Cargando…

A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs)

Today, wireless sensor networks (WSNs) are growing rapidly and provide a lot of comfort to human life. Due to the use of WSNs in various areas, like health care and battlefield, security is an important concern in the data transfer procedure to prevent data manipulation. Trust management is an affec...

Descripción completa

Detalles Bibliográficos
Autores principales: Hosseinzadeh, Mehdi, Yoo, Joon, Ali, Saqib, Lansky, Jan, Mildeova, Stanislava, Yousefpoor, Mohammad Sadegh, Ahmed, Omed Hassan, Rahmani, Amir Masoud, Tightiz, Lilia
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10421948/
https://www.ncbi.nlm.nih.gov/pubmed/37567984
http://dx.doi.org/10.1038/s41598-023-40273-8
_version_ 1785089090195030016
author Hosseinzadeh, Mehdi
Yoo, Joon
Ali, Saqib
Lansky, Jan
Mildeova, Stanislava
Yousefpoor, Mohammad Sadegh
Ahmed, Omed Hassan
Rahmani, Amir Masoud
Tightiz, Lilia
author_facet Hosseinzadeh, Mehdi
Yoo, Joon
Ali, Saqib
Lansky, Jan
Mildeova, Stanislava
Yousefpoor, Mohammad Sadegh
Ahmed, Omed Hassan
Rahmani, Amir Masoud
Tightiz, Lilia
author_sort Hosseinzadeh, Mehdi
collection PubMed
description Today, wireless sensor networks (WSNs) are growing rapidly and provide a lot of comfort to human life. Due to the use of WSNs in various areas, like health care and battlefield, security is an important concern in the data transfer procedure to prevent data manipulation. Trust management is an affective scheme to solve these problems by building trust relationships between sensor nodes. In this paper, a cluster-based trusted routing technique using fire hawk optimizer called CTRF is presented to improve network security by considering the limited energy of nodes in WSNs. It includes a weighted trust mechanism (WTM) designed based on interactive behavior between sensor nodes. The main feature of this trust mechanism is to consider the exponential coefficients for the trust parameters, namely weighted reception rate, weighted redundancy rate, and energy state so that the trust level of sensor nodes is exponentially reduced or increased based on their hostile or friendly behaviors. Moreover, the proposed approach creates a fire hawk optimizer-based clustering mechanism to select cluster heads from a candidate set, which includes sensor nodes whose remaining energy and trust levels are greater than the average remaining energy and the average trust level of all network nodes, respectively. In this clustering method, a new cost function is proposed based on four objectives, including cluster head location, cluster head energy, distance from the cluster head to the base station, and cluster size. Finally, CTRF decides on inter-cluster routing paths through a trusted routing algorithm and uses these routes to transmit data from cluster heads to the base station. In the route construction process, CTRF regards various parameters such as energy of the route, quality of the route, reliability of the route, and number of hops. CTRF runs on the network simulator version 2 (NS2), and its performance is compared with other secure routing approaches with regard to energy, throughput, packet loss rate, latency, detection ratio, and accuracy. This evaluation proves the superior and successful performance of CTRF compared to other methods.
format Online
Article
Text
id pubmed-10421948
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-104219482023-08-13 A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs) Hosseinzadeh, Mehdi Yoo, Joon Ali, Saqib Lansky, Jan Mildeova, Stanislava Yousefpoor, Mohammad Sadegh Ahmed, Omed Hassan Rahmani, Amir Masoud Tightiz, Lilia Sci Rep Article Today, wireless sensor networks (WSNs) are growing rapidly and provide a lot of comfort to human life. Due to the use of WSNs in various areas, like health care and battlefield, security is an important concern in the data transfer procedure to prevent data manipulation. Trust management is an affective scheme to solve these problems by building trust relationships between sensor nodes. In this paper, a cluster-based trusted routing technique using fire hawk optimizer called CTRF is presented to improve network security by considering the limited energy of nodes in WSNs. It includes a weighted trust mechanism (WTM) designed based on interactive behavior between sensor nodes. The main feature of this trust mechanism is to consider the exponential coefficients for the trust parameters, namely weighted reception rate, weighted redundancy rate, and energy state so that the trust level of sensor nodes is exponentially reduced or increased based on their hostile or friendly behaviors. Moreover, the proposed approach creates a fire hawk optimizer-based clustering mechanism to select cluster heads from a candidate set, which includes sensor nodes whose remaining energy and trust levels are greater than the average remaining energy and the average trust level of all network nodes, respectively. In this clustering method, a new cost function is proposed based on four objectives, including cluster head location, cluster head energy, distance from the cluster head to the base station, and cluster size. Finally, CTRF decides on inter-cluster routing paths through a trusted routing algorithm and uses these routes to transmit data from cluster heads to the base station. In the route construction process, CTRF regards various parameters such as energy of the route, quality of the route, reliability of the route, and number of hops. CTRF runs on the network simulator version 2 (NS2), and its performance is compared with other secure routing approaches with regard to energy, throughput, packet loss rate, latency, detection ratio, and accuracy. This evaluation proves the superior and successful performance of CTRF compared to other methods. Nature Publishing Group UK 2023-08-11 /pmc/articles/PMC10421948/ /pubmed/37567984 http://dx.doi.org/10.1038/s41598-023-40273-8 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Article
Hosseinzadeh, Mehdi
Yoo, Joon
Ali, Saqib
Lansky, Jan
Mildeova, Stanislava
Yousefpoor, Mohammad Sadegh
Ahmed, Omed Hassan
Rahmani, Amir Masoud
Tightiz, Lilia
A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs)
title A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs)
title_full A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs)
title_fullStr A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs)
title_full_unstemmed A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs)
title_short A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs)
title_sort cluster-based trusted routing method using fire hawk optimizer (fho) in wireless sensor networks (wsns)
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10421948/
https://www.ncbi.nlm.nih.gov/pubmed/37567984
http://dx.doi.org/10.1038/s41598-023-40273-8
work_keys_str_mv AT hosseinzadehmehdi aclusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns
AT yoojoon aclusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns
AT alisaqib aclusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns
AT lanskyjan aclusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns
AT mildeovastanislava aclusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns
AT yousefpoormohammadsadegh aclusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns
AT ahmedomedhassan aclusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns
AT rahmaniamirmasoud aclusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns
AT tightizlilia aclusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns
AT hosseinzadehmehdi clusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns
AT yoojoon clusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns
AT alisaqib clusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns
AT lanskyjan clusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns
AT mildeovastanislava clusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns
AT yousefpoormohammadsadegh clusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns
AT ahmedomedhassan clusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns
AT rahmaniamirmasoud clusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns
AT tightizlilia clusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns