Dynamic CH selection and Intrusion Detection in WSN using Reinforced Weighted Approximation based Adaptive SEECH: An Optimized Routing framework
ثبت نشده
چکیده
We propose a highly scalable adaptive cluster-based hierarchical trust management protocol for wireless sensor networks (WSNs) to effectively deal with selfish or malicious nodes. Unlike prior work, we consider multidimensional trust attributes derived from communication and social networks to assess the overall trust of a sensor node. In this paper the Adaptive Scalable Energy Efficient Clustering Hierarchy (Adaptive SEECH) protocol is introduced for the optimized routing with intrusion detection. By means of Dynamic cluster head selection using Harmony Search based Genetic Algorithm (HS-GA), and then the Reinforced Weighted Approximation (RWA) optimization is utilized for our work to balance the trust level and the energy level of the sensor nodes. In this proposed work designing a basic network model with 50 sensor nodes and clustering the nodes by utilizing the algorithm namely Firefly with Nearest Neighbour Chain Clustering algorithm and validate the performance of our proposed routing protocol. The performance analysis and comparison of our proposed routing protocol with some existing routing protocols shows the significance of the proposed work.
منابع مشابه
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms
Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملLeach Routing Algorithm Optimization through Imperialist Approach
Routing is an important challenge in WSN due to the presence of hundreds or thousands of sensor nodes. Low Energy Adaptive Clustering Hierarchy (LEACH) is a hierarchical routing and data dissemination protocol. LEACH divides a network domain into several sub-domains that are called clusters. Non-uniformity of cluster distribution and CHs selection without considering the positions of other sens...
متن کاملTrust Based Voting Scheme and Optimal Multipath Routing for Intrusion Tolerance in Wireless Sensor Network
Wireless sensor networks (WSNs) deployed in unattended environment energy recharging is difficult. WSN satisfy application specific QoS requirements i.e., reliability, timeliness, security and minimize energy consumption to prolong system useful lifetime with limited resources. The drawbacks of existing work include redundancy management scheme that did not addresses heavy query traffic. Ambigu...
متن کاملAn Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks
LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...
متن کامل