An Adaptive QoS and Trust-Based Lightweight Secure Routing Algorithm for WSNs

被引:15
|
作者
Pathak, Aditya [1 ]
Al-Anbagi, Irfan [1 ]
Hamilton, Howard J. [2 ]
机构
[1] Univ Regina, Fac Engn & Appl Sci, Regina, SK S4S 0A2, Canada
[2] Univ Regina, Dept Comp Sci, Regina, SK S4S 0A2, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Ant colony optimization (ACO); energy efficiency; energy-hole problem; lightweight security; multiobjective wireless sensor network (WSN) optimization problem; network security; Quality of Service (QoS); trust model; WSNs; WIRELESS; NETWORKS; PROTOCOL;
D O I
10.1109/JIOT.2022.3189832
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The limited resources and low computational power of wireless sensor networks (WSNs) make them vulnerable to various security attacks. Conventional security mechanisms require too many resources to allow the reliable operation of WSNs due to their resource-constrained nature. In addition, multihop communication in WSNs creates a requirement for guaranteed Quality of Service (QoS). Therefore, providing security while maintaining QoS and energy efficiency in WSNs are important design considerations. To further increase the performance of WSNs, there is a need to overcome the energy-hole problem, which leads to poor coverage of the field of interest. An energy-hole problem is created because of using poor deployment strategies. In this article, we define a multiobjective WSN optimization problem and present a novel algorithm known as lightweight secure routing (LSR) to manage WSNs that directly addresses the multiobjective WSN optimization problem. Our LSR algorithm uses ant colony optimization (ACO), an adaptive security model based on direct and indirect trust calculations, an adaptive QoS model, a hybrid deployment model based on 2-D Gaussian and uniform distributions, and an adaptive connectivity model that uses an appropriate communicational radius to ensure high connectivity between sensor nodes to solve the multiobjective WSN optimization problem. We divide our simulation results into three analyses, namely, trust model analysis, network scalability analysis, and security risk analysis to show that LSR outperforms the existing techniques in terms of energy consumed to calculate trust values, trust values convergence, network lifetime, average routing delay, and packet delivery ratio.
引用
收藏
页码:23826 / 23840
页数:15
相关论文
共 50 条
  • [41] Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization
    Srivel Ravi
    Saravanan Matheswaran
    Uma Perumal
    Shanthi Sivakumar
    Srinivas Kumar Palvadi
    Peer-to-Peer Networking and Applications, 2023, 16 : 22 - 34
  • [42] An Algorithm of Trust-based Secure Data Aggregation for Wireless Sensor Networks
    Ye Z.-W.
    Wen T.
    Liu Z.-Y.
    Fu C.-G.
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (06): : 789 - 794
  • [43] An Encrypted Trust-Based Routing Protocol
    Gahi, Youssef
    Guennoun, Mouhcine
    Guennoun, Zouhair
    El-Khatib, Khalil
    2012 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS 2012), 2012, : 206 - 210
  • [44] Hybrid trust-based secure routing protocol for detection of routing attacks in environment monitoring over MANETs
    Arulselvan, G.
    Rajaram, A.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 45 (04) : 6575 - 6590
  • [45] A secure on-demand routing with distributed authentication for trust-based ad hoc networks
    Hsieh, MY
    Huang, YM
    NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2005, 3779 : 343 - 350
  • [46] Towards Secure Communication in CR-VANETs Through a Trust-Based Routing Protocol
    Akter, Sharmin
    Rahman, Mohammad Shahriar
    Bhuiyan, Md Zakirul Alam
    Mansoor, Nafees
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021), 2021,
  • [47] A novel fuzzy trust-based secure routing scheme in flying ad hoc networks
    Hosseinzadeh, Mehdi
    Mohammed, Adil Hussein
    Alenizi, Farhan A.
    Malik, Mazhar Hussain
    Yousefpoor, Efat
    Yousefpoor, Mohammad Sadegh
    Ahmed, Omed Hassan
    Rahmani, Amir Masoud
    Tightiz, Lilia
    VEHICULAR COMMUNICATIONS, 2023, 44
  • [48] Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks
    Huang, Jing-Wei
    Woungang, Isaac
    Chao, Han-Chieh
    Obaidat, Mohammad S.
    Chi, Ting-Yun
    Dhurandher, Sanjay K.
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [49] A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches
    Muzammal, Syeda M.
    Murugesan, Raja Kumar
    Jhanjhi, N. Z.
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4186 - 4210
  • [50] Secure and efficient key management protocol for WSNs based on trust clustering algorithm
    Wu, Yinfeng
    Huang, Liping
    Wang, Xiao
    Journal of Information and Computational Science, 2012, 9 (17): : 5275 - 5282