Adaptive Clustering and Trust Aware Routing (ACTAR) for Wireless Sensor Networks in IoT Environments

IF 1.7 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC
Vadala Nagamani, K. Annapurna
{"title":"Adaptive Clustering and Trust Aware Routing (ACTAR) for Wireless Sensor Networks in IoT Environments","authors":"Vadala Nagamani,&nbsp;K. Annapurna","doi":"10.1002/dac.6083","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The Internet of Things (IoT) has emerged as a revolutionary technology, connecting a vast number of people to the internet through various devices such as smartphones, laptops, sensors, and more. An essential component of IoT, the wireless sensor network (WSN), enables automation in processes like sensing, node monitoring, and data transmission. However, the full potential of IoT is hindered by cyber threats and unreliable communication. Although several security algorithms exist, they are not suitable for energy-constrained sensor nodes. To address this issue, this paper proposes an energy-efficient security mechanism called adaptive clustering and trust aware routing (ACTAR) for IoT-WSNs. ACTAR operates in three phases: adaptive and hybrid clustering (AHC), multiobjective function-based cluster head selection (MOCH), and trust aware routing (TAR). First, AHC utilizes a nonuniform clustering mechanism to categorize the network into nearby and distant clusters. Next, the selection of cluster heads is based on four metrics: coverage, communication cost, residual energy, and node proximity. Finally, TAR calculates the trust degree of sensor nodes by evaluating their direct and indirect behavior in terms of communication interactions and energy consumption. The node with the highest trust degree is selected as the next-hop forwarding node, followed by the route with the highest trust degree. Extensive simulations of ACTAR demonstrate its performance in terms of malicious detection rate, false-positive rate, residual energy, and packet delivery ratio. Comparative analysis shows that ACTAR outperforms existing methods, proving its superiority.</p>\n </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 2","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2024-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Communication Systems","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/dac.6083","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things (IoT) has emerged as a revolutionary technology, connecting a vast number of people to the internet through various devices such as smartphones, laptops, sensors, and more. An essential component of IoT, the wireless sensor network (WSN), enables automation in processes like sensing, node monitoring, and data transmission. However, the full potential of IoT is hindered by cyber threats and unreliable communication. Although several security algorithms exist, they are not suitable for energy-constrained sensor nodes. To address this issue, this paper proposes an energy-efficient security mechanism called adaptive clustering and trust aware routing (ACTAR) for IoT-WSNs. ACTAR operates in three phases: adaptive and hybrid clustering (AHC), multiobjective function-based cluster head selection (MOCH), and trust aware routing (TAR). First, AHC utilizes a nonuniform clustering mechanism to categorize the network into nearby and distant clusters. Next, the selection of cluster heads is based on four metrics: coverage, communication cost, residual energy, and node proximity. Finally, TAR calculates the trust degree of sensor nodes by evaluating their direct and indirect behavior in terms of communication interactions and energy consumption. The node with the highest trust degree is selected as the next-hop forwarding node, followed by the route with the highest trust degree. Extensive simulations of ACTAR demonstrate its performance in terms of malicious detection rate, false-positive rate, residual energy, and packet delivery ratio. Comparative analysis shows that ACTAR outperforms existing methods, proving its superiority.

Abstract Image

求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
5.90
自引率
9.50%
发文量
323
审稿时长
7.9 months
期刊介绍: The International Journal of Communication Systems provides a forum for R&D, open to researchers from all types of institutions and organisations worldwide, aimed at the increasingly important area of communication technology. The Journal''s emphasis is particularly on the issues impacting behaviour at the system, service and management levels. Published twelve times a year, it provides coverage of advances that have a significant potential to impact the immense technical and commercial opportunities in the communications sector. The International Journal of Communication Systems strives to select a balance of contributions that promotes technical innovation allied to practical relevance across the range of system types and issues. The Journal addresses both public communication systems (Telecommunication, mobile, Internet, and Cable TV) and private systems (Intranets, enterprise networks, LANs, MANs, WANs). The following key areas and issues are regularly covered: -Transmission/Switching/Distribution technologies (ATM, SDH, TCP/IP, routers, DSL, cable modems, VoD, VoIP, WDM, etc.) -System control, network/service management -Network and Internet protocols and standards -Client-server, distributed and Web-based communication systems -Broadband and multimedia systems and applications, with a focus on increased service variety and interactivity -Trials of advanced systems and services; their implementation and evaluation -Novel concepts and improvements in technique; their theoretical basis and performance analysis using measurement/testing, modelling and simulation -Performance evaluation issues and methods.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信