Abstract
Wireless sensor networks (WSNs) are typically used to monitor and detect diverse objects in realistic environments, where security remains a major concern. Estimating the trust between WSN nodes increases the security of the network, and so enhances node-to-node communication. Here, we introduce a Trust Enabled Data Delivery Technique based Sparrow Search Algorithm (SSA) for WSN-based applications (TEDCTSSA). In TEDCTSSA, a nature-inspired based SSA and secure cluster head (CH) selection method based on node’s trust value and energy is proposed. For the efficient selection of CH, our fitness function takes into account node remaining energy and trust value. The simulation results reveal that the suggested method is more energy-efficient, provides a longer average network lifetime, and selects the most trustworthy nodes than other works in the literature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aziz, A., Osamy, W., Khedr, A.M., Singh, K.: Energy efficient scheme for data gathering in internet of things based heterogeneous wireless sensor networks. Wireless Pers. Commun. 114, 1905–1925 (2020). https://doi.org/10.1007/s11277-020-07454-4
Osamy, W., El-sawy, A.A., Khedr, A.M.: SATC: a simulated annealing based tree construction and scheduling algorithm for minimizing aggregation time in wireless sensor networks. Wireless Pers. Commun. 108(2), 921–938 (2019). https://doi.org/10.1007/s11277-019-06440-9
Khedr, A.M.: Effective data acquisition protocol for multi-hop heterogeneous wireless sensor networks using compressive sensing. Algorithms 8(4), 910–928 (2015)
Aziz, A., Osamy, W., Khedr, A.M.: Effective algorithm for optimizing compressive sensing in IoT and periodic monitoring applications. J. Netw. Comput. Appl. 126(15), 12–28 (2019)
Osamy, W., El-Sawy, A.A., Khedr, A.M.: Effective TDMA scheduling for data collection in tree based wireless sensor networks. Peer-to-Peer Netw. Appl. 13, 796–815 (2020). https://doi.org/10.1007/s12083-019-00818-z
Osamy, W., Salim, A., Khedr, A.M., El-Sawy, A.A.: IDCT: intelligent data collection technique for IoT-enabled heterogeneous wireless sensor networks in smart environments. IEEE Sens. J. 21(18), 21099–21112 (2021). https://doi.org/10.1109/JSEN.2021.3100339
Aziz, A., Singh, K., Osamy, W., et al.: An efficient compressive sensing routing scheme for internet of things based wireless sensor networks. Wireless Pers. Commun. 114, 1905–1925 (2020). https://doi.org/10.1007/s11277-020-07454-4
Aziz, A., Salim, A., Osamy, W.: Adaptive and efficient compressive sensing based technique for routing in wireless sensor networks. In: Proceedings of INTHITEN (IoT and its Enablers) (2014)
Huanan, Z., Suping, X., Jiannan, W.: Research on technology of wireless sensor network. In: Kountchev, R., Mahanti, A., Chong, S., Patnaik, S., Favorskaya, M. (eds.) Advances in Wireless Communications and Applications. SIST, vol. 190, pp. 109–114. Springer, Singapore (2021). https://doi.org/10.1007/978-981-15-5697-5_13
Losilla, F., Garcia-Sanchez, A.-J., Garcia-Sanchez, F., Garcia-Haro, J., Haas, Z.J.: A comprehensive approach to WSN-based ITS applications: a survey. Sensors 11(11), 10220–10265 (2011). https://doi.org/10.3390/s111110220
Haupt, J., Bajwa, W.U., Rabbat, M., Nowak, R.: Compressed sensing for networked data: a different approach to decentralized compression. IEEE Sig. Process. Mag. 25(2), 92101 (2008)
Ulusoy, A., Gurbuz, O., Onat, A.: Wireless model-based predictive networked control system over cooperative wireless network. IEEE Trans. Ind. Inf. 7(1), 4151 (2011)
Al-Kashoash, H.A., Kharrufa, H., Al-Nidawi, Y., Kemp, A.H.: Congestion control in wireless sensor and 6LoWPAN networks: toward the internet of things. Wireless Netw. 25(8), 4493–4522 (2018). https://doi.org/10.1007/s11276-018-1743-y
Rahmani, A.M., et al.: Exploiting smart e-health gateways at the edge of healthcare internet-of-things: a fog computing approach. Future Gener. Comput. Syst. 78, 641–658 (2018)
Dhumane, A.V., Prasad, R.S.: Multi-objective fractional gravitational search algorithm for energy efficient routing in IoT. Wireless Netw. 25(1), 399–413 (2019). https://doi.org/10.1007/s11276-017-1566-2
Palopoli, L., Passerone, R., Rizano, T.: Scalable offline optimization of industrial wireless sensor networks. IEEE Trans. Ind. Inf. 7(2), 328329 (2011)
Li, S., Xu, L., Wang, X.: Compressed sensing signal and data acquisition in wireless sensor networks and internet of things. IEEE Trans. Ind. Inf. 9(4), 2177–2186 (2013)
Kavitha, M., Geetha, B.G.: An efficient city energy management system with secure routing communication using WSN. Cluster Comput. 22, 13131–13142 (2019). https://doi.org/10.1007/s10586-017-1277-6
Osamy, W., Khedr, A.M., Salim, A., AlAli, A.I., El-Sawy, A.A.: Recent studies utilizing artificial intelligence techniques for solving data collection, aggregation and dissemination challenges in wireless sensor networks: a review. Electronics 11(3), 313 (2022). https://doi.org/10.3390/electronics11030313
Osamy, W., Khedr, A.M., Salim, A., Al Ali, A.I., El-Sawy, A.A.: A review on recent studies utilizing artificial intelligence methods for solving routing challenges in wireless sensor networks. Peer J. Comput. Sci. 8, e1089 (2022). https://doi.org/10.7717/peerj-cs.1089
Aziz, A., Osamy, W., Khedr, A.M., Salim, A.: Iterative selection and correction based adaptive greedy algorithm for compressive sensing reconstruction. J. King Saudi Univ. - Comput. Inf. Sci. 34(3), 892–900 (2022)
Dhulipala, V.R.S., Karthik, N.: Trust management technique in wireless sensor networks: challenges and issues for reliable communication: a review. CSI Trans. ICT 5(3), 281–294 (2017). https://doi.org/10.1007/s40012-017-0169-5
Fang, W., Zhang, W., Chen, W., Pan, T., Ni, Y., Yang, Y.: Trust-based attack and defense in wireless sensor networks: a survey. Wireless Commun. Mob. Comput. 2020, 1–20 (2020)
Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for internet of things. J. Netw. Comput. Appl. 42, 120–134 (2014)
Singh, S.K., Kumar, P., Singh, J.P.: A survey on successors of LEACH protocol. IEEE Access 5, 4298–4328 (2017). https://doi.org/10.1109/access.2017.2666082
Ren, P., Qian, J., Li, L., Zhao, Z., Li, X.: Unequal clustering scheme based LEACH for wireless sensor networks. In: 2010 Fourth International Conference on Genetic and Evolutionary Computing (2010). https://doi.org/10.1109/icgec.2010.30
Ouldzira, H., Lagraini, H., Mouhsen, A., Chhiba, M., Tabyaoui, A.: MG-LEACH: an enhanced leach protocol for wireless sensor network. Int. J. Electr. Comput. Eng. (IJECE). 9, 3139 (2019). https://doi.org/10.11591/ijece.v9i4.pp3139-3145
Abu Salem, A.O., Shudifat, N.: Enhanced LEACH protocol for increasing a lifetime of WSNs. Pers. Ubiquit. Comput. 23(5), 901–907 (2019). https://doi.org/10.1007/s00779-019-01205-4
Panchal, A., Singh, L., Singh, R. K.: RCH-LEACH: residual energy based cluster head selection in LEACH for wireless sensor networks (2020). https://doi.org/10.1109/ICE348803.2020.9122962
Daanoune, I., Baghdad, A., Ballouk, A.: Improved LEACH protocol for increasing the lifetime of WSNs. Int. J. Electr. Comput. Eng. (IJECE). p-ISSN 2088–8708, e-ISSN 2722–2578 (2020). https://doi.org/10.11591/ijece.v11i4.pp3106-3113
Rajeswari, A.R., Kulothungan, K., Ganapathy, S., Kannan, A.: Trusted energy aware cluster based routing using fuzzy logic for WSN in IoT. J. Intell. Fuzzy Syst. 40(5), 9197–9211 (2021). https://doi.org/10.3233/jifs-201633
Elsayed, W., Elhoseny, M., Sabbeh, S., Riad, A.: Self-maintenance model for wireless sensor networks. Comput. Electr. Eng. (2017). https://doi.org/10.1016/j.compeleceng.2017.12
Xiao-yun, W., Yang, L., Ke-fei, C.: SLEACH: secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks. Wuhan Univ. J. Nat. Sci. 10(1), 127–131 (2005). https://doi.org/10.1007/bf02828633
Oliveira, L.B., et al.: SecLEACH-on the security of clustered sensor networks. Sig. Process. 87(12), 2882–2895 (2007). https://doi.org/10.1016/j.sigpro.2007.05.016
Yin, J., Madria, S.K.: ESecRout: an energy efficient secure routing for sensor networks. Int. J. Distrib. Sens. Netw. 4, 67–82 (2008). https://doi.org/10.1080/15501320802001101
Elhoseny, M., Elminir, H., Riad, A., Yuan, X.: A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. J. King Saud Univ. - Sci. 28, 262–275 (2015). https://doi.org/10.1016/j.jksuci.2015.11.001
Reegan, A.S., Kabila, V.: Highly secured cluster based WSN using novel FCM and enhanced ECC-ElGamal encryption in IoT. Wireless Pers. Commun. 118(2), 1313–1329 (2021). https://doi.org/10.1007/s11277-021-08076-0
Ganesh, S., Amutha, R.: Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms. J. Commun. Netw. 15(4), 422–429 (2013). https://doi.org/10.1109/jcn.2013.000073
Huang, L., Li, J., Guizani, M.: Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(3), 750–761 (2014). https://doi.org/10.1109/tpds.2013.43
Elhoseny, M., Yuan, X., El-Minir, H.K., Riad, A.M.: An energy efficient encryption method for secure dynamic WSN. Secur. Commun. Netw. 9(13), 2024–2031 (2016). https://doi.org/10.1002/sec.1459
Jerusha, S., Kulothungan, K., Kannan, A.: Location aware cluster based routing in wireless sensor networks. Int. J. Comput. Commun. Technol. 36–41 (2015). https://doi.org/10.47893/IJCCT.2015.1271
Sahoo, R.R., Singh, M., Sardar, A.R., Mohapatra, S., Sarkar, S.K.: TREE-CR: trust based secure and energy efficient clustering in WSN. In: 2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN) (2013). https://doi.org/10.1109/ice-ccn.2013.6528557
Yan, L., Pan, Y., Zhang, J.: Trust cluster head election algorithm based on ant colony systems. In: 2010 Third International Joint Conference on Computational Science and Optimization (2010). https://doi.org/10.1109/cso.2010.205
Airehrour, D., Gutierrez, J., Ray, S.K.: GradeTrust: a secure trust based routing protocol for MANETs. In: 2015 International Telecommunication Networks and Applications Conference (ITNAC) (2015). https://doi.org/10.1109/atnac.2015.7366790
Wang, T., Zhang, G., Yang, X., Vajdi, A.: A trusted and energy efficient approach for cluster-based wireless sensor networks. Int. J. Distrib. Sens. Netw. 12(4), 3815834 (2016). https://doi.org/10.1155/2016/3815834
Priayoheswari, B., Kulothungan, K., Kannan, A.: beta reputation and direct trust model for secure communication in wireless sensor networks. In: Proceedings of the International Conference on Informatics and Analytics - ICIA-16 (2016). https://doi.org/10.1145/2980258.2980413
Ahmed, A., Bakar, K.A., Channa, M.I., Haseeb, K.: Countering node misbehavior attacks using trust based secure routing protocol. Telkomnika (Telecommun. Comput. Electr. Control). 13, 260–268 (2015). https://doi.org/10.12928/TELKOMNIKA.v13i1.1181
Silmi, S., Doukha, Z., Moussaoui, S.: A self-localization range free protocol for wireless sensor networks. Peer-to-Peer Netw. Appl. 14(4), 2061–2071 (2021). https://doi.org/10.1007/s12083-021-01155-w
Sabale, K., Mini, S.: Localization in wireless sensor networks with mobile anchor node path planning mechanism. Inf. Sci. 579, 648–666 (2021)
Lalama, Z., Boulfekhar, S., Semechedine, F.: Localization optimization in WSNs using meta-heuristics optimization algorithms: a survey. Wireless Pers. Commun. 1–24 (2021). https://doi.org/10.1007/s11277-021-08945-8
Gaber, T., Abdelwahab, S., Elhoseny, M., Hassanien, A.E.: Trust-based secure clustering in WSN-based intelligent transportation systems. Comput. Netw. 146, 151–158 (2018). https://doi.org/10.1016/j.comnet.2018.09.015
Rajesh, L., Mohan, H.S.: EPO based clustering and secure trust-based enhanced LEACH routing in WSN. In: Karrupusamy, P., Balas, V.E., Shi, Y. (eds.) Sustainable Communication Networks and Application. LNDECT, vol. 93, pp. 41–54. Springer, Singapore (2022). https://doi.org/10.1007/978-981-16-6605-6_3
Veerapaulraj, S., Karthikeyan, M., Sasipriya, S., Shanthi, A.S.: An optimized novel trust-based security mechanism using elephant herd optimization. Comput. Syst. Sci. Eng. 44(3), 2489–2500 (2023)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Osamy, W., Khedr, A.M., Salim, A., Aziz, A. (2023). TEDCTSSA: Trust Enabled Data Collection Technique Based Sparrow Search Algorithm for WSN-Based Applications. In: Koucheryavy, Y., Aziz, A. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2022. Lecture Notes in Computer Science, vol 13772. Springer, Cham. https://doi.org/10.1007/978-3-031-30258-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-031-30258-9_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-30257-2
Online ISBN: 978-3-031-30258-9
eBook Packages: Computer ScienceComputer Science (R0)