An Optimized Novel Trust-Based Security Mechanism Using Elephant Herd Optimization

نویسندگان

چکیده

Routing strategies and security issues are the greatest challenges in Wireless Sensor Network (WSN). Cluster-based routing Low Energy adaptive Clustering Hierarchy (LEACH) decreases power consumption increases network lifetime considerably. Securing WSN is a challenging issue faced by researchers. Trust systems very helpful detecting interfering nodes WSN. Researchers have successfully applied Nature-inspired Metaheuristics Optimization Algorithms as decision-making factor to derive an improved effective solution for real-time optimization problem. The metaheuristic Elephant Herding Optimizations (EHO) algorithm formulated based on elephant herding their clans. EHO considers two behaviors solve enhance Based Herd Optimization, trust-based method built this work. proposed selects routes destination trust values, thus, finding optimal secure transmitting data. Experimental results demonstrated effectiveness of routing. Average Packet Loss Rate performs better 35.42%, 1.45%, 31.94% than LEACH, respectively at Number Nodes 3000. As efficient selecting routes, average packet loss rate significantly reduced, improving network’s performance. It also observed that enhanced with Optimization.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Improved Scheduling Strategy in Cloud Using Trust Based Mechanism

Cloud Computing refers to applications delivered as services over the internet, and the datacenters that provide those services with hardware and systems software. These were earlier referred to as Software as a Service (SaaS). Scheduling is justified by job components (called tasks), lack of information. In fact, in a large fraction of jobs from machine learning, bio-computing, and image proce...

متن کامل

Trust Based Security Mechanism for Service Discovery in Manet

Mobile AdHoc Network (MANET) endures wide number of security issues in discovering services. Furthermore, different services require different level of security. For instance commercial applications necessitate less security compare to military applications. Thus, evolving an efficient service discovery mechanism in view of above criteria is a complicated work. In this paper, a trust based secu...

متن کامل

An Optimized Dwt Based Approach in Video Watermarking with Multiple Watermarks Using Oppositional Krill Herd Algorithm

In video watermarking applications, there is a need to extract the watermark without using the original data because of the huge storage of the cover data. In this paper, we have intended to present an efficient multiple video watermarking using optimized three levels DWT. Basically, the system consists of three modules such as (i) selecting optimal wavelet coefficients using Oppositional Krill...

متن کامل

Optimized Graph-Based Trust Mechanisms using Hitting Times

Trust mechanisms can be computed by modeling a set of agents in a trust graph, a directed weighted graph in which agents are represented as vertices and relative trust as edges. Liu, Parkes, and Seuken [LPS16] present trust mechanisms that are robust against sybil attacks, including the proposed personalized hitting time (PHT) mechanism. In this paper, we propose a scalable algorithm for produc...

متن کامل

Trust-Based Security Protocols

An agent-based model of interpersonal trust is used to develop information sharing security protocols in the spirit of soft security. We demonstrate that availability information can be balanced against security breaches. Our protocols are simple, malleable, and scalable. Index Terms – Security protocols, soft security, agents

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer systems science and engineering

سال: 2023

ISSN: ['0267-6192']

DOI: https://doi.org/10.32604/csse.2023.026463