Skip to main content

Advertisement

Log in

Adaptive EHTARA: An Energy-Efficient and Trust Aware Secure Routing Algorithm for Big Data Classification in IoT Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Due to rapid growth and tremendous advancement, the Internet of Things (IoT) has been considered as a superior technology in recent years and increased its demand over the internet world because of its smart services. IoT has a wide range of applications over the industry, business, and academia. Still, security and routing remain a huge challenging task because of some reasons, such as heterogeneity issues, large energy consumption, and uncontrollable environment. In order to cope up with such security issues, it is essential to develop an energy-efficient routing protocol. Hence, this article presents an Adaptive energy harvesting and Trust aware routing (EHTARA) algorithm for optimal routing such that it prolongs the lifetime of the network. The optimal secure routing path is chosen to exploit the cost metric function. Moreover, the classification of big data is performed at MapReduce framework using stacked autoencoder, which is trained using the proposed Adaptive \(E^{2}\)-Bat algorithm. Moreover, the proposed Adaptive \(E^{2}\)-Bat algorithm is derived by incorporating adaptive principle with \(E^{2}\)-Bat algorithm. The proposed Adaptive EHTARA achieved an energy of 0.948 J that reveals the superiority of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Brajula, W., & Praveena, S. (2018). Energy efficient genetic algorithm based clustering technique for prolonging the life time of wireless sensor network. Journal of Networking and Communication Systems, 1(1), 1–9.

    Google Scholar 

  2. Temurul, H., Muhammad, A., Thar, B., Jawad, H., & Noshina, T. (2021). CTrust-RPL: A control layer-based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks-based Internet of Things applications. Transactions on Emerging Telecommunications Technologies, 32(3), e4224.

    Google Scholar 

  3. AlFarraj, O., AlZubi, A., & Tolba, A. (2018). Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 2, 1–11.

    Google Scholar 

  4. Wang, Bo., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164–180.

    Article  Google Scholar 

  5. Xiaa, F., Liaqata, H. B., Ahmeda, A. M., Liua, L., Mab, J., Huangb, R., & Tolbac, A. (2016). User popularity-based packet scheduling for congestion control in ad-hoc social networks. Journal of Computer and System Sciences, 82(1), 93–112.

    Article  MathSciNet  Google Scholar 

  6. AlBalushi, F. M. (2019). Chaotic based hybrid artificial sheep algorithm-particle swarm optimization for energy and secure aware in WSN. Journal of Networking and Communication Systems, 2(2), 37–48.

    Google Scholar 

  7. Lakshmanaprabu, S. K., Shankar, K., Ashish, K. A., Deepak, G. D., Joel, J. P. C. R., Placido, R. P., & De Albuquerque, V. H. (2018). Effective features to classify big data using social internet of things. IEEE Access, 6, 24196–24204.

    Article  Google Scholar 

  8. Deebak, B. D., & Al-Turjman, F. (2020). A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Networks, 97, 102022.

    Article  Google Scholar 

  9. Banchhor, C., & Srinivasu, N. (2020). Integrating Cuckoo search-grey wolf optimization and correlative naive bayes classifier with map reduce model for big data classification. Data and Knowledge Engineering, 127, 101788.

    Article  Google Scholar 

  10. Karthick, S. (2018). TDP: A novel secure and energy aware routing protocol for wireless sensor networks. International Journal of Intelligent Engineering and Systems, 11(2), 76–84.

    Article  Google Scholar 

  11. Jin, S., Peng, J., & Xie, D. (2018). A new MapReduce approach with dynamic fuzzy inference for big data classification problems. International Journal of Cognitive Informatics and Natural Intelligence (IJCINI), 12(3), 40–54.

    Article  Google Scholar 

  12. Banchhor, C., & Srinivasu, N. (2018). FCNB: Fuzzy correlative naïve bayes classifier with MapReduce framework for big data classification. Journal of Intelligent Systems, 29(1), 994–1006.

    Article  Google Scholar 

  13. Bathla, G., Aggarwal, H., & Rani, R. (2018). A novel approach for clustering big data based on MapReduce. International Journal of Electrical and Computer Engineering, 8(3), 2088–8708.

    Google Scholar 

  14. Jo, J., & Lee, K.-W. (2018). High-performance geospatial big data processing system based on MapReduce. ISPRS International Journal of Geo-Information, 7(10), 399.

    Article  Google Scholar 

  15. Raval, M. Y., Yagnik, S., & Dave, S. R. (2018). An effective high utility itemset mining algorithm with big data based on MapReduce framework. In IEEE international conference on inventive research in computing applications (ICIRCA) (pp. 590–595).

  16. Balachandra, M., Prema, K. V., & Makkithaya, K. (2014). Multiconstrained and multipath QoS aware routing protocol for MANETs. Wireless Networks, 20(8), 2395–2408.

    Article  Google Scholar 

  17. Chen, Z., He, M., Liang, W., & Chen, K. (2015). Trust-aware and low energy consumption security topology protocol of wireless sensor network. Journal of Sensors, 15, 96.

    Google Scholar 

  18. Nguyen, T. D., Khan, J. Y., & Ngo, D. T. (2018). A distributed energy-harvesting-aware routing algorithm for heterogeneous IoT networks. IEEE Transactions on Green Communications and Networking, 2(4), 1115–1127.

    Article  Google Scholar 

  19. Luo, J., Di, Wu., Pan, C., & Zha, J. (2015). Optimal energy strategy for node selection and data relay in WSN-based IoT. Mobile Networks and Applications, 20(2), 169–180.

    Article  Google Scholar 

  20. Zhu, J. (2018). Wireless sensor network technology based on security trust evaluation model. International Journal of Online Engineering, 14(4), 69.

    Google Scholar 

  21. Saccucci, M. S., Amin, R. W., & Lucas, J. M. (1992). Exponentially weighted moving average control schemes with variable sampling intervals. Communications in Statistics-simulation and Computation, 21(3), 627–657.

    Article  MathSciNet  Google Scholar 

  22. Yang, X.-S. (2011). Bat algorithm for multi-objective optimisation. International Journal of Bio-Inspired Computation, 3(5), 267–274.

    Article  Google Scholar 

  23. Liu, G., Bao, H., & Han, B. (2018). A stacked autoencoder-based deep neural network for achieving gearbox fault diagnosis. Mathematical Problems in Engineering, 6, 100.

    Google Scholar 

  24. Heart Disease Data Set. https://archive.ics.uci.edu/ml/datasets/Heart+Disease. Accessed on April 2021.

  25. Dhumane, A. V., & Prasad, R. S. (2019). Multi-objective fractional gravitational search algorithm for energy efficient routing in IoT. Wireless networks, 25(1), 399–413.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Md. Mujeeb.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mujeeb, S.M., Praveen Sam, R. & Madhavi, K. Adaptive EHTARA: An Energy-Efficient and Trust Aware Secure Routing Algorithm for Big Data Classification in IoT Network. Wireless Pers Commun 121, 621–646 (2021). https://doi.org/10.1007/s11277-021-08653-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08653-3

Keywords

Navigation