Adaptive Clustering and Trust Aware Routing (ACTAR) for Wireless Sensor Networks in IoT Environments

IF 1.7 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC
Vadala Nagamani, K. Annapurna
{"title":"Adaptive Clustering and Trust Aware Routing (ACTAR) for Wireless Sensor Networks in IoT Environments","authors":"Vadala Nagamani,&nbsp;K. Annapurna","doi":"10.1002/dac.6083","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The Internet of Things (IoT) has emerged as a revolutionary technology, connecting a vast number of people to the internet through various devices such as smartphones, laptops, sensors, and more. An essential component of IoT, the wireless sensor network (WSN), enables automation in processes like sensing, node monitoring, and data transmission. However, the full potential of IoT is hindered by cyber threats and unreliable communication. Although several security algorithms exist, they are not suitable for energy-constrained sensor nodes. To address this issue, this paper proposes an energy-efficient security mechanism called adaptive clustering and trust aware routing (ACTAR) for IoT-WSNs. ACTAR operates in three phases: adaptive and hybrid clustering (AHC), multiobjective function-based cluster head selection (MOCH), and trust aware routing (TAR). First, AHC utilizes a nonuniform clustering mechanism to categorize the network into nearby and distant clusters. Next, the selection of cluster heads is based on four metrics: coverage, communication cost, residual energy, and node proximity. Finally, TAR calculates the trust degree of sensor nodes by evaluating their direct and indirect behavior in terms of communication interactions and energy consumption. The node with the highest trust degree is selected as the next-hop forwarding node, followed by the route with the highest trust degree. Extensive simulations of ACTAR demonstrate its performance in terms of malicious detection rate, false-positive rate, residual energy, and packet delivery ratio. Comparative analysis shows that ACTAR outperforms existing methods, proving its superiority.</p>\n </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 2","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2024-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Communication Systems","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/dac.6083","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things (IoT) has emerged as a revolutionary technology, connecting a vast number of people to the internet through various devices such as smartphones, laptops, sensors, and more. An essential component of IoT, the wireless sensor network (WSN), enables automation in processes like sensing, node monitoring, and data transmission. However, the full potential of IoT is hindered by cyber threats and unreliable communication. Although several security algorithms exist, they are not suitable for energy-constrained sensor nodes. To address this issue, this paper proposes an energy-efficient security mechanism called adaptive clustering and trust aware routing (ACTAR) for IoT-WSNs. ACTAR operates in three phases: adaptive and hybrid clustering (AHC), multiobjective function-based cluster head selection (MOCH), and trust aware routing (TAR). First, AHC utilizes a nonuniform clustering mechanism to categorize the network into nearby and distant clusters. Next, the selection of cluster heads is based on four metrics: coverage, communication cost, residual energy, and node proximity. Finally, TAR calculates the trust degree of sensor nodes by evaluating their direct and indirect behavior in terms of communication interactions and energy consumption. The node with the highest trust degree is selected as the next-hop forwarding node, followed by the route with the highest trust degree. Extensive simulations of ACTAR demonstrate its performance in terms of malicious detection rate, false-positive rate, residual energy, and packet delivery ratio. Comparative analysis shows that ACTAR outperforms existing methods, proving its superiority.

Abstract Image

物联网环境下无线传感器网络的自适应聚类和信任感知路由(ACTAR)
物联网(IoT)已经成为一项革命性的技术,通过智能手机、笔记本电脑、传感器等各种设备将大量的人连接到互联网上。作为物联网的重要组成部分,无线传感器网络(WSN)可以实现传感、节点监控和数据传输等过程的自动化。然而,物联网的全部潜力受到网络威胁和不可靠通信的阻碍。虽然存在一些安全算法,但它们都不适合能量受限的传感器节点。为了解决这一问题,本文提出了一种高效节能的物联网wsn安全机制——自适应集群和信任感知路由(ACTAR)。ACTAR分为三个阶段:自适应和混合聚类(AHC)、基于多目标函数的簇头选择(MOCH)和信任感知路由(TAR)。首先,AHC利用非均匀聚类机制将网络划分为近簇和远簇。接下来,簇头的选择基于四个指标:覆盖率、通信成本、剩余能量和节点接近度。最后,TAR通过评估传感器节点在通信交互和能量消耗方面的直接和间接行为来计算信任程度。选择信任度最高的节点作为下一跳转发节点,选择信任度最高的路由作为下一跳转发节点。大量的仿真实验证明了该算法在恶意检测率、误报率、剩余能量和包投递率等方面的性能。对比分析表明,ACTAR方法优于现有方法,证明了其优越性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
5.90
自引率
9.50%
发文量
323
审稿时长
7.9 months
期刊介绍: The International Journal of Communication Systems provides a forum for R&D, open to researchers from all types of institutions and organisations worldwide, aimed at the increasingly important area of communication technology. The Journal''s emphasis is particularly on the issues impacting behaviour at the system, service and management levels. Published twelve times a year, it provides coverage of advances that have a significant potential to impact the immense technical and commercial opportunities in the communications sector. The International Journal of Communication Systems strives to select a balance of contributions that promotes technical innovation allied to practical relevance across the range of system types and issues. The Journal addresses both public communication systems (Telecommunication, mobile, Internet, and Cable TV) and private systems (Intranets, enterprise networks, LANs, MANs, WANs). The following key areas and issues are regularly covered: -Transmission/Switching/Distribution technologies (ATM, SDH, TCP/IP, routers, DSL, cable modems, VoD, VoIP, WDM, etc.) -System control, network/service management -Network and Internet protocols and standards -Client-server, distributed and Web-based communication systems -Broadband and multimedia systems and applications, with a focus on increased service variety and interactivity -Trials of advanced systems and services; their implementation and evaluation -Novel concepts and improvements in technique; their theoretical basis and performance analysis using measurement/testing, modelling and simulation -Performance evaluation issues and methods.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信