{"title":"Optimized secure and energy-efficient approach for IoT-enabled wireless sensor networks","authors":"Jay Kumar Jain , Dipti Chauhan","doi":"10.1016/j.pmcj.2025.102049","DOIUrl":null,"url":null,"abstract":"<div><div>Wireless communication is pivotal in the modern era, enabling seamless connectivity across diverse applications. However, the increasing complexity and sophistication of cyber threats pose significant challenges to the security of wireless communication systems. This paper proposes an innovative approach to enhance wireless communication security through integrating artificial intelligence (AI) techniques. First, we construct the network using the Horizontal Partitioning Sierpinski Triangle to reduce the network's high traffic and perform the authentication process. After successful authentication, we perform the clustering process and Game Theory-Driven Clustering (GT-DC) allows nodes to strategically optimize energy utilization while forming clusters as rational entities in a cooperative game. Perform the beacon injection and detect the attacks using the Improved Random Forest (IRF) that signifies the accurate identification of cyber-attacks, IRF is improving the Bootstrap Sampling, Class Weights, and Anomaly Score Threshold. In Routing implement Improved Cache LEACH Protocol (ICLP) which discovers the effective routing establishing the Cache nodes (Cn), to obtain optimal routing by lowering latency, improving data access, enhancing data reliability, and reducing data redundancy. The proposed work is compared with evaluation metrics such as authentication time, throughput, attack detection rate, energy consumption, packet delivery rate, and delay.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"110 ","pages":"Article 102049"},"PeriodicalIF":3.0000,"publicationDate":"2025-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Pervasive and Mobile Computing","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1574119225000380","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Wireless communication is pivotal in the modern era, enabling seamless connectivity across diverse applications. However, the increasing complexity and sophistication of cyber threats pose significant challenges to the security of wireless communication systems. This paper proposes an innovative approach to enhance wireless communication security through integrating artificial intelligence (AI) techniques. First, we construct the network using the Horizontal Partitioning Sierpinski Triangle to reduce the network's high traffic and perform the authentication process. After successful authentication, we perform the clustering process and Game Theory-Driven Clustering (GT-DC) allows nodes to strategically optimize energy utilization while forming clusters as rational entities in a cooperative game. Perform the beacon injection and detect the attacks using the Improved Random Forest (IRF) that signifies the accurate identification of cyber-attacks, IRF is improving the Bootstrap Sampling, Class Weights, and Anomaly Score Threshold. In Routing implement Improved Cache LEACH Protocol (ICLP) which discovers the effective routing establishing the Cache nodes (Cn), to obtain optimal routing by lowering latency, improving data access, enhancing data reliability, and reducing data redundancy. The proposed work is compared with evaluation metrics such as authentication time, throughput, attack detection rate, energy consumption, packet delivery rate, and delay.
期刊介绍:
As envisioned by Mark Weiser as early as 1991, pervasive computing systems and services have truly become integral parts of our daily lives. Tremendous developments in a multitude of technologies ranging from personalized and embedded smart devices (e.g., smartphones, sensors, wearables, IoTs, etc.) to ubiquitous connectivity, via a variety of wireless mobile communications and cognitive networking infrastructures, to advanced computing techniques (including edge, fog and cloud) and user-friendly middleware services and platforms have significantly contributed to the unprecedented advances in pervasive and mobile computing. Cutting-edge applications and paradigms have evolved, such as cyber-physical systems and smart environments (e.g., smart city, smart energy, smart transportation, smart healthcare, etc.) that also involve human in the loop through social interactions and participatory and/or mobile crowd sensing, for example. The goal of pervasive computing systems is to improve human experience and quality of life, without explicit awareness of the underlying communications and computing technologies.
The Pervasive and Mobile Computing Journal (PMC) is a high-impact, peer-reviewed technical journal that publishes high-quality scientific articles spanning theory and practice, and covering all aspects of pervasive and mobile computing and systems.