INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XIII, Issue VI, June 2024
www.ijltemas.in Page 25
Sorensen Trust Based and Invasive Weed Algorithm Based Wireless
Sensor Network Optimization
Jayant Shukla, Laxmi Singh, Sanjeev kumar Gupta
Department of Electronics and communication Engineering, Rabindranath Tagore University Raisen,
Madhya Pradesh
DOI : https://doi.org/10.51583/IJLTEMAS.2024.130604
Received: 04 June 2024; Revised: 13 June 2024; Accepted: 21 June 2024; Published: 07 July 2024
Abstract: Wireless Sensor Networks (WSNs), characterized by their openness, dynamism, and lack of infrastructure, are highly
susceptible to a range of attacks due to their ad hoc nature. Routing, being a pivotal process within WSNs, relies heavily on the
contribution of intermediary nodes, thereby accentuating the network's vulnerability to black and gray hole attacks. This work has
proposed a Sorensen Trust and Invasive Weed based Wireless Network optimization (STIWWNO) model that estimates the
confidence of the network with the social Sorensen trust evaluation function. Once the network knows the nodes trust then cluster
centers selection makes easy and safe for routing of sensed data. Packet node path were generate by the invasive weed optimization
genetic algorithm. Experiments were conducted under various network conditions, including different node counts and area sizes, to
evaluate the effectiveness of the proposed method. The results of these experiments demonstrated that the use of the proposed
Sorensen function, combined with the invasive weed optimization technique, significantly enhances the lifespan of the network. The
adaptive nature of IWO allows the network to respond effectively to changes in node positions, ensuring sustained performance and
energy efficiency. By applying this combined approach, the network can dynamically adjust to varying conditions, maintain optimal
performance, and extend the operational life of the WSN.
Index Terms: Sink hole attack, Gray Hole attack, Genetic Algorithm, Wireless Sensor Network, Trust Based Model.
I. Introduction
The realm of wireless communication technologies is undergoing rapid evolution, particularly evidenced by significant
advancements in the field of wireless sensor networks (WSNs) over the past few years [1]. WSNs represent a pivotal and
increasingly indispensable technology in the twenty-first century. These networks consist of a multitude of inexpensive, low-power,
and versatile sensor nodes, serving diverse purposes across various domains [2]. The emergence of large-scale sensor networks,
linking hundreds to thousands of nodes, presents both intricate technical challenges and vast application prospects.
Given the absence of fixed infrastructure and reliance on an open wireless medium, implementing robust security measures within
WSNs poses considerable challenges. In Mobile Ad hoc Networks (MANETs), each node operates both as a host and a router,
facilitating packet forwarding among network nodes. However, this inherent openness renders WSNs vulnerable to an array of
attacks, including active route interference, impersonation, and denial of service. Among these threats, the black hole attack stands
out as particularly pernicious [3]. In a black hole attack, a malicious node deceitfully sends falsified Route REPLY (RREP) packets
to a source node initiating route discovery, masquerading as a destination node. The attacker manipulates the routing process by
advertising a fabricated route with minimal hop count and the highest destination sequence number to lure incoming traffic.
The black hole attack functions like a malignant void, annihilating all data packets that traverse through it [3]. Malicious nodes
further disrupt route discovery, diverting network packets towards themselves. In the route discovery mechanism of Ad hoc On-
Demand Distance Vector (AODV) routing protocol, intermediate nodes are tasked with identifying a valid route to the destination by
exchanging "hello" packets with neighbors. However, in the presence of malicious nodes, the route discovery process is subverted as
these nodes promptly reply to the source with false route information, bypassing the conventional neighbor discovery phase [4].
Consequently, the source node unwittingly directs its data packets through the malicious node, assuming it to be a legitimate route,
thereby facilitating the black hole attack. This malicious behavior severely compromises the integrity of the network interface,
leading to resource depletion and packet loss as nodes incessantly attempt to establish a valid path to the destination [5].
Research gap: Selection of cluster head should be secure as malicious node can enter into network at this point [7]. Sensor Node
movement was not consider in the work. Identification of malicious node in the network should be improved [9].
Objective: This work overcome malicious node detection issue by implementing the trust based node identification. In order to
reduce data loss virtual environment was created. For network channel optimization routing was done by the Invasive Weed
optimization algorithm.
The subsequent sections of this paper are organized as follows: Section 2 provides a summary of existing attack detection methods
targeting Black-Hole and Gray-Hole attacks. Section 3 outlines the proposed system for detecting individual and collusion attacks
within wireless sensor networks. Section 4 elucidates the evaluation parameters utilized and presents simulation results. Finally, in
Section 5, we conclude our proposed work and offer insights into potential avenues for future research.
II. Related Work
In their research outlined in [7], M. Kumar et al. introduce the Taylor Sail Fish Optimizer (Taylor SFO) as a method for predicting
black-hole attacks in Wireless Sensor Networks (WSNs). This novel approach involves training a Deep stacked autoencoder using
the proposed Taylor-SFO framework, which integrates Taylor Series and Sail Fish Optimizer (SFO). The resulting Taylor-SFO