Skip to main content
Log in

Trust and Opportunity Based Routing Framework in Wireless Sensor Network Using Hybrid Optimization Algorithm

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Opportunistic routing (OR) is the area of research in the trending scenario as the traditional methods for ensuring secure routing in the Wireless Sensor Networks (WSNs) suffer from the security and reliability issues. Though the existing multi-hop routing protocols are cheap and require less-intensive deployment, security is a major concern. The paper proposes the OR in WSNs using the hybrid optimization algorithm named, Monarch-Cat Swarm Optimization (M-CSO) which is the integration of Monarch Butterfly Optimization in Cat Swarm Optimization. The framework operates on two crucial aspects: one is to select the secure nodes and the other is to choose opportunistic nodes among selected secure nodes. The selection of secure nodes through the tolerant constant is based on the parameters of trust, connectivity, and QoS. The first two parameters are direct whereas, for QoS, Link Life Time and delay are considered to define it. Secondly, opportunistic nodes are optimally chosen through proposed M-CSO, based on the fitness parameters trust, distance, delay, and connectivity. The effectiveness of M-CSO based routing framework is evaluated using the performance metrics with 50 and 100 nodes in the presence of the attacks DoS, and Blackhole. The maximal detection rate, maximal throughput, minimum delay and minimum distance of the proposed M-CSO are 74.95, 77.7, 6.7 s and 102.67, respectively which is far better than competing methods Trust aware routing framework, Simple Opportunistic Adaptive Routing and Ant Colony Optimization for secured routing protocol. Moreover, M-CSO shows better performance as compared to the existing trust and opportunity based routing and optimization schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184–197.

    Article  Google Scholar 

  2. Townsend, C., & Arms, S. (2005). Wireless sensor networks. MicroStrain, 20(9), 15–21.

    Google Scholar 

  3. Zahedi, A., & Parma, F. (2018). An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Networking and Applications, 1–10.

  4. Choi, J. G., & Bahk, S. (2007). Cell-throughput analysis of the proportional fair scheduler in the single-cell environment. IEEE Transactions on Vehicular Technology, 56(2), 766–778.

    Article  Google Scholar 

  5. Qin, D., Yang, S., Jia, S., Zhang, Y., Ma, J., & Ding, Q. (2017). Research on trust sensing based secure routing mechanism for wireless sensor network. IEEE Access, 5, 9599–9609.

    Article  Google Scholar 

  6. Saidi, H., Gretete, D., & Adnane, A. (2017). Opportunistic routing in wireless sensors networks. In Proceedings of the 2nd international conference on computing and wireless communication systems (p. 69).

  7. Liu, D., et al. (2016). Duplicate detectable opportunistic forwarding in duty-cycled wireless sensor networks. IEEE/ACM Transactions on Networking, 24(2), 662–673.

    Article  Google Scholar 

  8. Shelke, M., Malhotra, A., & Mahalle, P. N. (2018). Congestion-aware opportunistic routing protocol in wireless sensor networks. In Smart computing and informatics (pp. 63–72). Berlin: Springer.

  9. Rozner, E., Seshadri, J., Mehta, Y. A., & Qiu, L. (2009). SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks. IEEE Transactions on Mobile Computing, 8(12), 1622.

    Article  Google Scholar 

  10. Das, A. K., Chaki, R., & Dey, K. N. (2016). Secure energy efficient routing protocol for wireless sensor network. Foundations of Computing and Decision Sciences, 41(1), 3–27.

    Article  Google Scholar 

  11. Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.

    Article  Google Scholar 

  12. Wang, Y., Zhang, M., & Shu, W. (2018). An emerging intelligent optimization algorithm based on trust sensing model for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 1, 145.

    Article  Google Scholar 

  13. Das, A. K., Chaki, R., & Dey, K. N. (2016). Cluster based energy aware routing scheme CBEARS for wireless sensor network. International Journal of Sensor Network, 21(4), 262–272.

    Article  Google Scholar 

  14. Sinha, D., Kumari, R., & Tripathi, S. (2019). Semisupervised classification based clustering approach in WSN for forest fire detection. Wireless Personal Communications, 109(4), 2561–2605.

    Article  Google Scholar 

  15. Wang, G. G., Deb, S., Zhao, X., & Cui, Z. (2016). A new monarch butterfly optimization with an improved crossover operator. Operational Research, 18(3), 731–755.

    Article  Google Scholar 

  16. Bahrami, M., Bozorg-Haddad, O., & Chu, X. (2018). Cat Swarm Optimization (CSO) algorithm. In Advanced optimization by nature-inspired algorithms (pp. 9–18).

  17. Johnson, D. B., Maltz, D. A., & Broch, J. (2001). DSR: The dynamic source routing protocol for multihop wireless ad hoc networks. Ad Hoc Networking.

  18. Perkins, C. E., & Bhagwat, P. (1994). Highly dynamic destination sequenced distance-vector routing (dsdv) for mobile computers. In Proceedings of ACM SIGCOMM.

  19. Perkins, C. E., & Royer, E. M. (1999). Ad hoc on-demand distance vector routing. In Proceedings of the workshop on mobile computing systems and applications.

  20. Draves, R., Padhye, J., & Zill, B. (2004). Comparison of routing metrics for multi-hop wireless networks. In Proceedings of ACM SIGCOMM.

  21. Zahariadis, T., Leligou, H., Karkazis, P., Trakadas, P., Papaefstathiou, I., Vangelatos, C., et al. (2011). Design and implementation of a trust-aware routing protocol for Largewsns. International Journal of Network Security & Its Applications, 2(3), 52–68.

    Article  Google Scholar 

  22. Yu, C. M., & Ku, M. L. (2018). Joint hybrid transmission and adaptive routing for lifetime extension of WSNS. IEEE Access, 6, 21658–21667.

    Article  Google Scholar 

  23. Félix, G., Gregorio, M., Pérez, M., & Antonio, F. (2009). TACS, a trust model for P2P networks. Wireless Personal Communications, 51(1), 153–164.

    Article  Google Scholar 

  24. Gu, X., Wang, J., Qiu, J., & Jiang, Z. (2017). Self-recommendation mechanism in trust calculation among nodes in WSN. Wireless Personal Communications, 97(3), 3705–3723.

    Article  Google Scholar 

  25. Karthik, N., & Ananthanarayana, V. S. (2017). A hybrid trust management scheme for wireless sensor networks. Wireless Personal Communications, 97(4), 5137–5170.

    Article  Google Scholar 

  26. Kshirsagar, V., Kanthe, A. M., & Simunic, D. (2018). Trust based detection and elimination of packet drop attack in the mobile ad-hoc networks. Wireless Personal Communications, 100(2), 311–320.

    Article  Google Scholar 

  27. Das, A., & Islam, M. M. (2012). SecuredTrust: A dynamic trust computation model for secured communication in multiagent systems. IEEE Transactions on Dependable and Secure Computing, 9(2), 261–274.

    Article  Google Scholar 

  28. Chintalapalli, R. M., & Ananthula, V. R. (2018). M-LionWhale: Multi-objective optimisationmodel for secure routing in mobile ad-hocnetwork. IET Communications, 12(12), 1406–1415.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pritesh A. Patil.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Patil, P.A., Deshpande, R.S. & Mane, P.B. Trust and Opportunity Based Routing Framework in Wireless Sensor Network Using Hybrid Optimization Algorithm. Wireless Pers Commun 115, 415–437 (2020). https://doi.org/10.1007/s11277-020-07579-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07579-6

Keywords

Navigation