Research article Special Issues

Intelligent dynamic trust secure attacker detection routing for WSN-IoT networks


  • Received: 11 October 2022 Revised: 18 November 2022 Accepted: 25 November 2022 Published: 21 December 2022
  • Introduction

    IoT networks require a variety of safety systems, because of evolving new technologies. They are subject to assaults and require a variety of security solutions. Because of the sensor nodes' limited energy, compute capabilities and storage resources, identifying appropriate cryptography is critical in wireless sensor networks (WSN).

    Objective

    So, we need a new energy-aware routing method with an excellent cryptography-based security framework that fulfills critical IoT needs such as dependability, energy efficiency, attacker detection and data aggregation.

    Methods

    Intelligent dynamic trust secure attacker detection routing (IDTSADR) is a novel energy-aware routing method suggested for WSN-IoT networks. IDTSADR fulfills critical IoT needs such as dependability, energy efficiency, attacker detection and data aggregation. IDTSADR is an energy-efficient routing technique that discovers routes that use the least amount of energy for end-to-end packet traversal and improves malicious node detection. Our suggested algorithms take connection dependability into account to discover more reliable routes, as well as a goal of finding more energy-efficient routes and extending network lifespan by finding routes with nodes with greater battery charge levels. We presented a cryptography-based security framework for implementing the advanced encryption approach in IoT.

    Conclusion

    Improving the algorithm's encryption and decryption elements, which currently exist and provide outstanding security. From the below results, we can conclude that the proposed method surpasses the existing methods, this difference obviously prolonged the lifetime of the network.

    Citation: B. Kiruthika, Shyamala Bharathi P. Intelligent dynamic trust secure attacker detection routing for WSN-IoT networks[J]. Mathematical Biosciences and Engineering, 2023, 20(2): 4243-4257. doi: 10.3934/mbe.2023198

    Related Papers:

  • Introduction

    IoT networks require a variety of safety systems, because of evolving new technologies. They are subject to assaults and require a variety of security solutions. Because of the sensor nodes' limited energy, compute capabilities and storage resources, identifying appropriate cryptography is critical in wireless sensor networks (WSN).

    Objective

    So, we need a new energy-aware routing method with an excellent cryptography-based security framework that fulfills critical IoT needs such as dependability, energy efficiency, attacker detection and data aggregation.

    Methods

    Intelligent dynamic trust secure attacker detection routing (IDTSADR) is a novel energy-aware routing method suggested for WSN-IoT networks. IDTSADR fulfills critical IoT needs such as dependability, energy efficiency, attacker detection and data aggregation. IDTSADR is an energy-efficient routing technique that discovers routes that use the least amount of energy for end-to-end packet traversal and improves malicious node detection. Our suggested algorithms take connection dependability into account to discover more reliable routes, as well as a goal of finding more energy-efficient routes and extending network lifespan by finding routes with nodes with greater battery charge levels. We presented a cryptography-based security framework for implementing the advanced encryption approach in IoT.

    Conclusion

    Improving the algorithm's encryption and decryption elements, which currently exist and provide outstanding security. From the below results, we can conclude that the proposed method surpasses the existing methods, this difference obviously prolonged the lifetime of the network.



    加载中


    [1] G. Kaur, P. Chanak, M. Bhattacharya, Energy-efficient intelligent routing scheme for IoT-enabled WSNs, IEEE Internet Things J., 8 (2021), 11440–11449. https://doi.org/10.1109/JIOT.2021.3051768 doi: 10.1109/JIOT.2021.3051768
    [2] X. Zhang, H. M. Heys, C. Li, Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks, in 2010 25th Biennial Symposium on Communications, (2010), 168–172. https://doi.org/10.1109/BSC.2010.5472979
    [3] G. H. Kumar, G. P. Ramesh, C. R. Murthy, Energy efficient multi-hop routing techniques for cluster head selection in wireless sensor networks, in Further Advances in Internet of Things in Biomedical and Cyber Physical Systems, 193 (2021), 3–9. https://doi.org/10.1007/978-3-030-57835-0_1
    [4] M. Esmaeeli, S. A. H. Ghahroudi, Improving energy efficiency using a new game theory algorithm for wireless sensor networks, Int. J. Comput. Appl. Technol., 136 (2016), 1–4.
    [5] A. Shrestha, L. Xing, H. Liu, Modeling and evaluating the reliability of wireless sensor networks, in 2007 Annual Reliability and Maintainability Symposium, (2007) 186–191. https://doi.org/10.1109/RAMS.2007.328105
    [6] Y. Duan, W. Li, X. Fu, Y. Luo, L. Yang, A methodology for reliability of WSN based on software defined network in adaptive industrial environment, IEEE/CAA J. Autom. Sin., 5 (2018), 74–82. https://doi.org/10.1109/JAS.2017.7510751 doi: 10.1109/JAS.2017.7510751
    [7] K. Hemanth, G. P. Ramesh, Energy efficiency and Data packet security for wireless sensor networks using African Buffalo Optimization, Int. J. Control Automation, 13 (2020), 944–954.
    [8] L. Zhou, C. Ge, S. Hu, C. Su, Energy-efficient and privacy-preserving data aggregation algorithm for wireless sensor networks, IEEE Internet Things J., 7 (2020) 3948–3957. https://doi.org/10.1109/JIOT.2019.2959094 doi: 10.1109/JIOT.2019.2959094
    [9] R. Misra, C. Mandal, Ant-aggregation: ant colony algorithm for optimal data aggregation in wireless sensor networks, in 2006 IFIP International Conference on Wireless and Optical Communications Networks, (2006), 1–5. https://doi.org/10.1109/WOCN.2006.1666600
    [10] M. Ebrahim, C. W. Chong, Secure force: a low-complexity cryptographic algorithm for wireless sensor network (WSN), in 2013 IEEE International Conference on Control System, Computing and Engineering, (2013), 557–562. https://doi.org/10.1109/ICCSCE.2013.6720027
    [11] M. Rostami, K. Berahmand, E. Nasiri, S. Forouzandeh, Review of swarm intelligence-based feature selection methods, Eng. Appl. Artif. Intell., 100 (2021), 104210. https://doi.org/10.1016/j.engappai.2021.104210 doi: 10.1016/j.engappai.2021.104210
    [12] E. Nasiri, K. Berahmand, Y. Li, Robust graph regularization nonnegative matrix factorization for link prediction in attributed networks, Multimedia Tools Appl., (2022), 1–24. https://doi.org/10.1007/s11042-022-12943-8 doi: 10.1007/s11042-022-12943-8
    [13] J. von Mulert, I. Welch, W. K. G. Seah, Security threats and solutions in MANETs: A case study using AODV and SAODV, J. network comput. Appl., 35 (2012), 1249-1259. https://doi.org/10.1016/j.jnca.2012.01.019 doi: 10.1016/j.jnca.2012.01.019
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(953) PDF downloads(55) Cited by(0)

Article outline

Figures and Tables

Figures(7)  /  Tables(7)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog