{"title":"A hybrid heuristic-assisted deep learning for secured routing and malicious node detection in wireless sensor networks","authors":"Dingari Kalpana, P. Ajitha","doi":"10.1007/s12083-024-01735-6","DOIUrl":null,"url":null,"abstract":"<p>Diverse routing and security protocols are implemented to enhance the efficacy when performing the packet transmission, however, finding the optimal path is highly challenging since it reduces the transmission consistency over the sensor network. Here, the security is enhanced in Wireless Sensor Network (WSN) routing where a new meta-heuristic algorithm and deep learning framework are suggested. The designed WSN model consists of various models like trust model, routing model, clustering model, and energy efficient model. Moreover, in the trust model, malicious node or attack detection is done by “Bidirectional Long-Short Term Memory (Bi-LSTM) with Recurrent Neural Network (RNN)”. By selecting the optimal path, an energy-efficient routing is implemented for secure data transmission. Here, the secure routing is implemented through the hybrid optimization algorithm named Exploration-based Pelican Black Hole Optimization (E-PBHO). The overall performance is enhanced by evaluating the standard performance measures like alive and dead nodes, network lifetime, throughput, and energy consumption. Here, the developed model provides 92% and 93% in terms of accuracy and sensitivity. Thus, the empirical outcome of the suggested model offers superior performance over than the existing approaches.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"37 1","pages":""},"PeriodicalIF":3.3000,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Peer-To-Peer Networking and Applications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s12083-024-01735-6","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Diverse routing and security protocols are implemented to enhance the efficacy when performing the packet transmission, however, finding the optimal path is highly challenging since it reduces the transmission consistency over the sensor network. Here, the security is enhanced in Wireless Sensor Network (WSN) routing where a new meta-heuristic algorithm and deep learning framework are suggested. The designed WSN model consists of various models like trust model, routing model, clustering model, and energy efficient model. Moreover, in the trust model, malicious node or attack detection is done by “Bidirectional Long-Short Term Memory (Bi-LSTM) with Recurrent Neural Network (RNN)”. By selecting the optimal path, an energy-efficient routing is implemented for secure data transmission. Here, the secure routing is implemented through the hybrid optimization algorithm named Exploration-based Pelican Black Hole Optimization (E-PBHO). The overall performance is enhanced by evaluating the standard performance measures like alive and dead nodes, network lifetime, throughput, and energy consumption. Here, the developed model provides 92% and 93% in terms of accuracy and sensitivity. Thus, the empirical outcome of the suggested model offers superior performance over than the existing approaches.
期刊介绍:
The aim of the Peer-to-Peer Networking and Applications journal is to disseminate state-of-the-art research and development results in this rapidly growing research area, to facilitate the deployment of P2P networking and applications, and to bring together the academic and industry communities, with the goal of fostering interaction to promote further research interests and activities, thus enabling new P2P applications and services. The journal not only addresses research topics related to networking and communications theory, but also considers the standardization, economic, and engineering aspects of P2P technologies, and their impacts on software engineering, computer engineering, networked communication, and security.
The journal serves as a forum for tackling the technical problems arising from both file sharing and media streaming applications. It also includes state-of-the-art technologies in the P2P security domain.
Peer-to-Peer Networking and Applications publishes regular papers, tutorials and review papers, case studies, and correspondence from the research, development, and standardization communities. Papers addressing system, application, and service issues are encouraged.