Skip to main content

Advertisement

Log in

RETRACTED ARTICLE: Enhancement of network lifetime by fuzzy based secure CH clustered routing protocol for mobile wireless sensor network

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

This article was retracted on 23 May 2022

This article has been updated

Abstract

Mobile Wireless sensor network conveys an innovative archetype of real time systems by means of restricted computation, transmission, storage, and vigor resources utilized for massive range of appliances wherever traditional system is frequently infeasible. Sensor nodes are compactly organized in an aggressive atmosphere to observe, identify, and scrutinize physical occurrence and utilized significant quantity of energy during broadcasting information. It is unfeasible and occasionally impractical to change battery and to preserve wider network lifetime. So, duration of battery and energy preservation is an exigent complication. Exact ClusterHead determination is one of the concerns that can condense energy utilization considerably. Low-energy adaptive-clustering hierarchy (LEACH) is most prominent hierarchical routing technique, ClusterHead is nominated in alternation basis related on probabilistic threshold cost and CHs are permitted to transfer events to basestation. In proposed FCHIDS tactic, a Outstanding-ClusterHead is nominated among CHs in cluster that can transfer information to mobile basestation by deciding appropriate fuzzy factors outstanding battery power, basestation mobility, clusters centrality and intrusion detection system. Fuzzy assumption engine is utilized to decide Outstanding-ClusterHead. The consequences are from simulating NS-2 and illustrations shows that proposed FCHIDS tactic achieves upto 5% superior than LEACH technique in provisions with partial amount of nodes active, enhanced constancy, and improved lifetime. Consequently it achieves upto 5% reduction in initial node expires from network than LEACH technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Change history

References

  • Akkaya K, Younis M (2005) A survey on routing protocols for wireless sensor networks. Ad Hoc Netw 3(3):325–349

    Article  Google Scholar 

  • Ashutosh KS, Purohit N (2014) An optimised fuzzy clustering for wireless sensor networks. Int J Electron 101(8):1027–1041

    Article  Google Scholar 

  • Chehreghani MH, Chehreghani MH, Abolhassani H (2012) Probabilistic heuristics for hierarchical web data clustering. Comput Intell 28(2):209–233

    Article  MathSciNet  Google Scholar 

  • Douzi S, Benchaji I, El Ouahidi B (2018) Hybrid approach for intrusion detection using fuzzy association rules plus anomaly and misuse detection. Int J Mach Learn Comput 8(5)

  • Enokido T, Aikebaier A, Takizawa M (2011) An extended power consumption-based algorithm for communication-based applications. J Ambient Intell Humaniz Comput 2:263–270

    Article  Google Scholar 

  • Farman H, Javed H, Jan B, Ahmad J, Ali S, Khalil FN et al (2017) Analytical network process based optimum cluster head selection in wireless sensor network. PLoS One 12(7):1–28

    Article  Google Scholar 

  • Gaurav S, Reshmi TR (2018) A fuzzy-logic based clustering algorithm in WSN to extend network lifetime. Int J Appl Eng Res 13(10):7711–7718

    Google Scholar 

  • Gupta M, Chaudhari NS (2019) Anonymous roaming authentication protocol for wireless network with backward unlinkability, exculpability and efficient revocation check. J Ambient Intell Humaniz Comput 10:4491–4501

    Article  Google Scholar 

  • Hamzah A, Shurman M, Al-Jarrah O, Taqieddin E (2019) Energy-efficient fuzzy-logic-based clustering technique for hierarchical routing protocols in wireless sensor networks. Sensors

  • Heinzelman WB, Chandrakasan A, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun 1(4):660–670

    Article  Google Scholar 

  • Janish, Katiyar M (2016) A survey on energy efficiency and cluster handling in real time wireless sensor networks. IOSR J Comput Eng 18(5):43–46 (e-ISSN: 2278-0661, p-ISSN: 2278-8727)

  • Jayarajan P, Kanagachidambaresan GR, Sundararajan TVP et al (2018) An energy-aware buffer management (EABM) routing protocol for WSN. J Supercomput. https://doi.org/10.1007/s11227-018-2582-4

    Article  Google Scholar 

  • Kashyap PK, Kumar S (2019) Genetic-fuzzy based load balanced protocol for WSNs. Int J Electric Comput Eng 9(2):1168–1183

    Google Scholar 

  • Khan ZA, Herrmann P (2019) Recent advancements in intrusion detection systems for the internet of things. Secur Commun Netw. https://doi.org/10.1155/2019/4301409

    Article  Google Scholar 

  • Kwon SK, Jung K-D, Lee J-Y (2017) WSN protocol based on LEACH protocol using fuzzy. Int J Appl Eng Res 12(20):10013–10018 ((ISSN 0973-4562))

    Google Scholar 

  • Mehra PS, MN Doja, Alam B (2018) Fuzzy based enhanced cluster head selection (FBECS) for WSN. J King Saud Univ Sci

  • Nehra V, Pal R, Sharma AK (2013) Fuzzy-based leader selection for topology controlled PEGASIS protocol for lifetime enhancement in wireless sensor network. Int J Comput Technol 4(3):755–764

    Article  Google Scholar 

  • Rais A, Bouragba K, Ouzzif M (2019) Routing and clustering of sensor nodes in the honeycomb architecture. J Comput Netw Commun. https://doi.org/10.1155/2019/4861294

    Article  Google Scholar 

  • Rajesh D, Jaya T (2019) Exploration on cluster related energy proficient routing in mobile wireless sensor network. Int J Innov Technol Explor Eng 8(4)

  • Rajesh D, Jaya T (2020) A mathematical model for energy efficient secured CH clustering protocol for mobile wireless sensor network. Wirel Pers Commun. https://doi.org/10.1007/s11277-020-07036-4

    Article  Google Scholar 

  • Ren J, Guo J, Qian W, Yuan H, Hao X, Jingjing Hu (2019) Building an effective intrusion detection system by using hybrid data optimization based on machine learning algorithms. Secur Commun Netw. https://doi.org/10.1155/2019/7130868

    Article  Google Scholar 

  • Shanmugavadivu R, Nagarajan N (2011) Network intrusion detection system using fuzzy logic. Indian J Comput Sci Eng 2(1)

  • Sharma T, Kumar B (2012) F-MCHEL: fuzzy based master cluster head election Leach protocol in wireless sensor network. Int J Comput Sci Telecommun 3(10):8–13

    Google Scholar 

  • Taheri H, Neamatollahi P, Younis OM, Naghibzadeh S, Yaghmaee MH (2012) An energy-aware distributed clustering protocol in wireless sensor networks using fuzzy logic. Ad Hoc Netw 10(7):1469–1481

    Article  Google Scholar 

  • Wang Y-C, Wu F-J, Tseng Y-C (2012) Mobility management algorithms and applications for mobile sensor networks. Wirel Commun Mob Comput 12(1):7–21

    Article  Google Scholar 

  • Zhang C, Yang Y, Du Z et al (2016) Particle swarm optimization algorithm based on ontology model to support cloud computing applications. J Ambient Intell Humaniz Comput 7:633–638

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Rajesh.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s12652-022-03947-1"

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajesh, D., Jaya, T. RETRACTED ARTICLE: Enhancement of network lifetime by fuzzy based secure CH clustered routing protocol for mobile wireless sensor network. J Ambient Intell Human Comput 13, 2795–2805 (2022). https://doi.org/10.1007/s12652-021-03170-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-021-03170-4

Keywords

Navigation