78(1):379–405. https://doi.org/10.1007/s11227-021-03898-y

    Article  Google Scholar 

  61. Liu C et al (2023) Robust online tensor completion for IOT streaming data recovery. IEEE Trans Neural Netw Learn Syst 34(12):10178–10192. https://doi.org/10.1109/tnnls.2022.3165076

    Article  MathSciNet  Google Scholar 

  62. Cao B et al (2020) Security-aware industrial wireless sensor network deployment optimization. IEEE Trans Industr Inf 16(8):5309–5316. https://doi.org/10.1109/tii.2019.2961340

    Article  Google Scholar 

  63. Cheng B et al (2016) Situation-aware IOT service coordination using the event-driven SOA paradigm. IEEE Trans Netw Serv Manage 13(2):349–361. https://doi.org/10.1109/tnsm.2016.2541171

    Article  Google Scholar 

  64. Lyu T et al (2023) Source selection and resource allocation in wireless powered relay networks: an adaptive dynamic programming based approach. IEEE Internet Things J:1–1. https://doi.org/10.1109/jiot.2023.3321673

  65. Palanisamy S, Sankar S, Somula R (2021) Communication trust and energy-aware routing protocol for WSN using DS theory. Int J Grid High Perform Comput (IJGHPC -IGI) 13(4):24–36. https://doi.org/10.4018/IJGHPC.2021100102. (Publisher IGI Global)

    Article  Google Scholar 

  66. Manuel AJ et al (2020) Optimization of routing-based clustering approaches in wireless sensor network: review and open research issues. Electronics 9(10):1630. https://doi.org/10.3390/electronics9101630

    Article  Google Scholar 

  67. Selvaraj A et al (2019) Optimal virtual machine selection for anomaly detection using a swarm intelligence approach. Appl Soft Comput 84:105686. https://doi.org/10.1016/j.asoc.2019.105686

    Article  Google Scholar 

  68. Nagarajan SM et al (2022) Integration of IOT based routing process for food supply chain management in sustainable smart cities. Sustain Cities Soc 76:103448. https://doi.org/10.1016/j.scs.2021.103448

    Article  Google Scholar 

  69. Krishnasamy L et al (2020) A heuristic angular clustering framework for secured statistical data aggregation in sensor networks. Sensors 20(17):4937. https://doi.org/10.3390/s20174937

    Article  Google Scholar 

  70. Gopal DG, Saravanan R (2016) Selfish node detection based on evidence by trust authority and selfish replica allocation in DANET. Int J Inf CommunTechnol 9(4):473–491

  71. Karuppiah M, Ramana TV, Mohanty R, Devarajan GG, Nagarajan SM (2023) UIoTN-PMSE: Ubiquitous IoT network-based predictive modeling in smart environment. Inte J Commun Syst e5661

  72. Sivakumar NR, Nagarajan SM, Devarajan GG, Pullagura L, Mahapatra RP (2023) Enhancing network lifespan in wireless sensor networks using deep learning-based graph neural network. Phys Commun:102076. https://doi.org/10.1016/j.phycom.2023.102076

  73. Marimuthu K, Sashi Kanth K, Setty S, Tainwala K Scalable and secure data sharing for dynamic groups in the cloud, 2014/5/8, pp 1697–1701, 2014 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT)

  74. Malik G, Boominathan P, Marimuthu K (2014) A secured cloud system and log records based on 2LE. Int J Appl Eng Res (IJAER) 9(20):7435–7451

    Google Scholar 

  75. Marimuthu K, Ganesh Gopal D, Aditya S, Mittal V (2014) Cryptanalysis of oPass. 2014 IEEE international conference on advanced communications, control and computing technologies. https://doi.org/10.1109/icaccct.2014.7019457

Download references

Funding

No funding.

Author information

Authors and Affiliations

Authors

Contributions

All the authors have contributed in a equal manner.

Corresponding author

Correspondence to Santhosh Kumar SVN.

Ethics declarations

Ethics approval

Authors provide the Ethics Approval for the given manuscript.

Consent to publish

All the authors gave permission to Consent to publish.

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shanmugapriya, R., SVN, S.K. An energy efficient Swan Intelligent based Clustering Technique (SICT) with fuzzy based secure routing protocol in IoT. Peer-to-Peer Netw. Appl. (2024). https://doi.org/10.1007/s12083-024-01670-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12083-024-01670-6

Keywords

Navigation