Skip to main content

Advertisement

Log in

FEBSRA: Fuzzy Trust Based Energy Aware Balanced Secure Routing Algorithm for Secured Communications in WSNs

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Energy efficiency playsa major role in designing a sensor network to improve network lifetime. Trust is also important for providing security to the data communication process. Delay is also a major challenge today due to the enormous volume of network users. To overcome all these issues, many researchers have developed energy-efficient security mechanisms for fulfilling the requirements. Even though they are not able to satisfy the current requirements and users in terms of energy consumption, delay, and security. For this purpose, this paper proposes a new algorithm called Fuzzy Trust-Based Energy-Aware Balanced Secure Routing Algorithm, which can provide the effective delay constrained secure routing. It uses fuzzy logic as a form of many-valued logic. In this method, the truth values of variables may be any real number between 0 and 1, both inclusive for making a final decision over sensor nodes. Considering the number of hops between the source and destination nodes, the energy level of the nodes, the trust scores. Moreover, a new trust model has introduced a new formula for calculating trust scores with the energy level of the communication delay, which is calculated by using the number of hops used for the specific communication, taking into account the number of hops between the source and destination nodes. The experimental results of the proposed secured routing algorithm demonstrated that the performance in terms of energy consumption, less delay, and high throughput with security is better when compared to the existing systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Younis, O., & Fahmy, S. (2004). HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. In IEEE Transactions on Mobile Computing, 3(4), 366–379. https://doi.org/10.1109/TMC.2004.41.

    Article  Google Scholar 

  2. Qin, D., Yang, S., Jia S., Zhang, Y., Ma, J., & Ding, Q. (2017). Research on trust sensing based secure routing mechanism for wireless sensor network. In IEEE Access, 5, 9599–9609. https://doi.org/10.1109/ACCESS.2017.2706973.

    Article  Google Scholar 

  3. Huynh, T.-T., Dinh-Duc, A.-V., & Tran C.-H. (2016). Delay-constrained energy-efficient cluster-based multi-hop routing in wireless sensor networks. In Journal of Communications and Networks, 18(4), 580–588. https://doi.org/10.1109/JCN.2016.000081.

    Article  Google Scholar 

  4. Logambigai, R., Ganapathy, S., & Kannan A. (2018).Energy–efficient grid–based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Computers & Electrical Engineering, 68, 62–75. https://doi.org/10.1016/j.compeleceng.2018.03.036.

    Article  Google Scholar 

  5. Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. In IEEE Transactions on Wireless Communications, 1(4), 660–670. https://doi.org/10.1109/TWC.2002.804190.

    Article  Google Scholar 

  6. El Assaf, A., Zaidi, S., Affes, S., & Kandil, N. (2016). Low-cost localization for multihop heterogeneous wireless sensor networks. In IEEE Transactions on Wireless Communications, 15(1), 472–484. https://doi.org/10.1109/TWC.2015.2475255.

    Article  Google Scholar 

  7. Rathore, H., Badarla, V., & Shit, S. (2016). Consensus-aware sociopsychological trust model for wireless sensor networks. ACM Transactions on Sensor Networks, 12(3), 1–27. https://doi.org/10.1145/2903721.

    Article  Google Scholar 

  8. Chen, L., Xiong, X., Chen, Y., Liu, K., Zhang, J., Jiang, Y., & Luo, Q. (2014). Why (n + 1)th-hop neighbours are more important than nth-hop ones for localisation in multi-hop WSNs, Electronics Letters, 50(22), 1646–1648. https://doi.org/10.1049/el.2014.2969.

    Article  Google Scholar 

  9. Ahmed, A., Bakar, K. A., Channa, M. I., Haseeb, K., & Khan, A. W. (2015). TERP: A trust and energy aware routing protocol for wireless sensor network. IEEE Sensors Journal, 15(12), 6962–6972. https://doi.org/10.1109/JSEN.2015.2468576.

    Article  Google Scholar 

  10. Le, T. N., Pegatoquet, A., Berder, O., & Sentieys, O. (2015). Energy-efficient power manager and MAC protocol for multi-hop wireless sensor networks powered by periodic energy harvesting sources. In IEEE Sensors Journal, 15(12), 7208–7220. https://doi.org/10.1109/JSEN.2015.2472566.

    Article  Google Scholar 

  11. Zaidi, S., El Assaf, A., Affes, S., & Kandil, N. (2016). Accurate range-free localization in multi-hop wireless sensor networks. In IEEE Transactions on Communications, 64(9), 3886–3900. https://doi.org/10.1109/TCOMM.2016.2590436.

    Article  Google Scholar 

  12. Ganapathy, S., Yogesh, P., Kannan, A. (2012). Intelligent agent-based intrusion detection system using enhanced multiclass SVM. Computational Intelligence and Neuroscience, 2012(9), 1–9. https://doi.org/10.1155/2012/850259.

  13. Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., & Kannan, A. (2017). An intelligent secured and energy efficient routing algorithm for MANETs. Wireless Personal Communications, 96(2), 1753–1769. https://doi.org/10.1007/s11277-017-4266-4.

    Article  Google Scholar 

  14. Selvi, M., Velvizhy, P., Ganapathy, S., Nehemiah, H. K., & Kannan, A. (2017). A rule based delay constrained energy efficient routing technique for wireless sensor networks. Cluster Computing, 22(12), 1–10. https://doi.org/10.1007/s10586-017-1191-y.

  15. Gao, X., Zhu, X., Li, J., Wu, F., Chen, G., Du, D. Z., & Tang, S. (2017). A novel approximation for multi-hop connected clustering problem in wireless networks. In IEEE/ACM Transactions on Networking, 25(4), 2223–2234. https://doi.org/10.1109/TNET.2017.2690359.

    Article  Google Scholar 

  16. Thangaramya, K., Logambigai, R., SaiRamesh, L., Kulothungan, K., Kannan, A., Ganapathy, S. An energy efficient clustering approach using spectral graph theory in wireless sensor networks. 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM), 2017, 126–129. https://doi.org/10.1109/ICRTCCM.2017.41.

  17. Sun, B., & Li, D. (2018). A comprehensive trust-aware routing protocol with multi-attributes for WSNs. In IEEE Access, 6, 4725–4741. https://doi.org/10.1109/ACCESS.2017.2786944.

    Article  Google Scholar 

  18. Singh, M., Sardar, A. R., Majumder, K., & Sarkar, S. K. (2017). A lightweight trust mechanism and overhead analysis for clustered WSN. IETE Journal of Research, 63(3), 297–308. https://doi.org/10.1080/03772063.2017.1284613.

    Article  Google Scholar 

  19. Liu, X., Xiong, N., Zhang, N., Liu, A., Shen, H., & Huang, C. (2018). A trust with abstract information verified routing scheme for cyber-physical network. In IEEE Access, 6, 3882–3898. https://doi.org/10.1109/ACCESS.2018.2799681.

    Article  Google Scholar 

  20. Asuquo, P., Cruickshank, H., AnyigorOgah, C. P., Lei, Ao., & Sun, Z. (2018). A distributed trust management scheme for data forwarding in satellite DTN emergency communications. In IEEE Journal on Selected Areas in Communications, 36(2), 246–256. https://doi.org/10.1109/JSAC.2018.2804098.

    Article  Google Scholar 

  21. Kuo, Y.-W., Li, C.-L., Jhang, J.-H., & Lin, S. (2018). Design of a wireless sensor network-based IoT platform for wide area and heterogeneous applications. In IEEE Sensors Journal, 18(12), 5187–5197. https://doi.org/10.1109/JSEN.2018.2832664.

    Article  Google Scholar 

  22. Li, Y., & Liang, Y. (2018). Compressed sensing in multi-hop large-scale wireless sensor networks based on routing topology tomography. In IEEE Access, 6, 27637–27650. https://doi.org/10.1109/ACCESS.2018.2834550.

    Article  Google Scholar 

  23. Firoozi, F., Zadorozhny, V. I., & Li, F. Y. (2018). Subjective logic-based in-network data processing for trust management in collocated and distributed wireless sensor networks. In IEEE Sensors Journal, 18(15), 6446–6460. https://doi.org/10.1109/JSEN.2018.2848205.

    Article  Google Scholar 

  24. Lambor, S. M., & Joshi, S. M. (2018). Optimal hops for minimal route power under SINR constraints in wireless sensor networks. IET Wireless Sensor Systems, 8(4), 176–182. https://doi.org/10.1049/iet-wss.2017.0078.

    Article  Google Scholar 

  25. Lyu, Z., Wei, Z., Pan, J., Chen, H., Xia, C., Han, J., & Shi, L. (2019). Periodic charging planning for a mobile WCE in wireless rechargeable sensor networks based on hybrid PSO and GA algorithm. Applied Soft Computing Journal, 75, 388–403, https://doi.org/10.1016/j.asoc.2018.11.022.

    Article  Google Scholar 

  26. Daiya, V., Ebenezer, J., & Jehadeesan, R. (2021). Mapping obfuscation-based PHY security scheme for resource-constrained wireless sensor network. IETE Technical Review, 38(2), 221–230. https://doi.org/10.1080/02564602.2019.1709573.

    Article  Google Scholar 

  27. Chen, Z., He, M., Liang, W., & Chen, K. (2015). Trust-aware and low energy consumption security topology protocol of wireless aensor network. Journal of Sensors, 2015, 1–10. https://doi.org/10.1155/2015/716468.

    Article  Google Scholar 

  28. Kim, J., Jang, K. Y., Choo, H., Kim, W. (2007). Energy efficient LEACH with TCP for wireless sensor networks. Computational Science & its Applications- ICCSA, 2007, 275–285, https://doi.org/10.1007/978-3-540-74477-1_27.

  29. Weichao, W., Fei, D., Qijian, X. (2009). An improvement of LEACH routing protocol based on trust for wireless sensor networks. 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009, 1–4. https://doi.org/10.1109/WICOM.2009.5303346.

  30. Miglani, A., Bhatia, T., Goel, S. (2015). TRUST based energy efficient routing in LEACH for wireless sensor network. 2015 Global Conference on Communication Technologies (GCCT), 2015, 361–365. https://doi.org/10.1109/GCCT.2015.7342684.

Download references

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. R. Tapas Bapu.

Ethics declarations

Conflict of interest

The authors have not disclosed any competing interests.

Data availability

Enquiries about data availability should be directed to the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Anitha, R., Bapu, B.R.T., Kuppusamy, P.G. et al. FEBSRA: Fuzzy Trust Based Energy Aware Balanced Secure Routing Algorithm for Secured Communications in WSNs. Wireless Pers Commun 125, 63–86 (2022). https://doi.org/10.1007/s11277-022-09541-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09541-0

Keywords

Navigation