Sorensen Trust Based and Invasive Weed Algorithm Based Wireless Sensor Network Optimization
PDF
Full Text HTML
EPUB

Keywords

Sink hole attack
Gray Hole attack
Genetic Algorithm
Wireless Sensor Network
Trust Based Model

How to Cite

Sorensen Trust Based and Invasive Weed Algorithm Based Wireless Sensor Network Optimization. (2024). International Journal of Latest Technology in Engineering Management & Applied Science, 13(6), 25-30. https://doi.org/10.51583/IJLTEMAS.2024.130604

Abstract

Wireless Sensor Networks (WSNs), characterized by their openness, dynamism, and lack of infrastructure, are highly susceptible to a range of attacks due to their ad hoc nature. Routing, being a pivotal process within WSNs, relies heavily on the contribution of intermediary nodes, thereby accentuating the network's vulnerability to black and gray hole attacks. This work has proposed a Sorensen Trust and Invasive Weed based Wireless Network optimization (STIWWNO) model that estimates the confidence of the network with the social Sorensen trust evaluation function. Once the network knows the nodes trust then cluster centers selection makes easy and safe for routing of sensed data. Packet node path were generate by the invasive weed optimization genetic algorithm. Experiments were conducted under various network conditions, including different node counts and area sizes, to evaluate the effectiveness of the proposed method. The results of these experiments demonstrated that the use of the proposed Sorensen function, combined with the invasive weed optimization technique, significantly enhances the lifespan of the network. The adaptive nature of IWO allows the network to respond effectively to changes in node positions, ensuring sustained performance and energy efficiency. By applying this combined approach, the network can dynamically adjust to varying conditions, maintain optimal performance, and extend the operational life of the WSN.

PDF
Full Text HTML
EPUB

References

Rani P, Kavita, Verma S, Rawat D and Dash S. (2022). Mitigation of black hole attacks using firefly and artificial neural network. Neural Computing and Applications. 34:18. (15101-15111).

Farahani G and Chaudhry S. (2021). Black Hole Attack Detection Using K-Nearest Neighbor Algorithm and Reputation Calculation in Mobile Ad Hoc Networks. Security and Communication Networks. 2021.

Malnar M and Jevtic N. (2022). An improvement of AODV protocol for the overhead reduction in scalable dynamic wireless ad hoc networks. Wireless Networks. 28:3. (1039-1051).

M. S. Pathan, J. He, N. Zhu, Z. Ali, M. Qasim, and A. Azmat, “An efficient scheme for detection and prevention of black hole attacks in AODV-based MANETs,” International Journal of Advanced Computer Science and Applications, vol. 10, no. 1, pp. 243–251, 2019.

M. B. M. Kamel, I. Alameri, and A. N. Onaizah, “STAODV: a secure and trust based approach to mitigate blackhole attack on AODV based MANET,” in in 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), pp. 1278–1282, IEEE, 2017.

G. K. Wadhwani, S. K. Khatri, and S. K. Mutto, “Trust framework for attack resilience in MANET using AODV,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 23, no. 1, pp. 209–220, 2020.

M. Kumar and J. Ali, "Taylor Sailfish Optimizer-Based Deep Stacked Auto Encoder for Blackhole Attack Detection in Wireless Sensor Network," in Journal of Web Engineering, vol. 21, no. 3, pp. 911-940, May 2022.

S. Jiang, J. Zhao and X. Xu, "SLGBM: An Intrusion Detection Mechanism for Wireless Sensor Networks in Smart Environments," in IEEE Access, vol. 8, pp. 169548-169558, 2020.

Iraq Ahmad Reshi, Sahil Sholla, Zahoor Ahmad Najar, Safeguarding IoT networks: Mitigating black hole attacks with an innovative defense algorithm, Journal of Engineering Research, 2024.

Khan, T., Singh, K., Ahmad, K. et al. A secure and dependable trust assessment (SDTS) scheme for industrial communication networks. Sci Rep 13, 1910 (2023).

Kosaraju Chaitanya, Gnanasekaran Dhanabalan. "Secure Route Detection with Multi Level Trust Evaluation Model Using Replicated Auditor Node for Extended Packet Delivery Rate in WSN". 2023 IIETA.

Pooja Rani, Kavita, Sahil Verma, Gia Nhu Nguyen. “Mitigation of Black Hole and Gray Hole Attack Using Swarm Inspired Algorithm With Artificial Neural Network”. IEEE Access July 16, 2020.

Carass, A., Roy, S., Gherman, A. et al. Evaluating White Matter Lesion Segmentations with Refined Sørensen-Dice Analysis. Sci Rep 10, 8242, 2020.

Mojgan Misaghi, Mahdi Yaghoobi, Improved invasive weed optimization algorithm (IWO) based on chaos theory for optimal design of PID controller, Journal of Computational Design and Engineering, Volume 6, Issue 3, 2019.