Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Hemanand, D.a; * | Sridhar, P.b | Priya, C.c | Sathish Kumar, P.J.d
Affiliations: [a] Department of Computer Science and Engineering, S.A. Engineering College (Autonomous), Thiruverkadu, Chennai, Tamil Nadu, India | [b] Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering College, Coimbatore, Tamilnadu, India | [c] Department of Electronics and Communication Engineering, Karpagam College of Engineering, Coimbatore, Tamilnadu, India | [d] Department of Computer Science & Engineering, Panimalar Engineering College, Chennai, Tamilnadu, India
Correspondence: [*] Corresponding author. D. Hemanand, Department of Computer Science and Engineering, S.A. Engineering College (Autonomous), Poonamallee - Avadi Road, Thiruverkadu, Chennai-600077, Tamil Nadu, India. E-mail: [email protected].
Abstract: Wireless Sensor Networks are becoming increasingly popular in everyday life since they offer a variety of network structures for developing cutting-edge real-time applications. Wireless sensor devices have high energy consumption limitations, so it is necessary to handle excessive energy consumption by malicious nodes properly to improve network performance. Even though numerous studies have been conducted to increase the dependability of routing in WSNs, the existing routing strategies do not meet the required security constraints by using intelligent methods to protect the sensor nodes from malicious attack. To overcome this challenge a novel Trust Aware Clustering based Secure Routing Techniques (TAC-SRT) has been proposed to minimize the overall energy consumption, improved security to nodes and to maximize the network lifetime. The proposed method is carried out in three phases. In the first phase, the cluster head is selected by using K mean clustering. In the second phase, the trust value of each node is evaluated by using Mamdani fuzzy inference rule. In the third phase, the Tversky similarity index is used to find the normal or malicious node and establishes the shortest route. The Fully Homomorphic Elliptic Curve Cryptography technique is then used to perform secure data transmission. The effectiveness of the proposed strategy is examined using several parameters, such as the lifetime of the network, data confidentiality, active nodes, and energy consumption. The proposed technique improves the network lifetime by 23.01%, 17.4%, and 13.2% better than MOSFA, SecDL, and CAR-MOSOA respectively. Finally, the proposed method demonstrated superior performance in terms of delay, throughput, encryption time, network lifetime, and packet delivery ratio compared with existing techniques.
Keywords: Secure routing, fuzzy inference system, wireless sensor network, tversky similarity index, cluster head selection
DOI: 10.3233/JIFS-223197
Journal: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8785-8800, 2023
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]