Salsabil Adel, Raghda Samir, Irene Samy, T. Ismail
{"title":"Integrated Trust-Clustering and Dijkstra Routing Algorithms for Energy-Efficient WSNs","authors":"Salsabil Adel, Raghda Samir, Irene Samy, T. Ismail","doi":"10.1109/ConTEL58387.2023.10199013","DOIUrl":null,"url":null,"abstract":"Wireless Sensor Networks (WSNs) playa crucial role in various fields but are highly susceptible to external attacks, making the development of secure data aggregation methods in WSNs imperative. To enhance the security of WSNs, this study introduces a Trust-Based Clustering and Dijkstra-Based Routing algorithm (TBC-DBR). The proposed algorithm aims to establish a secure and efficient data aggregation mechanism in WSNs. It begins by dividing the sensor nodes into clusters, creating a structured network architecture. Within each cluster, the members undergo a three-phase trust evaluation process: direct trust, indirect trust, and overall trust. These trust metrics enable the selection of the most trustworthy node as the cluster head, ensuring reliable data aggregation and routing. To evaluate the effectiveness of the proposed algorithm, extensive simulations are performed using MATLAB R2022a. The simulation framework enables a comprehensive performance analysis, comparing the proposed TBC-DBR algorithm with the well-known LEACH algorithm. The evaluation focuses on critical performance metrics such as energy consumption and packet rate delivery throughout the network's lifetime. The results obtained from the simulations demonstrate the superiority of the proposed TBC-DBR algorithm. It exhibits lower energy consumption compared to the LEACH algorithm, indicating improved energy efficiency in the network. Moreover, the proposed algorithm achieves a higher packet rate delivery, emphasizing its effectiveness in maintaining reliable and timely data transmission within the network.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"1997 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 17th International Conference on Telecommunications (ConTEL)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ConTEL58387.2023.10199013","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Wireless Sensor Networks (WSNs) playa crucial role in various fields but are highly susceptible to external attacks, making the development of secure data aggregation methods in WSNs imperative. To enhance the security of WSNs, this study introduces a Trust-Based Clustering and Dijkstra-Based Routing algorithm (TBC-DBR). The proposed algorithm aims to establish a secure and efficient data aggregation mechanism in WSNs. It begins by dividing the sensor nodes into clusters, creating a structured network architecture. Within each cluster, the members undergo a three-phase trust evaluation process: direct trust, indirect trust, and overall trust. These trust metrics enable the selection of the most trustworthy node as the cluster head, ensuring reliable data aggregation and routing. To evaluate the effectiveness of the proposed algorithm, extensive simulations are performed using MATLAB R2022a. The simulation framework enables a comprehensive performance analysis, comparing the proposed TBC-DBR algorithm with the well-known LEACH algorithm. The evaluation focuses on critical performance metrics such as energy consumption and packet rate delivery throughout the network's lifetime. The results obtained from the simulations demonstrate the superiority of the proposed TBC-DBR algorithm. It exhibits lower energy consumption compared to the LEACH algorithm, indicating improved energy efficiency in the network. Moreover, the proposed algorithm achieves a higher packet rate delivery, emphasizing its effectiveness in maintaining reliable and timely data transmission within the network.