Skip to main content

Advertisement

Log in

RETRACTED ARTICLE: An intelligent cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) for securing wireless sensor network (WSN)

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

This article was retracted on 30 May 2022

This article has been updated

Abstract

Wireless sensor networks (WSNs) have a significant number of sensing nodes with computing and communication resources for data transmission. Many essential aspects such as computational power, storage capability, and energy consumption must be taken into account to use WSNs for data transmission. Previous research work developed a cross layer security based intrusion detection system (CLS-IDS) framework that has improved network performance, minimal energy consumption and to prolong network life, meeting QoS requirements. However, this CLS-IDS method cannot detect the faults happening at various places at the same time. So, this research work proposes the cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) and also least overhead monitoring for WSNs by means of memory and energy demands to resolve the above issue. This cross-layer security was designed with the aid of a fuzzy logic-based calculation method for a protocol called cross-layer protocol, uses multiple parameters extracted by the exchange of inter-layer information in order to alleviate the effects of security hazards to the network of wireless sensors. In order to identify malicious nodes on the network, the fault monitoring system is carried out using enhanced convolutional neural network (ECNN) classifier and the confidential value is determined for the trust values. The proposed cross layer security based fuzzy trust mechanism (CLS-FLTCM) is highly efficient technique to ensure optimum safety in wireless sensor environment when compared to the previous techniques. The simulation results conducted using the NS-2 simulator and testing the safety performance of the proposed system demonstrates that this approach is better than the current detection precision techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Change history

References

  • Anita X, Bhagyaveni MA, Manickam J (2014) Fuzzy-based trust prediction model for routing in WSNs. Sci World J 1–12.

    Article  Google Scholar 

  • Su W, Lim TL (2006) Cross-layer design and optimization for wireless sensor networks. IEEE, Boston

    Google Scholar 

  • Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06), pp. 278–284.

  • Liu S, Bai Y, Sha M, Deng Q, Qian D (2008) CLEEP: a novel cross-layer energy-efficient protocol for wireless sensor networks. IEEE International Conference on Wireless Communications, Networking and Mobile Computing, pp 1–4

  • Khan S, Loo KK, Din ZU (2009) Cross layer design for routing and security in multi-hop wireless networks. J Inf Assur Sec 4(2):170–173

    Google Scholar 

  • Rajaram A, Palaniswami DS (2009) A trust based cross layer security protocol for mobile ad hoc networks. Int J Comput Sci Inf Sec 6(1):165–172

    Google Scholar 

  • Sharma K, Ghose MK (2011) Cross layer security framework for wireless sensor networks. Int J Sec Its Appl 5(1):39–52

    Google Scholar 

  • Gawdan IS, Chow CO, Zia T, Gawdan QI (2011) Cross-layer based security solutions for wireless sensor networks. Int J Phys Sci 6(17):4245–4254

    Google Scholar 

  • Devi CD, Vidya K (2019) A survey on cross-layer design approach for secure wireless sensor networks. International conference on innovative computing and communications, pp 43–59

  • Goud NK, Ponsam JG (2018) An efficient trust based cross layer protocol for wireless sensor networks. Int J Pure Appl Math 118(20):343–357

    Google Scholar 

  • AlFarraj O, AlZubi A, Tolba A (2018) Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. J Ambient Intell Humaniz Comput 4:1–11

    Google Scholar 

  • Asim M, Mokhtar H, Merabti M (2010) A self-managing fault management mechanism for wireless sensor networks. Int J Wirel Mob Netw (IJWMN) 2(4):184–197

    Article  Google Scholar 

  • Akbari A, Dana A, Khademzadeh A, Beikmahdavi N (2011) Fault detection and recovery in wireless sensor network using clustering. Int J Wirel Mob Netw (IJWMN) 3(1):130–138

    Article  Google Scholar 

  • Gandhimathi L, Murugaboopathi G (2016) Cross layer intrusion detection and prevention of multiple attacks in Wireless Sensor Network using Mobile agent. IEEE international conference on information communication and embedded systems (ICICES), pp 1–5

  • Puri S, Tripathi SP (2012) Dynamic high level cross layer security mechanisms for wireless sensor networks. Int J Inf Technol Comput Sci (IJITCS) 4(6):45–56

    Google Scholar 

  • Alrajeh NA, Khan S, Lloret J, Loo J (2013) Secure routing protocol using cross-layer design and energy harvesting in wireless sensor networks. Int J Distrib Sens Netw 9(1):1–11

    Article  Google Scholar 

  • Rahhal HA, Ali IA, Shaheen SI (2011) A novel trust-based cross-layer model for wireless sensor networks. IEEE National radio science conference (NRSC), pp 1–10.

  • Deng H, Yang Y, Jin G, Xu R, Shi W (2010) Building a trust-aware dynamic routing solution for wireless sensor networks. IEEE Globecom Workshops, pp. 153–157

  • Bhuiyan MZA, Wang G, Cao J, Wu J (2013) Deploying wireless sensor networks with fault-tolerance for structural health monitoring. IEEE Trans Comput 64(2):382–395

    Article  MathSciNet  Google Scholar 

  • Geeta DD, Nalini N, Biradar RC (2013) Fault tolerance in wireless sensor network using hand-off and dynamic power adjustment approach. J Netw Comput Appl 36(4):1174–1185

    Article  Google Scholar 

  • Chen X, Kim YA, Wang B, Wei W, Shi ZJ, Song Y (2012) Fault-tolerant monitor placement for out-of-band wireless sensor network monitoring. Ad Hoc Netw 10(1):62–74

    Article  Google Scholar 

  • Liu TH, Yi SC, Wang XW (2013) A fault management protocol for low-energy and efficient wireless sensor networks. J Inf Hiding Multimedia Signal Process 4(1):34–45

    Google Scholar 

  • Khan MZ, Merabti M, Askwith B, Bouhafs F (2010) A fault-tolerant network management architecture for wireless sensor networks. Annual PGNet conference. At Liverpool John Moores University, UK, pp 1–6

  • Akyildiz IF, Vuran MC, Akan OB (2006) A cross-layer protocol for wireless sensor networks. Annual conference on information sciences and systems, pp 1102–1107

  • Alnasser A, Sun H (2017) A fuzzy logic trust model for secure routing in smart grid networks. IEEE Access 5:17896–17903

    Article  Google Scholar 

  • Jiang P (2009) A new method for node fault detection in wireless sensor networks. Sensors 9(2):1282–1294

    Article  Google Scholar 

  • Hou L, Bergmann NW (2012) Novel industrial wireless sensor networks for machine condition monitoring and fault diagnosis. IEEE Trans Instrum Meas 61(10):2787–2798

    Article  Google Scholar 

  • Schmidhuber J (2015) Deep learning in neural networks: an overview. Neural Netw 61:85–117

    Article  Google Scholar 

  • Kumar A, Pais AR (2019) A new combinatorial design based key pre-distribution scheme for wireless sensor networks. J Ambient Intell Humaniz Comput 10(6):2401–2416

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. S. Sumalatha.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s12652-022-03974-y

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sumalatha, M.S., Nandalal, V. RETRACTED ARTICLE: An intelligent cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) for securing wireless sensor network (WSN). J Ambient Intell Human Comput 12, 4559–4573 (2021). https://doi.org/10.1007/s12652-020-01834-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-01834-1

Keywords

Navigation