Skip to main content

TEDCTSSA: Trust Enabled Data Collection Technique Based Sparrow Search Algorithm for WSN-Based Applications

  • Conference paper
  • First Online:
Internet of Things, Smart Spaces, and Next Generation Networks and Systems (NEW2AN 2022)

Abstract

Wireless sensor networks (WSNs) are typically used to monitor and detect diverse objects in realistic environments, where security remains a major concern. Estimating the trust between WSN nodes increases the security of the network, and so enhances node-to-node communication. Here, we introduce a Trust Enabled Data Delivery Technique based Sparrow Search Algorithm (SSA) for WSN-based applications (TEDCTSSA). In TEDCTSSA, a nature-inspired based SSA and secure cluster head (CH) selection method based on node’s trust value and energy is proposed. For the efficient selection of CH, our fitness function takes into account node remaining energy and trust value. The simulation results reveal that the suggested method is more energy-efficient, provides a longer average network lifetime, and selects the most trustworthy nodes than other works in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aziz, A., Osamy, W., Khedr, A.M., Singh, K.: Energy efficient scheme for data gathering in internet of things based heterogeneous wireless sensor networks. Wireless Pers. Commun. 114, 1905–1925 (2020). https://doi.org/10.1007/s11277-020-07454-4

    Article  Google Scholar 

  2. Osamy, W., El-sawy, A.A., Khedr, A.M.: SATC: a simulated annealing based tree construction and scheduling algorithm for minimizing aggregation time in wireless sensor networks. Wireless Pers. Commun. 108(2), 921–938 (2019). https://doi.org/10.1007/s11277-019-06440-9

    Article  Google Scholar 

  3. Khedr, A.M.: Effective data acquisition protocol for multi-hop heterogeneous wireless sensor networks using compressive sensing. Algorithms 8(4), 910–928 (2015)

    Article  Google Scholar 

  4. Aziz, A., Osamy, W., Khedr, A.M.: Effective algorithm for optimizing compressive sensing in IoT and periodic monitoring applications. J. Netw. Comput. Appl. 126(15), 12–28 (2019)

    Article  Google Scholar 

  5. Osamy, W., El-Sawy, A.A., Khedr, A.M.: Effective TDMA scheduling for data collection in tree based wireless sensor networks. Peer-to-Peer Netw. Appl. 13, 796–815 (2020). https://doi.org/10.1007/s12083-019-00818-z

    Article  Google Scholar 

  6. Osamy, W., Salim, A., Khedr, A.M., El-Sawy, A.A.: IDCT: intelligent data collection technique for IoT-enabled heterogeneous wireless sensor networks in smart environments. IEEE Sens. J. 21(18), 21099–21112 (2021). https://doi.org/10.1109/JSEN.2021.3100339

    Article  Google Scholar 

  7. Aziz, A., Singh, K., Osamy, W., et al.: An efficient compressive sensing routing scheme for internet of things based wireless sensor networks. Wireless Pers. Commun. 114, 1905–1925 (2020). https://doi.org/10.1007/s11277-020-07454-4

    Article  Google Scholar 

  8. Aziz, A., Salim, A., Osamy, W.: Adaptive and efficient compressive sensing based technique for routing in wireless sensor networks. In: Proceedings of INTHITEN (IoT and its Enablers) (2014)

    Google Scholar 

  9. Huanan, Z., Suping, X., Jiannan, W.: Research on technology of wireless sensor network. In: Kountchev, R., Mahanti, A., Chong, S., Patnaik, S., Favorskaya, M. (eds.) Advances in Wireless Communications and Applications. SIST, vol. 190, pp. 109–114. Springer, Singapore (2021). https://doi.org/10.1007/978-981-15-5697-5_13

    Chapter  Google Scholar 

  10. Losilla, F., Garcia-Sanchez, A.-J., Garcia-Sanchez, F., Garcia-Haro, J., Haas, Z.J.: A comprehensive approach to WSN-based ITS applications: a survey. Sensors 11(11), 10220–10265 (2011). https://doi.org/10.3390/s111110220

    Article  Google Scholar 

  11. Haupt, J., Bajwa, W.U., Rabbat, M., Nowak, R.: Compressed sensing for networked data: a different approach to decentralized compression. IEEE Sig. Process. Mag. 25(2), 92101 (2008)

    Article  Google Scholar 

  12. Ulusoy, A., Gurbuz, O., Onat, A.: Wireless model-based predictive networked control system over cooperative wireless network. IEEE Trans. Ind. Inf. 7(1), 4151 (2011)

    Article  Google Scholar 

  13. Al-Kashoash, H.A., Kharrufa, H., Al-Nidawi, Y., Kemp, A.H.: Congestion control in wireless sensor and 6LoWPAN networks: toward the internet of things. Wireless Netw. 25(8), 4493–4522 (2018). https://doi.org/10.1007/s11276-018-1743-y

    Article  Google Scholar 

  14. Rahmani, A.M., et al.: Exploiting smart e-health gateways at the edge of healthcare internet-of-things: a fog computing approach. Future Gener. Comput. Syst. 78, 641–658 (2018)

    Article  Google Scholar 

  15. Dhumane, A.V., Prasad, R.S.: Multi-objective fractional gravitational search algorithm for energy efficient routing in IoT. Wireless Netw. 25(1), 399–413 (2019). https://doi.org/10.1007/s11276-017-1566-2

    Article  Google Scholar 

  16. Palopoli, L., Passerone, R., Rizano, T.: Scalable offline optimization of industrial wireless sensor networks. IEEE Trans. Ind. Inf. 7(2), 328329 (2011)

    Article  Google Scholar 

  17. Li, S., Xu, L., Wang, X.: Compressed sensing signal and data acquisition in wireless sensor networks and internet of things. IEEE Trans. Ind. Inf. 9(4), 2177–2186 (2013)

    Article  Google Scholar 

  18. Kavitha, M., Geetha, B.G.: An efficient city energy management system with secure routing communication using WSN. Cluster Comput. 22, 13131–13142 (2019). https://doi.org/10.1007/s10586-017-1277-6

    Article  Google Scholar 

  19. Osamy, W., Khedr, A.M., Salim, A., AlAli, A.I., El-Sawy, A.A.: Recent studies utilizing artificial intelligence techniques for solving data collection, aggregation and dissemination challenges in wireless sensor networks: a review. Electronics 11(3), 313 (2022). https://doi.org/10.3390/electronics11030313

    Article  Google Scholar 

  20. Osamy, W., Khedr, A.M., Salim, A., Al Ali, A.I., El-Sawy, A.A.: A review on recent studies utilizing artificial intelligence methods for solving routing challenges in wireless sensor networks. Peer J. Comput. Sci. 8, e1089 (2022). https://doi.org/10.7717/peerj-cs.1089

    Article  Google Scholar 

  21. Aziz, A., Osamy, W., Khedr, A.M., Salim, A.: Iterative selection and correction based adaptive greedy algorithm for compressive sensing reconstruction. J. King Saudi Univ. - Comput. Inf. Sci. 34(3), 892–900 (2022)

    Google Scholar 

  22. Dhulipala, V.R.S., Karthik, N.: Trust management technique in wireless sensor networks: challenges and issues for reliable communication: a review. CSI Trans. ICT 5(3), 281–294 (2017). https://doi.org/10.1007/s40012-017-0169-5

    Article  Google Scholar 

  23. Fang, W., Zhang, W., Chen, W., Pan, T., Ni, Y., Yang, Y.: Trust-based attack and defense in wireless sensor networks: a survey. Wireless Commun. Mob. Comput. 2020, 1–20 (2020)

    Article  Google Scholar 

  24. Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for internet of things. J. Netw. Comput. Appl. 42, 120–134 (2014)

    Article  Google Scholar 

  25. Singh, S.K., Kumar, P., Singh, J.P.: A survey on successors of LEACH protocol. IEEE Access 5, 4298–4328 (2017). https://doi.org/10.1109/access.2017.2666082

    Article  Google Scholar 

  26. Ren, P., Qian, J., Li, L., Zhao, Z., Li, X.: Unequal clustering scheme based LEACH for wireless sensor networks. In: 2010 Fourth International Conference on Genetic and Evolutionary Computing (2010). https://doi.org/10.1109/icgec.2010.30

  27. Ouldzira, H., Lagraini, H., Mouhsen, A., Chhiba, M., Tabyaoui, A.: MG-LEACH: an enhanced leach protocol for wireless sensor network. Int. J. Electr. Comput. Eng. (IJECE). 9, 3139 (2019). https://doi.org/10.11591/ijece.v9i4.pp3139-3145

  28. Abu Salem, A.O., Shudifat, N.: Enhanced LEACH protocol for increasing a lifetime of WSNs. Pers. Ubiquit. Comput. 23(5), 901–907 (2019). https://doi.org/10.1007/s00779-019-01205-4

    Article  Google Scholar 

  29. Panchal, A., Singh, L., Singh, R. K.: RCH-LEACH: residual energy based cluster head selection in LEACH for wireless sensor networks (2020). https://doi.org/10.1109/ICE348803.2020.9122962

  30. Daanoune, I., Baghdad, A., Ballouk, A.: Improved LEACH protocol for increasing the lifetime of WSNs. Int. J. Electr. Comput. Eng. (IJECE). p-ISSN 2088–8708, e-ISSN 2722–2578 (2020). https://doi.org/10.11591/ijece.v11i4.pp3106-3113

  31. Rajeswari, A.R., Kulothungan, K., Ganapathy, S., Kannan, A.: Trusted energy aware cluster based routing using fuzzy logic for WSN in IoT. J. Intell. Fuzzy Syst. 40(5), 9197–9211 (2021). https://doi.org/10.3233/jifs-201633

    Article  Google Scholar 

  32. Elsayed, W., Elhoseny, M., Sabbeh, S., Riad, A.: Self-maintenance model for wireless sensor networks. Comput. Electr. Eng. (2017). https://doi.org/10.1016/j.compeleceng.2017.12

    Article  Google Scholar 

  33. Xiao-yun, W., Yang, L., Ke-fei, C.: SLEACH: secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks. Wuhan Univ. J. Nat. Sci. 10(1), 127–131 (2005). https://doi.org/10.1007/bf02828633

    Article  Google Scholar 

  34. Oliveira, L.B., et al.: SecLEACH-on the security of clustered sensor networks. Sig. Process. 87(12), 2882–2895 (2007). https://doi.org/10.1016/j.sigpro.2007.05.016

    Article  MATH  Google Scholar 

  35. Yin, J., Madria, S.K.: ESecRout: an energy efficient secure routing for sensor networks. Int. J. Distrib. Sens. Netw. 4, 67–82 (2008). https://doi.org/10.1080/15501320802001101

    Article  Google Scholar 

  36. Elhoseny, M., Elminir, H., Riad, A., Yuan, X.: A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. J. King Saud Univ. - Sci. 28, 262–275 (2015). https://doi.org/10.1016/j.jksuci.2015.11.001

    Article  Google Scholar 

  37. Reegan, A.S., Kabila, V.: Highly secured cluster based WSN using novel FCM and enhanced ECC-ElGamal encryption in IoT. Wireless Pers. Commun. 118(2), 1313–1329 (2021). https://doi.org/10.1007/s11277-021-08076-0

    Article  Google Scholar 

  38. Ganesh, S., Amutha, R.: Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms. J. Commun. Netw. 15(4), 422–429 (2013). https://doi.org/10.1109/jcn.2013.000073

    Article  Google Scholar 

  39. Huang, L., Li, J., Guizani, M.: Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(3), 750–761 (2014). https://doi.org/10.1109/tpds.2013.43

    Article  Google Scholar 

  40. Elhoseny, M., Yuan, X., El-Minir, H.K., Riad, A.M.: An energy efficient encryption method for secure dynamic WSN. Secur. Commun. Netw. 9(13), 2024–2031 (2016). https://doi.org/10.1002/sec.1459

    Article  Google Scholar 

  41. Jerusha, S., Kulothungan, K., Kannan, A.: Location aware cluster based routing in wireless sensor networks. Int. J. Comput. Commun. Technol. 36–41 (2015). https://doi.org/10.47893/IJCCT.2015.1271

  42. Sahoo, R.R., Singh, M., Sardar, A.R., Mohapatra, S., Sarkar, S.K.: TREE-CR: trust based secure and energy efficient clustering in WSN. In: 2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN) (2013). https://doi.org/10.1109/ice-ccn.2013.6528557

  43. Yan, L., Pan, Y., Zhang, J.: Trust cluster head election algorithm based on ant colony systems. In: 2010 Third International Joint Conference on Computational Science and Optimization (2010). https://doi.org/10.1109/cso.2010.205

  44. Airehrour, D., Gutierrez, J., Ray, S.K.: GradeTrust: a secure trust based routing protocol for MANETs. In: 2015 International Telecommunication Networks and Applications Conference (ITNAC) (2015). https://doi.org/10.1109/atnac.2015.7366790

  45. Wang, T., Zhang, G., Yang, X., Vajdi, A.: A trusted and energy efficient approach for cluster-based wireless sensor networks. Int. J. Distrib. Sens. Netw. 12(4), 3815834 (2016). https://doi.org/10.1155/2016/3815834

    Article  Google Scholar 

  46. Priayoheswari, B., Kulothungan, K., Kannan, A.: beta reputation and direct trust model for secure communication in wireless sensor networks. In: Proceedings of the International Conference on Informatics and Analytics - ICIA-16 (2016). https://doi.org/10.1145/2980258.2980413

  47. Ahmed, A., Bakar, K.A., Channa, M.I., Haseeb, K.: Countering node misbehavior attacks using trust based secure routing protocol. Telkomnika (Telecommun. Comput. Electr. Control). 13, 260–268 (2015). https://doi.org/10.12928/TELKOMNIKA.v13i1.1181

  48. Silmi, S., Doukha, Z., Moussaoui, S.: A self-localization range free protocol for wireless sensor networks. Peer-to-Peer Netw. Appl. 14(4), 2061–2071 (2021). https://doi.org/10.1007/s12083-021-01155-w

    Article  Google Scholar 

  49. Sabale, K., Mini, S.: Localization in wireless sensor networks with mobile anchor node path planning mechanism. Inf. Sci. 579, 648–666 (2021)

    Article  MathSciNet  Google Scholar 

  50. Lalama, Z., Boulfekhar, S., Semechedine, F.: Localization optimization in WSNs using meta-heuristics optimization algorithms: a survey. Wireless Pers. Commun. 1–24 (2021). https://doi.org/10.1007/s11277-021-08945-8

  51. Gaber, T., Abdelwahab, S., Elhoseny, M., Hassanien, A.E.: Trust-based secure clustering in WSN-based intelligent transportation systems. Comput. Netw. 146, 151–158 (2018). https://doi.org/10.1016/j.comnet.2018.09.015

    Article  Google Scholar 

  52. Rajesh, L., Mohan, H.S.: EPO based clustering and secure trust-based enhanced LEACH routing in WSN. In: Karrupusamy, P., Balas, V.E., Shi, Y. (eds.) Sustainable Communication Networks and Application. LNDECT, vol. 93, pp. 41–54. Springer, Singapore (2022). https://doi.org/10.1007/978-981-16-6605-6_3

  53. Veerapaulraj, S., Karthikeyan, M., Sasipriya, S., Shanthi, A.S.: An optimized novel trust-based security mechanism using elephant herd optimization. Comput. Syst. Sci. Eng. 44(3), 2489–2500 (2023)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmed Aziz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Osamy, W., Khedr, A.M., Salim, A., Aziz, A. (2023). TEDCTSSA: Trust Enabled Data Collection Technique Based Sparrow Search Algorithm for WSN-Based Applications. In: Koucheryavy, Y., Aziz, A. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2022. Lecture Notes in Computer Science, vol 13772. Springer, Cham. https://doi.org/10.1007/978-3-031-30258-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-30258-9_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-30257-2

  • Online ISBN: 978-3-031-30258-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics