Abstract
Wireless sensor networks (WSNs) have a significant number of sensing nodes with computing and communication resources for data transmission. Many essential aspects such as computational power, storage capability, and energy consumption must be taken into account to use WSNs for data transmission. Previous research work developed a cross layer security based intrusion detection system (CLS-IDS) framework that has improved network performance, minimal energy consumption and to prolong network life, meeting QoS requirements. However, this CLS-IDS method cannot detect the faults happening at various places at the same time. So, this research work proposes the cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) and also least overhead monitoring for WSNs by means of memory and energy demands to resolve the above issue. This cross-layer security was designed with the aid of a fuzzy logic-based calculation method for a protocol called cross-layer protocol, uses multiple parameters extracted by the exchange of inter-layer information in order to alleviate the effects of security hazards to the network of wireless sensors. In order to identify malicious nodes on the network, the fault monitoring system is carried out using enhanced convolutional neural network (ECNN) classifier and the confidential value is determined for the trust values. The proposed cross layer security based fuzzy trust mechanism (CLS-FLTCM) is highly efficient technique to ensure optimum safety in wireless sensor environment when compared to the previous techniques. The simulation results conducted using the NS-2 simulator and testing the safety performance of the proposed system demonstrates that this approach is better than the current detection precision techniques.
Similar content being viewed by others
Change history
30 May 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s12652-022-03974-y
References
Anita X, Bhagyaveni MA, Manickam J (2014) Fuzzy-based trust prediction model for routing in WSNs. Sci World J 1–12.
Su W, Lim TL (2006) Cross-layer design and optimization for wireless sensor networks. IEEE, Boston
Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06), pp. 278–284.
Liu S, Bai Y, Sha M, Deng Q, Qian D (2008) CLEEP: a novel cross-layer energy-efficient protocol for wireless sensor networks. IEEE International Conference on Wireless Communications, Networking and Mobile Computing, pp 1–4
Khan S, Loo KK, Din ZU (2009) Cross layer design for routing and security in multi-hop wireless networks. J Inf Assur Sec 4(2):170–173
Rajaram A, Palaniswami DS (2009) A trust based cross layer security protocol for mobile ad hoc networks. Int J Comput Sci Inf Sec 6(1):165–172
Sharma K, Ghose MK (2011) Cross layer security framework for wireless sensor networks. Int J Sec Its Appl 5(1):39–52
Gawdan IS, Chow CO, Zia T, Gawdan QI (2011) Cross-layer based security solutions for wireless sensor networks. Int J Phys Sci 6(17):4245–4254
Devi CD, Vidya K (2019) A survey on cross-layer design approach for secure wireless sensor networks. International conference on innovative computing and communications, pp 43–59
Goud NK, Ponsam JG (2018) An efficient trust based cross layer protocol for wireless sensor networks. Int J Pure Appl Math 118(20):343–357
AlFarraj O, AlZubi A, Tolba A (2018) Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. J Ambient Intell Humaniz Comput 4:1–11
Asim M, Mokhtar H, Merabti M (2010) A self-managing fault management mechanism for wireless sensor networks. Int J Wirel Mob Netw (IJWMN) 2(4):184–197
Akbari A, Dana A, Khademzadeh A, Beikmahdavi N (2011) Fault detection and recovery in wireless sensor network using clustering. Int J Wirel Mob Netw (IJWMN) 3(1):130–138
Gandhimathi L, Murugaboopathi G (2016) Cross layer intrusion detection and prevention of multiple attacks in Wireless Sensor Network using Mobile agent. IEEE international conference on information communication and embedded systems (ICICES), pp 1–5
Puri S, Tripathi SP (2012) Dynamic high level cross layer security mechanisms for wireless sensor networks. Int J Inf Technol Comput Sci (IJITCS) 4(6):45–56
Alrajeh NA, Khan S, Lloret J, Loo J (2013) Secure routing protocol using cross-layer design and energy harvesting in wireless sensor networks. Int J Distrib Sens Netw 9(1):1–11
Rahhal HA, Ali IA, Shaheen SI (2011) A novel trust-based cross-layer model for wireless sensor networks. IEEE National radio science conference (NRSC), pp 1–10.
Deng H, Yang Y, Jin G, Xu R, Shi W (2010) Building a trust-aware dynamic routing solution for wireless sensor networks. IEEE Globecom Workshops, pp. 153–157
Bhuiyan MZA, Wang G, Cao J, Wu J (2013) Deploying wireless sensor networks with fault-tolerance for structural health monitoring. IEEE Trans Comput 64(2):382–395
Geeta DD, Nalini N, Biradar RC (2013) Fault tolerance in wireless sensor network using hand-off and dynamic power adjustment approach. J Netw Comput Appl 36(4):1174–1185
Chen X, Kim YA, Wang B, Wei W, Shi ZJ, Song Y (2012) Fault-tolerant monitor placement for out-of-band wireless sensor network monitoring. Ad Hoc Netw 10(1):62–74
Liu TH, Yi SC, Wang XW (2013) A fault management protocol for low-energy and efficient wireless sensor networks. J Inf Hiding Multimedia Signal Process 4(1):34–45
Khan MZ, Merabti M, Askwith B, Bouhafs F (2010) A fault-tolerant network management architecture for wireless sensor networks. Annual PGNet conference. At Liverpool John Moores University, UK, pp 1–6
Akyildiz IF, Vuran MC, Akan OB (2006) A cross-layer protocol for wireless sensor networks. Annual conference on information sciences and systems, pp 1102–1107
Alnasser A, Sun H (2017) A fuzzy logic trust model for secure routing in smart grid networks. IEEE Access 5:17896–17903
Jiang P (2009) A new method for node fault detection in wireless sensor networks. Sensors 9(2):1282–1294
Hou L, Bergmann NW (2012) Novel industrial wireless sensor networks for machine condition monitoring and fault diagnosis. IEEE Trans Instrum Meas 61(10):2787–2798
Schmidhuber J (2015) Deep learning in neural networks: an overview. Neural Netw 61:85–117
Kumar A, Pais AR (2019) A new combinatorial design based key pre-distribution scheme for wireless sensor networks. J Ambient Intell Humaniz Comput 10(6):2401–2416
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s12652-022-03974-y
About this article
Cite this article
Sumalatha, M.S., Nandalal, V. RETRACTED ARTICLE: An intelligent cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) for securing wireless sensor network (WSN). J Ambient Intell Human Comput 12, 4559–4573 (2021). https://doi.org/10.1007/s12652-020-01834-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-01834-1