Secure Routing using ISMO for Wireless Sensor Networks

International Journal of Computer Science and Engineering
© 2021 by SSRG - IJCSE Journal
Volume 8 Issue 12
Year of Publication : 2021
Authors : M.Supriya, Dr.T.Adilakshmi

pdf
How to Cite?

M.Supriya, Dr.T.Adilakshmi, "Secure Routing using ISMO for Wireless Sensor Networks," SSRG International Journal of Computer Science and Engineering , vol. 8,  no. 12, pp. 14-20, 2021. Crossref, https://doi.org/10.14445/23488387/IJCSE-V8I12P103

Abstract:

The Wireless Sensor Network (WSN) is a type of wireless ad hoc network that uses densely packed small sensor nodes to monitor environmental changes. WSN is made up of battery powered, low cost sensor nodes with limited communication and computing capabilities. The security and restricted energy of the sensors, on the other hand, are identified as key challenges that affect the WSN's performance. As a result, secure cluster-based routing must be developed in order to achieve secure data transmission while minimizing node energy consumption. The clustering and secure Cluster Head (CH) selection are achieved in this paper using the K-Means algorithm, and then secure network routing is done using the SMO, whose fitness function takes into account four different values: trust, residual,, energy, distance, and node degree. As a result, ISMO-WSN based secure cluster-based routing is used to avoid blackhole attacks during data transfer by reducing packet loss, Packet Delivery Ratio (PDR), Packet Loss Ratio (PLR), routing overhead, and the average energy consumption is used to evaluate the proposed ISMO-WSN.In addition, the ISMO-WSN is evaluated using an existing method called Secure Routing Protocol based on Multi objective Ant colony optimization (SRPMA). The ISMO-WSN approach has a Packet Loss Ratio (PLR) of 3.57 % for 10 blackhole nodes; the routing overhead of this ISMO method is 0.067J for 10 blackhole attacks. An average energy utilization of the ISMO-WSN method is 1.38 J for 10 blackhole nodes.

Keywords:

K-means clustering, ISMO-WSN (Improved spider monkey optimization-Wireless Sensor Network), trust, Blackhole attacks, packet delivery ratio, packet Loss ratio, Spider Monkey Optimization(SMO), SRPMA.

References:

[1] Kavidha, V. and Ananthakumaran, S., Novel energy-efficient secure routing protocol for wireless sensor networks with mobile sink. Peer-to-Peer Networking and Applications, 12(4) (2019) 881-892.
[2] Vijayalakshmi, V. and Senthilkumar, A., USCDRP: an unequal secure cluster-based distributed routing protocol for wireless sensor networks. The Journal of Supercomputing, 76(2) (2020) 989-1004.
[3] AlFarraj, O., AlZubi, A. and Tolba, A., Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, (2018) 1-11.
[4] Selvakumar, K., Sairamesh, L. and Kannan, A., An intelligent energy-aware secured algorithm for routing in wireless sensor
networks. Wireless Personal Communications, 96(3) (2017) 4781-4798.
[5] Azharuddin, M., Kuila, P. and Jana, P.K., Energy-efficient fault-tolerant clustering and routing algorithms for wireless sensor networks. Computers & Electrical Engineering, 41 (2015) 177-190.
[6] Rodrigues, P. and John, J., Joint trust: an approach for trust-aware routing in WSN. Wireless Networks, (2020) 1-16.
[7] Deepa, C. and Latha, B., HHSRP: a cluster-based hybrid hierarchical secure routing protocol for wireless sensor networks. Cluster Computing, 22(5) (2019) 10449-10465.
[8] Alghamdi, T.A., Secure and energy-efficient path optimization technique in wireless sensor networks using DH method. IEEE Access, 6 (2018) 53576-53582.
[9] Darabkh, K.A., Al-Maaitah, N.J., Jafar, I.F. and Ala’F, K., EA-CRP: a novel energy-aware clustering and routing protocol in wireless sensor networks. Computers & Electrical Engineering, 72 (2018) 702-718.
[10] Sureshkumar, C. and Sabena, S., Fuzzy-Based Secure Authentication and Clustering Algorithm for Improving the Energy Efficiency in Wireless Sensor Networks. Wireless Personal Communications, 112(3) (2020) 1517-1536.
[11] Logambigai, R., Ganapathy, S. and Kannan, A., Energy-efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Computers & Electrical Engineering, 68 (2018) 62-75.
[12] Rahayu, T.M., Lee, S.G. and Lee, H.J., A secure routing protocol for wireless sensor networks considering secure data aggregation. Sensors, 15(7) (2015) 15127-15158.
[13] Ye, Z., Wen, T., Liu, Z., Song, X. and Fu, C., A security fault-tolerant routing for multi-layer non-uniform clustered WSNs. EURASIP Journal on Wireless Communications and Networking, 2016(1) (2016) 1-12.
[14] Sharma, R., Vashisht, V. and Singh, U., eeTMFO/GA: a secure and energy-efficient cluster head selection in wireless sensor networks. Telecommunication Systems, (2020) 1-16.
[15] Sahoo, R.R., Sardar, A.R., Singh, M., Ray, S. and Sarkar, S.K., A bio-inspired and trust-based approach for clustering in WSN. Natural Computing, 15(3) (2016) 423-434.
[16] Pavani, M. and Rao, P.T., Adaptive PSO with optimized firefly algorithms for secure -cluster-based routing in wireless sensor networks. IET Wireless Sensor Systems, 9(5) (2019) 274-283.
[17] Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Nehemiah, H.K. and Kannan, A., An energy-aware trust-based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communications, 105(4) (2019) 1475-1490.
[18] Dhand, G. and Tyagi, S.S., SMEER: Secure multi-tier energy-efficient routing protocol for hierarchical wireless compared to the SRPMA 20 (2019).
[19] Shankar, A., Jaisankar, N., Khan, M.S., Patan, R. and Balamurugan,
B., A hybrid model for security-aware cluster head selection in wireless sensor networks. IET Wireless Sensor Systems, 9(2) (2018) 68-76.
[20] Sun, Z., Wei, M., Zhang, Z. and Qu, G., Secure Routing Protocol based on Multi-objective Ant-colony-optimization for wireless sensor networks. Applied Soft Computing, 77 (2019) 366-375.