Trust-Enabled Energy Effective Optimal Framework for Detection of Intrusions in the Network Using AI Scheme

Author(s):  
Putty Srivi ◽  
Lavadya Nirmala Devi

Abstract Wireless Sensor Networks (WSN) are self-possessed of the devices that are capable of actuating/sensing, processing, and communicating. This is employed for enhancing the day-to-day life, moreover secure data transmission was regarded as the major challenging aspect for the deployment of data. Data dissemination is a crucial in the complex communications framework for transferring messages for any given condition on the network. The dilemma of fixing the safest efficient route was a tedious issue. Hence the secure and most reliable way will give the appropriate solution for the routing issues. Here in this paper the Trust based energy efficient route path identification by Multi-faceted biologically-inspired probabilistic Cuckoo search Node optimization algorithm (TEERP-MFBPCS)is employed to find the efficient safest route within a short period. After seeing the efficient route, the node can be distinguished upon the traffic and security. Then in the selected route, the nodal distance can be calculated through applying weighted-biased end-to-end delay-based approach for traffic analysis. Finally, the intrusion node can be detected and the performance analysis is carried.

2021 ◽  
Vol 11 (22) ◽  
pp. 10517
Author(s):  
V. Sivasankarareddy ◽  
G. Sundari ◽  
Ch. Rami Reddy ◽  
Flah Aymen ◽  
Edson C. Bortoni

Presently, due to the establishment of a sensor network, residual buildings in urban areas are being converted into smart buildings. Many sensors are deployed in various buildings to perform different functions, such as water quality monitoring and temperature monitoring. However, the major concern faced in smart building Wireless Sensor Networks (WSNs) is energy depletion and security threats. Many researchers have attempted to solve these issues by various authors in different applications of WSNs. However, limited research has been conducted on smart buildings. Thus, the present research is focused on designing an energy-efficient and secure routing protocol for smart building WSNs. The process in the proposed framework is carried out in two stages. The first stage is the design of the optimal routing protocol based on the grid-clustering approach. In the grid-based model, a grid organizer was selected based on the sailfish optimization algorithm. Subsequently, a fuzzy expert system is used to select the relay node to reach the shortest path for data transmission. The second stage involves designing a trust model for secure data transmission using the two-fish algorithm. A simulation study of the proposed framework was conducted to evaluate its performance. Some metrics, such as the packet delivery ratio, end-end delay, and average residual energy, were calculated for the proposed model. The average residual energy for the proposed framework was 96%, which demonstrates the effectiveness of the proposed routing design.


2018 ◽  
Vol 102 (1) ◽  
pp. 201-227 ◽  
Author(s):  
Sathiamoorthy Jayaraman ◽  
Ramakrishnan Bhagavathiperumal ◽  
Usha Mohanakrishnan

2021 ◽  
Vol 11 (12) ◽  
pp. 2966-2975
Author(s):  
K. Mohanaprakash ◽  
T. GunaSekar

Vehicle Ad Hoc Networks (VANETs) is a crucial communications framework for transferring messages between any healthcare systems. The dilemma of fixing the safest efficient route is a tedious issue in VANET. Hence the secure and most reliable way will give the appropriate solution for the routing issues in the VANET. In this paper, by using the Multi-Objective Bio-inspired Heuristic Cuckoo Search Node optimization algorithm is designed to find the efficient safest route for transferring health data within a short period. After seeing the efficient route, the node can be distinguished upon the traffic and security by using the Stochastic Discriminant Random Forest Node Classifier. Then in the selected route, the nodal distance can be calculated by applying the delay-based weighted end-to-end approach for traffic analysis. Then the authentic vehicle node can be analyzed through the Trust Aware extreme Gradient Boosting Node Classification based Secured Routing (TAXGBNC-SR) Technique. The obtained information that can be stored in the cloud. It deal with the multiple number of tasks gives to the ARM micro-controllers in order to perform the multiple tasks that gets logged in the cloud via Internet of Things technology (Iot).


Wireless sensor networks (WSNs) are distributed all over the globe and are widely used for physical collection of data sensed in its surrounding. Tiny, affordable, constrained battery power, information processing capability devices called sensor nodes, plays a crucial role in agriculture, army, industry, intelligent grid, health care, critical infrastructure, etc. WSNs are often exposed to types of attacks. Once a sensor is affected by adversaries, the sensor's data materials become non- protective and intercepted by the enemy. In this paper we propose a lightweight polynomial secrete key (LWPK) sharing mechanism for secure hierarchal cluster based communication. LWPK is built on elliptical curve cryptography by exchanging symmetric keys to secure data transmission. Set of tests is carried on discrete event simulation tool and simulation results achieves better performance in terms of communication overhead, packet delivery ratio, end to end delay and network lifetime


10.29007/cchb ◽  
2018 ◽  
Author(s):  
Jignesh Joshi ◽  
Dr. Jagdish Rathod ◽  
Dr. Kinita Wandra

This paper proposes energy efficient LEACH protocol for secure data transmission for wireless networks. The proposed work uses Networks Simulator – NS2.27 for the simulation of cluster based routing protocol LEACH in wireless sensor network. The work is to enhance the performance of LEACH in terms of energy saving and secure data transmission. Instead of random selection of Cluster Head (CH) the selection method is based on residual energy and vicinity of the node. With this hybrid approach, the node, which is eligible for the CH, will become cluster head and it enhances the performance of traditional LEACH. Traditional LAECH does not support secure data transmission and authentication of nodes in the clusters. By adding security between CH and CM using XOR function and key management, secure data transmission and authentication is carried out for selected application where security is the most important aspect. The proposed LEACH enhances lifetime of the wireless sensor network with security.


Author(s):  
Rinkuben N. Patel ◽  
Nirav V. Bhatt

Background: WSN is a network of smart tiny electromechanical devices named as sensors. Sensors perform various tasks like sensing the environment as per its range, transmit the data using transmission units, store the data in the storage unit and perform an action based on captured data. As they are installed in an unfriendly environment, to recharge the sensors are not possible every time which leads to a limited lifetime of a network. To enhance the life of a sensor network, the network required energy-efficient protocols. Various energy-efficient MAC protocols are developed by Research community, but very few of them are integrated with the priority-based environment which performs the priority-based data transmission. Another challenge of WSN is, most of the WSN areas are delay-sensitive because it is implemented in critical fields like military, disaster management, and health monitoring. Energy, Delay, and throughput are major quality factors that affect the sensor network. Objective: In this paper, the aim is to design and develop a MAC Protocol for a field like the military where the system requires energy efficiency and priority-based data transmission. Method: In the proposed model, the cluster-based network with priority queues are formed that can achieve higher power efficiency and less delay for sensitive data. Results: In this research simulation of Proposed MAC, TMAC and SMAC are done with different numbers of nodes, same inter-packet intervals, and variant inter-packet intervals. Based on the script simulation, result graphs are generated. Conclusion: The proposed work achieves greater lifetime compared to TMAC and SMAC using priority-based data transmission.


Sign in / Sign up

Export Citation Format

Share Document