Log in

Trust aware secured energy efficient fuzzy clustering-based protocol in wireless sensor networks

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Recent advancements in Wireless Sensor Networks (WSNs) have generated interest in the field of sensor tracking events. Environment monitoring is one of the most important applications where WSNs are used to guarantee animal conservation. WSNs are crucial in many real-time applications because of their topology, scale, and communication capabilities. Data privacy and integrity are the essential components that maximize network, security, trust and effectiveness. The fundamental problem with WSNs is the effective communication and efficient information to exchange among several sensor nodes for extending the lifespan of the WSNs. Moreover, along with these issues, it is necessary to measure an optimal path with the highest degree of reliability. In this paper, a new fuzzy and secured clustering algorithm is proposed for improving the energy efficiency and security. In the proposed method, clustering is proved to be the best strategy for energy management of WSN metrics because it uses trust-based fuzzy logic to find malicious nodes and selecting reliable path for data communication. The simulation results show that the proposed technique detects progress in relation to a variety of performance parameters. When compared to other various existing protocols, the proposed work reduces energy consumption while increasing network lifetime and security of communication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availability

Data is available based on personal request.

References

  • Arjunan S, Sujatha P (2018) Lifetime maximization of wireless sensor network using fuzzy based unequal clustering and ACO based routing hybrid protocol. Appl Intell 48(8):2229–2246

    Article  Google Scholar 

  • Arjunan S, Pothula S, Ponnurangam D (2018) F5N-based unequal clustering protocol (F5NUCP) for wireless sensor networks. Int J Commun Syst 31(17):e3811

    Article  Google Scholar 

  • Augustine S, Ananth JP (2020) Taylor kernel fuzzy C-means clustering algorithm for trust and energy-aware cluster head selection in wireless sensor networks. Wirel Netw 26(7):5113–5132

    Article  Google Scholar 

  • Balakrishnan N, Rajendran A, Pelusi D, Ponnusamy V (2019) Deep belief network enhanced intrusion detection system to prevent security breach in the internet of things. In: Internet of things, p 100112

  • Duan J, Yang D, Zhu H, Zhang S, Zhao J (2014) TSRF: A trust-aware secure routing framework in wireless sensor networks. Int J Distrib Sens Netw 10:1–14

    Article  Google Scholar 

  • Lian H, Wang G, Wang Q (2018) Fully secure traceable and revocable-storage attribute-based encryption with short update keys via subset difference method In: 2018 third international conference on security of smart cities, industrial control system and communications (SSIC), Shanghai, pp 1–8, https://doi.org/10.1109/SSIC.2018.8556734

  • Ganesh S, Amutha R (2013) Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms. J Commun Netw 15(4):422–429

    Article  Google Scholar 

  • Ganta SR, Rao NNM (2020) A Novel trust based node integrity verification and privacy preservingmodel for dynamic WSNs. Turk J Comput Math Educ (TURCOMAT) 11(3):1136–1151

    Google Scholar 

  • Gu W, Dutta N, Chellappan S, Bai X (2011) Providing end-to-end secure communications in wireless sensor networks. IEEE Trans Netw Serv Manage 8(3):205–218

    Article  Google Scholar 

  • Jasper J (2021) A secure routing scheme to mitigate attack in wireless adhoc sensor network. Comput Secur 103:102197

    Article  Google Scholar 

  • Kandris D, Nakas C, Vomvas D, Koulouras G (2020) Applications of wireless sensor networks: an up-to-date survey. Appl Syst Innov 3(1):14

    Article  Google Scholar 

  • Karthick PT, Palanisamy C (2019) Optimized cluster head selection using krill herd algorithm for wireless sensor network. Automatika 60(3):340–348

    Article  Google Scholar 

  • Kaur G, Varsha (2016) Review on hierarchical unequal clustering-based protocols in wireless sensor network. Int J Recent Innov Trends Comput Commun 4 96–99

  • Kerrache CA, Calafate CT, Cano JC, Lagraa N, Manzoni P (2016) Trust management for vehicular networks: an adversary-oriented overview. IEEE Access 4:9293–9307

    Article  Google Scholar 

  • Khalaf OI, Sabbar BM (2019) An overview on wireless sensor networks and finding optimal location of nodes. Period Eng Nat Sci (PEN) 7(3):1096–1101

    Google Scholar 

  • Khan T, Singh K, Hasan MH, Ahmad K, Reddy GT, Mohan S, Ahmadian A (2021) ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs. Futur Gener Comput Syst 125:921–943

    Article  Google Scholar 

  • Kumar Kashyap P, Kumar S, Dohare U, Kumar V, Kharel R (2019) Green computing in sensors-enabled internet of things: neuro fuzzy logic-based load balancing. Electronics 8(4):384

    Article  Google Scholar 

  • Kuo YW, Li CL, Jhang JH, Lin S (2018) Design of a wireless sensor network-based IoT platform for wide area and heterogeneous applications. IEEE Sens J 18(12):5187–5197

    Article  Google Scholar 

  • Lee S-B, Choi Y-H (2006) A secure alternate path routing in sensor networks. Comput Commun 30(1):153–165

    Article  Google Scholar 

  • Li S, Zhao S, Wang X, Zhang K, Li L (2014) Adaptive and secure load-balancing routing protocol for service-oriented wireless sensor networks. IEEE Syst J 8(3):858–867

    Article  Google Scholar 

  • Liang W, Tang M et al (2019) A secure fabric blockchain-based data transmission technique for industrial internet-of-things. IEEE Trans Industr Inf 15(6):3582–3592. https://doi.org/10.1109/TII.2019.2907092

    Article  Google Scholar 

  • Liang W, Li K-C et al (2020) An industrial network intrusion detection algorithm based on multi-feature data clustering optimization model. IEEE Trans Industr Inf 16(3):2063–2071. https://doi.org/10.1109/TII.2019.2946791

    Article  Google Scholar 

  • Liu Y, Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensics Secur 11(9):2013–2027

    Article  Google Scholar 

  • Mahmoud MM, Lin X, Shen XS (2015) Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Trans Parallel Distrib Syst 26(4):1140–1153

    Article  Google Scholar 

  • Murthy S, D’Souza RJ, Varaprasad G (2012) Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks. IEEE Trans Sens J 12(10):2941–2949

    Article  Google Scholar 

  • Rawat P, Chauhan S (2021) Clustering protocols in wireless sensor network: a survey, classification, issues, and future directions. Comput Sci Rev 40:100396

    Article  MathSciNet  MATH  Google Scholar 

  • Roy NR, Chandra P (2019) EEDAC-WSN: energy efficient data aggregation in clustered WSN. In: 2019 international conference on automation, computational and technology management (ICACTM), pp 586–592. IEEE

  • Sah DK, Amgoth T (2020) A novel efficient clustering protocol for energy harvesting in wireless sensor networks. Wirel Netw 26(6):4723–4737

    Article  Google Scholar 

  • Salehian S, Subraminiam SK (2015) Unequal clustering by improved particle swarm optimization in wireless sensor network. Proc Comput Sci 62:403–409

    Article  Google Scholar 

  • Santhosh Kumar SVN, Palanichamy Y, Selvi M, Ganapathy S, Kannan A, Perumal SP (2021) Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks. Wirel Netw 27(6):3873–3894

    Article  Google Scholar 

  • Selvi M, Thangaramya K, Ganapathy S, Kulothungan K, Khannah Nehemiah H, Kannan A (2019) IEEE An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wirel Pers Commun 105(4):1475–1490

    Article  Google Scholar 

  • Song Y, Han Z, Liu FM et al (2015) Attribute-based encryption with hidden policies in the access tree. J Commun 36(09):119–126. https://doi.org/10.11959/j.issn.1000-436x.2015135

    Article  Google Scholar 

  • Sumalatha MS, Nandalal V (2021) An intelligent cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) for securing wireless sensor network (WSN). J Ambient Intell Humaniz Comput 12(5):4559–4573

    Article  Google Scholar 

  • Thangaramya K, Kulothungan K, Logambigai R, Selvi M, Ganapathy S, Kannan A (2019) Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. Comput Netw 151:211–223

    Article  Google Scholar 

  • Vennira Selvi G, Manoharan R (2013) A survey of energy efficient unequal clustering algorithms for wireless sensor networks. Int J Comput Appl 79:0975–8887

    Google Scholar 

  • **ong H, Qin Z (2015) Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans Inf Forensics Secur 10(7):1442–1455

    Article  Google Scholar 

  • Yang SK, Shiue YM, Su ZY, Liu IH, Liu CG (2020) An authentication information exchange scheme in WSN for IoT applications. IEEE Access 8:9728–9738

    Article  Google Scholar 

  • Zhang Y, Wang J, Han D, Wu H, Zhou R (2017) ‘Fuzzy-logic based distributed energy-efficient clustering algorithm for wireless sensor networks.’ Sensors 17(7):1554. https://doi.org/10.3390/s17071554

    Article  Google Scholar 

  • Zhang W, Han D et al (2020) Wireless sensor network intrusion detection system based on MK-ELM. Soft Comput. https://doi.org/10.1007/s00500-020-04678-1

    Article  Google Scholar 

  • Zhang W, Han D, Li KC, Massetto FI (2020) Wireless sensor network intrusion detection system based on MK-ELM. Soft Comput 76:1–14

    Google Scholar 

Download references

Funding

There is no funding available.

Author information

Authors and Affiliations

Authors

Contributions

BK has deigned the algorithms and LV has carried out literature survey and perform simulation for our proposed system.

Corresponding author

Correspondence to Bhukya Kranthikumar.

Ethics declarations

Conflict of interest

There is no competing interests among the authors.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kranthikumar, B., Leela Velusamy, R. Trust aware secured energy efficient fuzzy clustering-based protocol in wireless sensor networks. Soft Comput (2023). https://doi.org/10.1007/s00500-023-08098-9

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s00500-023-08098-9

Keywords

Navigation