Develop a Novel Weighed Quantum Ant Lion Optimization Algorithm to Enhance Security Mechanisms in Wireless Sensor Networks

International Journal of Electronics and Communication Engineering |
© 2025 by SSRG - IJECE Journal |
Volume 12 Issue 7 |
Year of Publication : 2025 |
Authors : A. Arivuselvi, C. Kalaiselvi |
How to Cite?
A. Arivuselvi, C. Kalaiselvi, "Develop a Novel Weighed Quantum Ant Lion Optimization Algorithm to Enhance Security Mechanisms in Wireless Sensor Networks," SSRG International Journal of Electronics and Communication Engineering, vol. 12, no. 7, pp. 246-261, 2025. Crossref, https://doi.org/10.14445/23488549/IJECE-V12I7P120
Abstract:
Wireless Sensor Networks (WSNs) are being employed in security-sensitive applications; hence, they have become subjects of several security attacks comprising Denial-of-Service (DoS) attacks, data eavesdropping and compromised nodes. To overcome these challenges, researchers have introduced a new type of approach, which is Weighed Quantum Ant Lion Optimization (WQALO), to heighten security in clustered WSN. Its aim is to successfully detect and address these security vulnerability issues within numerous clusters by taking advantage of the adaptability and robustness of natural optimization techniques. This approach has integrated quantum features into the Ant Lion Optimization approach, and through this, it improves its global search capacity and guarantees convergence to optimal solutions in less time. In every cluster, the important security issues concerned with the data confidentiality, node authorization and energy consumption are weighted by taking a weighted approach. Through WQALO implementation, clusters will be able to cooperate to measure security threats and reduce them, increasing the usage of resources and network resilience. Studies of the WQALO method proposed indicate an improvement of 25% in DoS attack defense, 30% in the interception of data, a 20% reduction in vulnerability attacks on nodes and an 18% enhancement in power consumption compared to the currently used security mechanisms. The above results illustrate that WQALO performs well in developing strong and secure clustered WSN systems that can resist advanced cyberattacks and also guarantee the integrity and reliability of information sent in critical applications.
Keywords:
Wireless Sensor Networks, Weighed Quantum Ant Lion Optimization, Security mechanisms, Data interception, Node compromise, Denial-of-service attacks, Quantum optimization, Energy efficiency, Natural optimization processes, Network security.
References:
[1] M. Karthikeyan, D. Manimegalai, and Karthikeyan RajaGopal, “Firefly Algorithm Based WSN-IoT Security Enhancement with Machine Learning for Intrusion Detection,” Scientific Reports, vol. 14, no. 1, pp. 1-15, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Osamah Ahmed, “Enhancing Intrusion Detection in Wireless Sensor Networks through Machine Learning Techniques and Context Awareness Integration,” International Journal of Mathematics, Statistics, and Computer Science, vol. 2, pp. 244-258, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Shafiullah Khan, Muhammad Altaf Khan, and Noha Alnazzawi, “Artificial Neural Network-Based Mechanism to Detect Security Threats in Wireless Sensor Networks,” Sensors, vol. 24, no. 5, pp. 1-22, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Rifaqat Ali et al., “An Enhanced Three Factor Based Authentication Protocol Using Wireless Medical Sensor Networks for Healthcare Monitoring,” Journal of Ambient Intelligence and Humanized Computing, vol. 15, pp. 1165-1186, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[5] T.P. Latchoumi et al., “Develop New Algorithm To Improve Safety On WMSN In Health Disease Monitoring,” 2022 International Mobile and Embedded Technology Conference (MECON), Noida, India, pp. 357-362, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Mohammad Sirajuddin et al., “A Secure Framework Based On Hybrid Cryptographic Scheme and Trusted Routing to Enhance the QoS of a WSN,” Engineering, Technology & Applied Science Research, vol. 14, no. 4, pp. 15711-15716, 2024. [CrossRef] [Google Scholar] [Publisher Link]
[7] Wenfeng Huang et al., “ECC-Based Three-Factor Authentication and Key Agreement Scheme for Wireless Sensor Networks,” Scientific Reports, vol. 14, no. 1, pp. 1-20, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Mohamed H. Behiry, and Mohammed Aly, “Cyberattack Detection in Wireless Sensor Networks Using a Hybrid Feature Reduction Technique with AI and Machine Learning Methods,” Journal of Big Data, vol. 11, no. 1, pp. 1-39, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[9] B. Meenakshi, and D. Karunkuzhali, “Enhancing Cyber Security in WSN Using Optimized Self-Attention-Based Provisional Variational Auto-Encoder Generative Adversarial Network,” Computer Standards & Interfaces, vol. 88, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Osama A. Khashan et al., “Innovative Energy-Efficient Proxy Re-Encryption for Secure Data Exchange in Wireless Sensor Networks,” IEEE Access, vol. 12, pp. 23290-23304, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Yazeed Yasin Ghadi et al., “Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review,” IEEE Access, vol. 12, pp. 12699-12719, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Asad Ali et al., “Enhanced Fuzzy Logic Zone Stable Election Protocol for Cluster Head Election (E-FLZSEPFCH) and Multipath Routing in wireless sensor networks,” Ain Shams Engineering Journal, vol. 15, no. 2, pp. 1-40, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[13] T.P. Latchoumi et al., A Framework for Low Energy Application Devices Using Blockchain-Enabled IoT in WSNs, Integrating Blockchain and Artificial Intelligence for Industry 4.0 Innovations, Springer, Cham, pp. 121-132, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] K.P. Uvarajan, “Integration of Blockchain Technology with Wireless Sensor Networks for Enhanced IoT Security,” Journal of Wireless Sensor Networks and IoT, vol. 1, no. 1, pp. 15-18, 2024.
[Google Scholar]
[15] Dipak W. Wajgi, and Jitendra V. Tembhurne, “Localization in Wireless Sensor Networks and Wireless Multimedia Sensor Networks Using Clustering Techniques,” Multimedia Tools and Applications, vol. 83, pp. 6829-6879, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[16] T.P. Latchoumi et al., “Secured Smart Manufacturing Systems Using Blockchain Technology for Industry 4.0,” Integrating Blockchain and Artificial Intelligence for Industry 4.0 Innovations, Springer, Cham, pp. 281-294, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] S. Ramalingam et al., “Performance Enhancement of Efficient Clustering and Routing Protocol for Wireless Sensor Networks Using Improved Elephant Herd Optimization Algorithm,” Wireless Networks, vol. 30, pp. 1773-1789, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[18] S. Rajasoundaran et al., “Secure and Optimized Intrusion Detection Scheme Using LSTM-MAC Principles for Underwater Wireless Sensor Networks,” Wireless Networks, vol. 30, pp. 209-231, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Syed Muhammad Salman Bukhari et al., “Secure and Privacy-Preserving Intrusion Detection in Wireless Sensor Networks: Federated Learning with SCNN-Bi-LSTM for Enhanced Reliability,” Ad Hoc Networks, vol. 155, pp. 1-18, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Jayant Y. Hande, and Ritesh Sadiwala, “Data Security-Based Routing in MANETs Using Key Management Mechanism,” SN Computer Science, vol. 5, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Ali Darch Abed Dawar, “Enhancing Wireless Security and Privacy: A 2-Way Identity Authentication Method for 5G Networks,” International Journal of Mathematics, Statistics, and Computer Science, vol. 2, pp. 183-198, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Tuka Kareem Jebur, “Securing Wireless Sensor Networks, Types of Attacks, and Detection/Prevention Techniques, An Educational Perspective,” ASEAN Journal of Science and Engineering Education, vol. 4, no. 1, pp. 43-50, 2024.
[Google Scholar] [Publisher Link]
[23] Ibrahim Altarawni et al., “Enhancing Cloud Security Based on the Kyber key Encapsulation Mechanism,” Journal of Theoretical and Applied Information Technology, vol. 102, no. 4, pp. 1643-1651, 2024.
[Google Scholar] [Publisher Link]
[24] K. Venkatesan, and Syarifah Bahiyah Rahayu, “Blockchain Security Enhancement: An Approach towards Hybrid Consensus Algorithms and Machine Learning Techniques,” Scientific Reports, vol. 14, no. 1, pp. 1-24, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Saleh Almasabi et al., “Securing Smart Grid Data with Blockchain and Wireless Sensor Networks: A Collaborative Approach,” IEEE Access, vol. 12, pp. 19181-19198, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Laxminarayan Sahoo et al., “Improvement of Wireless Sensor Network Lifetime via Intelligent Clustering Under Uncertainty,” IEEE Access, vol. 12, pp. 25018-25033, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Tesfahunegn Minwuyelet Mengistu, Taewoon Kim, and Jenn-Wei Lin, “A Survey on Heterogeneity Taxonomy, Security and Privacy Preservation in the Integration of IoT, Wireless Sensor Networks and Federated Learning,” Sensors, vol. 24, no. 3, pp. 1-48, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Ravi Kumar et al., “A Robust and Secure User Authentication Scheme Based on Multifactor and Multi‐Gateway in IoT Enabled Sensor Networks,” Security and Privacy, vol. 7, no. 1, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[29] I. Surenther, K.P. Sridhar, and Michaelraj Kingston Roberts, “Enhancing Data Transmission Efficiency in Wireless Sensor Networks through Machine Learning-Enabled Energy Optimization: A Grouping Model Approach,” Ain Shams Engineering Journal, vol. 15, no. 4, pp. 1-14, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Dattatraya Arun Jadhav et al., “An Enhanced Routing Protocol Design to Perform Cost Efficient Data Communication over Wireless Sensor Networks,” 2024 3rd International Conference on Applied Artificial Intelligence and Computing, Salem, India, pp. 1588-1594, 2024.
[CrossRef] [Google Scholar] [Publisher Link]