Cargando…
A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs)
Today, wireless sensor networks (WSNs) are growing rapidly and provide a lot of comfort to human life. Due to the use of WSNs in various areas, like health care and battlefield, security is an important concern in the data transfer procedure to prevent data manipulation. Trust management is an affec...
Autores principales: | , , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10421948/ https://www.ncbi.nlm.nih.gov/pubmed/37567984 http://dx.doi.org/10.1038/s41598-023-40273-8 |
_version_ | 1785089090195030016 |
---|---|
author | Hosseinzadeh, Mehdi Yoo, Joon Ali, Saqib Lansky, Jan Mildeova, Stanislava Yousefpoor, Mohammad Sadegh Ahmed, Omed Hassan Rahmani, Amir Masoud Tightiz, Lilia |
author_facet | Hosseinzadeh, Mehdi Yoo, Joon Ali, Saqib Lansky, Jan Mildeova, Stanislava Yousefpoor, Mohammad Sadegh Ahmed, Omed Hassan Rahmani, Amir Masoud Tightiz, Lilia |
author_sort | Hosseinzadeh, Mehdi |
collection | PubMed |
description | Today, wireless sensor networks (WSNs) are growing rapidly and provide a lot of comfort to human life. Due to the use of WSNs in various areas, like health care and battlefield, security is an important concern in the data transfer procedure to prevent data manipulation. Trust management is an affective scheme to solve these problems by building trust relationships between sensor nodes. In this paper, a cluster-based trusted routing technique using fire hawk optimizer called CTRF is presented to improve network security by considering the limited energy of nodes in WSNs. It includes a weighted trust mechanism (WTM) designed based on interactive behavior between sensor nodes. The main feature of this trust mechanism is to consider the exponential coefficients for the trust parameters, namely weighted reception rate, weighted redundancy rate, and energy state so that the trust level of sensor nodes is exponentially reduced or increased based on their hostile or friendly behaviors. Moreover, the proposed approach creates a fire hawk optimizer-based clustering mechanism to select cluster heads from a candidate set, which includes sensor nodes whose remaining energy and trust levels are greater than the average remaining energy and the average trust level of all network nodes, respectively. In this clustering method, a new cost function is proposed based on four objectives, including cluster head location, cluster head energy, distance from the cluster head to the base station, and cluster size. Finally, CTRF decides on inter-cluster routing paths through a trusted routing algorithm and uses these routes to transmit data from cluster heads to the base station. In the route construction process, CTRF regards various parameters such as energy of the route, quality of the route, reliability of the route, and number of hops. CTRF runs on the network simulator version 2 (NS2), and its performance is compared with other secure routing approaches with regard to energy, throughput, packet loss rate, latency, detection ratio, and accuracy. This evaluation proves the superior and successful performance of CTRF compared to other methods. |
format | Online Article Text |
id | pubmed-10421948 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-104219482023-08-13 A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs) Hosseinzadeh, Mehdi Yoo, Joon Ali, Saqib Lansky, Jan Mildeova, Stanislava Yousefpoor, Mohammad Sadegh Ahmed, Omed Hassan Rahmani, Amir Masoud Tightiz, Lilia Sci Rep Article Today, wireless sensor networks (WSNs) are growing rapidly and provide a lot of comfort to human life. Due to the use of WSNs in various areas, like health care and battlefield, security is an important concern in the data transfer procedure to prevent data manipulation. Trust management is an affective scheme to solve these problems by building trust relationships between sensor nodes. In this paper, a cluster-based trusted routing technique using fire hawk optimizer called CTRF is presented to improve network security by considering the limited energy of nodes in WSNs. It includes a weighted trust mechanism (WTM) designed based on interactive behavior between sensor nodes. The main feature of this trust mechanism is to consider the exponential coefficients for the trust parameters, namely weighted reception rate, weighted redundancy rate, and energy state so that the trust level of sensor nodes is exponentially reduced or increased based on their hostile or friendly behaviors. Moreover, the proposed approach creates a fire hawk optimizer-based clustering mechanism to select cluster heads from a candidate set, which includes sensor nodes whose remaining energy and trust levels are greater than the average remaining energy and the average trust level of all network nodes, respectively. In this clustering method, a new cost function is proposed based on four objectives, including cluster head location, cluster head energy, distance from the cluster head to the base station, and cluster size. Finally, CTRF decides on inter-cluster routing paths through a trusted routing algorithm and uses these routes to transmit data from cluster heads to the base station. In the route construction process, CTRF regards various parameters such as energy of the route, quality of the route, reliability of the route, and number of hops. CTRF runs on the network simulator version 2 (NS2), and its performance is compared with other secure routing approaches with regard to energy, throughput, packet loss rate, latency, detection ratio, and accuracy. This evaluation proves the superior and successful performance of CTRF compared to other methods. Nature Publishing Group UK 2023-08-11 /pmc/articles/PMC10421948/ /pubmed/37567984 http://dx.doi.org/10.1038/s41598-023-40273-8 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Article Hosseinzadeh, Mehdi Yoo, Joon Ali, Saqib Lansky, Jan Mildeova, Stanislava Yousefpoor, Mohammad Sadegh Ahmed, Omed Hassan Rahmani, Amir Masoud Tightiz, Lilia A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs) |
title | A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs) |
title_full | A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs) |
title_fullStr | A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs) |
title_full_unstemmed | A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs) |
title_short | A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs) |
title_sort | cluster-based trusted routing method using fire hawk optimizer (fho) in wireless sensor networks (wsns) |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10421948/ https://www.ncbi.nlm.nih.gov/pubmed/37567984 http://dx.doi.org/10.1038/s41598-023-40273-8 |
work_keys_str_mv | AT hosseinzadehmehdi aclusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns AT yoojoon aclusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns AT alisaqib aclusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns AT lanskyjan aclusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns AT mildeovastanislava aclusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns AT yousefpoormohammadsadegh aclusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns AT ahmedomedhassan aclusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns AT rahmaniamirmasoud aclusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns AT tightizlilia aclusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns AT hosseinzadehmehdi clusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns AT yoojoon clusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns AT alisaqib clusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns AT lanskyjan clusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns AT mildeovastanislava clusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns AT yousefpoormohammadsadegh clusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns AT ahmedomedhassan clusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns AT rahmaniamirmasoud clusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns AT tightizlilia clusterbasedtrustedroutingmethodusingfirehawkoptimizerfhoinwirelesssensornetworkswsns |