Loading [MathJax]/extensions/MathMenu.js
A Novel Trust-Aware and Energy-Aware Clustering Method That Uses Stochastic Fractal Search in IoT-Enabled Wireless Sensor Networks | IEEE Journals & Magazine | IEEE Xplore

A Novel Trust-Aware and Energy-Aware Clustering Method That Uses Stochastic Fractal Search in IoT-Enabled Wireless Sensor Networks


Abstract:

Wireless sensor network (WSN) technology is considered to be an integral part of large-scale and efficient deployment of Internet-of-Things (IoT). More specifically, in m...Show More

Abstract:

Wireless sensor network (WSN) technology is considered to be an integral part of large-scale and efficient deployment of Internet-of-Things (IoT). More specifically, in mission-critical IoT applications, trust in the sensor data is becoming increasingly important. Sensor nodes have limited processing, storage, and communication capabilities, which make them susceptible to attacks and unreliable functioning. However, the limitations in the energy resources of the sensors are a major challenge in maximizing the network’s lifetime. Grouping the sensors into clusters was proposed to address such energy limitations. Many meta-heuristic clustering protocols have been proposed to maximize the network lifetime, which is an NP-hard problem. This problem is more complicated when considering the trust factor. The majority of existing clustering models were built to reduce the energy consumption in the network without considering the energy consumption required to detect untrusted nodes, and thus, it requires extra energy consumption to perform this task. This article proposes a clustering protocol with a trust model that detects the untrusted nodes through energy and data-trust. In addition, the proposed clustering protocol maximizes the network’s lifetime through the good characteristics of stochastic fractal search optimization. Finally, a novel fitness function is introduced to select the cluster-heads among the trusted nodes. The function is based on the following four parameters: 1) the remaining energy of the nodes; 2) the density of the nodes; 3) the distance between each node and the base-station; and 4) the network’s dissipated energy. When forming the clusters, the density of the cluster-heads is considered to balance the load of all of the cluster-heads. The experimental evaluation performed here affirms the efficacy of the proposed protocol in comparison with existing protocols.
Published in: IEEE Systems Journal ( Volume: 16, Issue: 2, June 2022)
Page(s): 2693 - 2704
Date of Publication: 12 April 2021

ISSN Information:

References is not available for this document.

I. Introduction

Internet-of-things (IoT) applications have become an integral part of our life. IoT networks are heavily dependent on wired and wireless identifiable devices. Several IoT networks use wireless sensors that are connected to a centralized device (e.g., a router), which is responsible for managing the operations of the sensors and their connections to the Internet. Wireless sensor networks (WSNs) are integrated within IoT deployments when networked to the Internet. A WSN is a group of large number of sensor nodes and a base-station (so-called sink node). The sensor nodes have limited processing, storage, and communication capabilities. WSNs have several applications, such as military operations, environmental monitoring, and disaster management [1]. For monitoring and early-warning IoT-enabled WSNs, the collected information from the sensor nodes must be trustworthy. In such systems, the IoT sensor devices will detect the event of interest and generate an alert packet for warning and early detection of that event, such as the gas leak detection IoT system in [2]. However, there is a chance for these sensor nodes to behave unreliably due to their limited capabilities and the inhospitable physical environments in which these nodes are deployed [3], [4]. To save energy and increase the number of live nodes, one of the most commonly used solutions is clustering, where a group of sensor nodes forms a cluster, and only the cluster-head sensor node is responsible for interacting with the base-station [5]. Clustering is efficient because it can prevent exchanging redundant messages and can maintain the communication bandwidth, stabilize the topology of the network, and reduce the communication overhead.

Select All
1.
B. P. L. Lau, N. Wijerathne, B. K. K. Ng, and C. Yuen, “Sensor fusion for public space utilization monitoring in a smart city,” IEEE Internet Things J., vol. 5, no. 2, pp. 473–481, Apr. 2018.
2.
M. Subramanian, N. Selvam, S. Rajkumar, R. Mahalakshmi, and J. Ramprabhakar, “Gas leakage detection system using IoT with integrated notifications using pushbullet–A review,” in Proc. 4th Int. Conf. Inventive Syst. Control, 2020, pp. 359–362.
3.
R. R. Sahoo, A. R. Sardar, M. Singh, S. Ray, and S. K. Sarkar, “A bio inspired and trust based approach for clustering in WSN,” Natural Comput., vol. 15, no. 3, pp. 423–434, 2015.
4.
T. Wang, K. Hu, X. Yang, G. Zhang, and Y. Wang, “A trust enhancement scheme for cluster-based wireless sensor networks,” J. Supercomputing, vol. 75, no. 5, pp. 2761–2788, 2018.
5.
F. Fanian and M. K. Rafsanjani, “Memetic fuzzy clustering protocol for wireless sensor networks: Shuffled frog leaping algorithm,” Appl. Soft Comput., vol. 71, pp. 568–590, 2018.
6.
F. Song and B. Zhao, “Trust-based LEACH protocol for wireless sensor networks,” in Proc. 2nd Int. Conf. Future Gener. Commun. Netw., vol. 1, 2008, pp. 202–207.
7.
J. Jiang and G. E. A. Han, “An efficient distributed trust model for wireless sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 5, no. 26, pp. 1228–1237, May 2015.
8.
E. P. K. Gilbert, B. Kaliaperumal, E. B. Rajsingh, and M. Lydia, “Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks,” Comput. Elect. Eng., vol. 72, pp. 894–909, 2018.
9.
S. Shanthi, P. Nayak, and S. Dandu, “Minimization of energy consumption in wireless sensor networks by using a special mobile agent,” in Proc. Soft Comput. Signal Process., 2019, pp. 359–368.
10.
N. Pradhan, K. Sharma, K. Singh, and D. Tamang, “TEECS: A time-based energy efficient clustering scheme in wireless sensor networks,” in Proc. Adv. Electron., Comm. Comput., 2018, pp. 263–272.
11.
D. Lin, Q. Wang, W. Min, J. Xu, and Z. Zhang, “A survey on energy-efficient strategies in static wireless sensor networks,” ACM Trans. Sensor Netw., vol. 17, no. 1, pp. 1–48, 2020.
12.
M. Ayyash, D. Ucci, K. Alzoubi, and R. Tandukar, “RQOSR: A robust quality of service routing algorithm for wireless mobile ad hoc networks,” in Proc. IEEE Int. Conf. Electro/Inf. Technol., 2006, pp. 233–238.
13.
P. Saravanan, R. Yarlagadda, and R. Kanampalli, “Genetic algorithm based cluster head selection for optimimized communication in wireless sensor network,” Int. J. Pure Appl. Math., vol. 119, no. 12, pp. 13423–13435, 2018.
14.
G. Gupta and S. Jha, “Integrated clustering and routing protocol for wireless sensor networks using cuckoo and harmony search based metaheuristic techniques,” Eng. Appl. Artif. Intell., vol. 68, pp. 101–109, 2018.
15.
S. Potthuri, T. Shankar, and A. Rajesh, “Lifetime improvement in wireless sensor networks using hybrid differential evolution and simulated annealing (DESA ),” Ain Shams Eng. J., vol. 9, no. 4, pp. 655–663, 2018.
16.
P. Mehra, M. Doja, and B. Alam, “Fuzzy based enhanced cluster head selection (FBECS) for WSN,” J. King Saud Univ. Sci., vol. 32, no. 1, pp. 390–401, 2020.
17.
R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proc. 33rd Annu. Hawaii Int. Conf. Syst. Sci., 2000, pp. 1–10.
18.
L. Qing, Q. Zhu, and M. Wang, “Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks,” Comput. Commun., vol. 29, no. 12, pp. 2230–2237, 2006.
19.
G. Smaragdakis, I. Matta, and A. Bestavros, “SEP: A stable election protocol for clustered heterogeneous wireless sensor networks,” in Proc. 2nd Int. Workshop Sensor Actor Netw. Protocols Appl., 2004, pp. 1–11.
20.
D. Mahmood, “MODLEACH: A variant of LEACH for WSNs,” in Proc. 8th Int. Conf. Broadband Wireless Comput., Commun. Appl., 2013, pp. 158–163.
21.
R. Logambigai and A. Kannan, “Fuzzy logic based unequal clustering for wireless sensor networks,” Wireless Netw., vol. 22, no. 3, pp. 945–957, 2016.
22.
S. Lata, S. Mehfuz, S. Urooj, and F. Alrowais, “Fuzzy clustering algorithm for enhancing reliability and network lifetime of wireless sensor networks,” IEEE Access, vol. 8, pp. 66013–66024, 2020.
23.
N. Mittal, U. Singh, and B. S. Sohi, “An energy-aware cluster-based stable protocol for wireless sensor networks,” Neural Comput. Appl., vol. 31, no. 11, pp. 7269–7286, 2019.
24.
V. K. Chawra and G. P. Gupta, “Load balanced node clustering scheme using improved memetic algorithm based meta-heuristic technique for wireless sensor network,” Procedia Comput. Sci., vol. 167, pp. 468–476, 2020.
25.
S. Ganeriwal and M. B. Srivastava, “Reputation-based framework for high integrity sensor networks,” in Proc. 2nd ACM Workshop Secur. Ad Hoc Sensor Netw., 2004, pp. 66–77. [Online]. Available: https://dl.acm.org/doi/proceedings/10.1145/1029102
26.
R. Feng and X. E. A. Han, “A credible Bayesian-based trust management scheme for wireless sensor networks,” Int. J. Distrib. Sensor Netw., vol. 11, no. 11, 2015, Art. no. 678926.
27.
Z. Ye, “An efficient dynamic trust evaluation model for wireless sensor networks,” J. Sensors, vol. 2017, pp. 1–16, 2017.
28.
W. Wang, F. Du, and Q. Xu, “An improvement of LEACH routing protocol based on trust for wireless sensor networks,” in Proc. 5th Int. Conf. Wireless Commun., Netw. Mobile Comput., 2009, pp. 1–4.
29.
V. S. Dhulipala, N. Karthik, and R. Chandrasekaran, “A novel heuristic approach based trust worthy architecture for wireless sensor networks,” Wireless Pers. Commun., vol. 70, no. 1, pp. 189–205, 2013.
30.
P. Li, X. Yu, H. Xu, J. Qian, L. Dong, and H. Nie, “Research on secure localization model based on trust valuation in wireless sensor networks,” Secur. Commun. Netw., vol. 2017, pp. 1–12, 2017.

Contact IEEE to Subscribe

References

References is not available for this document.