Log in

Nature-inspired adaptive decision support system for secured clustering in cyber networks

  • 1203: Applications of Advanced Artificial Intelligence in Multimedia and Information Security
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) technology has proved that Wireless Sensor Networks (WSN) is important for all IoT application areas. WSN combined with other advanced technologies like Artificial Intelligence (AI) brings automation via the sensing, transmitting, and monitoring steps. However, the cyber threats such as Malware, Distributed Denial of Service Attack (DDoS), and Man in the Middle (MitM), etc. limits the potential of such networks. Several security methods were introduced in last decade to protect the WSN from various cyber threats; however, due to resource-constrained sensor nodes, designing the energy-efficient security algorithm for WSN is a widely studied research problem. In the proposed work, a novel Nature-inspired Decision Support System for Secure Clustering (NIDSC) is proposed to overcome the security issues with minimum resource consumptions and computational overhead. In NIDSC, a hybrid trust model is designed to evaluate each sensor node before selecting Cluster Head (CH) by measuring various sensor node parameters, to achieve a reliable decision support system which classifies each node as either legitimate or attacker. Later, the proposed decision support system along with clustering optimization is formulated for CH selection using a natural evolution-based hybrid trust model. Due to its fast convergence over other optimization algorithms, the nature-inspired Differential Evolution (DE) algorithm is used to perform Decision Support System (DSS) for optimal and secure WSN clustering. The proposed method is a lightweight trust-based decision-making method for Quality of Service (QoS) clustering to establish secure data transmission in intra-cluster and/or inter-cluster communication. The simulation is carried out to analyze and compare the performance of the proposed method with the existing works such as Low Energy Adaptive Clustering Hierarchy(LEACH), Trust Management System (TMS), and Energy-efficient Trusted Moth Flame Optimization and Genetic Algorithm based clustering algorithm(eeTMFO/GA). The comparisons were mainly focused on throughput, Packet Delivery Ratio (PDR), delay, communication overhead, and energy consumption to validate the performance of the proposed method. The experimental results found that the proposed method has got improved throughput value (~3 kbps), improved PDR (~4%), minimum delay (~0.01 seconds), less communication overhead (~0.75 ms, and less energy consumption (~0.003 joules) as compared to the existing methods on various testcase scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Germany)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Abbreviations

NIDSC:

Nature-Inspired Decision-Support System for Secure Clustering

CH:

Cluster Head

BS:

Base Station

DE:

Differential Evolution

NS2/NS3:

Network Simulator-2/3

QoS:

Quality of Service

DDoS:

Distributed Denial of Service

MitM:

Man in the Middle

WSN:

Wireless Sensor Network

IoT:

Internet of Things

DSS:

Decision Support System

LEACH:

Low-Energy Adaptive Clustering Hierarchy

HEED:

Hybrid Energy Efficient Distributed protocol

HBMA:

Honey Bee Mating Algorithm

GA:

Genetic Algorithm

ABC:

Ant Bee Colony

TECP:

Threshold-sensitive Energy-efficient Clustering Protocol

MFO:

Moth Flam Optimization

PSO:

Particle Swarm Optimization

E2HRC:

Energy Efficient Heterogeneous Ring Clustering Routing protocol

SPT:

Shortest Path Tree

BS:

Base Station

TDMA:

Time Division Multiple Access

PTB:

Packet Transmission Behaviour

RER:

Residual Energy Ratio

DoC:

Degree of Connectivity

RSSI:

Received Signal Strength Indicator

ACK:

Acknowledgement

CM:

Cluster Member

TMS:

Trust Management Scheme

eeTMFO/GA:

Energy Efficient Trusted MFO and Genetic Algorithm

CBR:

Cooperative balancing routing

MAC:

Medium Access Control

S = {s 1, s 2, …, s N}:

sensor nodes

X × Y :

X and Y axis represents network width and height

C = {c 1, c 2, …, c M}:

(Clusters)

M :

Number of clusters.

A = {a 1, a 2, …, a Z}:

malicious nodes/ attackers.

N :

number of sensor nodes.

s i :

Source sensor node.

s j :

Neighbour sensor node of si.

t:

Time

ptb(s i(t)):

Packet transmission behavior of node si at time t

pfr(s i, j):

Faction to calculate packet forwarding ratio of siby sj

af(s i):

Availability factor of sibysj

w1 , w2:

weight parameters

FP(s i, j(t)):

number of successful forwarded packets by si at time t

af(s i, j):

availability factor of si and sj

AH(s i, j(t)):

number of acknowledged HELLO packets

NAH(s i, j(t)):

number of non-acknowledged HELLO packets

rer(s i):

residual energy of node si

E initial(s i):

initial energy of the node si

E residual(s i(t)):

remaining energy of the node si at time t

i ≠ j :

The Value of i is not equal to the value of j

dist (i, j):

geographical distance between the two nodes

rssi :

communication range of the nodei

cr(s i(t)):

congestion rate of node si at time congestion rate of node t

Q allocated(s i(t)):

current number of packets processing at node si at time t

Q total :

maximum capacity of queue allocated to each sensor node

f(s i(t)) f(s i):

of node siat time t

λ 1, λ 2, λ 3, λ 4 :

weight parameters

p :

Initial population

G :

Initial iteration

G max :

Maximum number of iterations

fpbest :

fitness particle (local) best value of a node

gbest :

global best value of the node

fgbest :

fitness global best value of a node

pbest :

particle (local) best value of the node

q :

current node

lnodes :

Legitimate nodes

mnodes :

Malicious nodes

M :

Number of clusters

CM :

Set of nodes in cluster (Cluster Member)

CH :

Cluster heads

getfitness :

Initial fitness value selected randomly from population

threshold :

Predefined value used to detect malicious node and legitimate nodes present in the network

References

  1. Ambreen NH (2013) Wireless sensor network through shortest path route. Intern J Emerg Technol Adv Engin 3(2):158–161

    Google Scholar 

  2. Bagci H, Yazici A (2010) An energy aware fuzzy unequal clustering algorithm for wireless sensor networks. In fuzzy systems (FUZZ), 2010 IEEE international conference, pp. 1–8

  3. Cho JH, Swami A, Chen IR (2011) A survey on trust management for mobile ad hoc networks. IEEE Commu Surv Tutor 13(4):562–583

    Article  Google Scholar 

  4. Dahane A, Berrached NE, Loukil A (2015) Balanced and safe weighted clustering algorithm for mobile wireless sensor networks. In IFIP international conference on computer science and its applications, 429–441

  5. SR Deepa (2001) "Cluster optimization in wireless sensor network based on optimized Artificial Bee Colony algorithm," IET Networks

  6. Elhoseny M, Hassanien AE (2019) Secure data transmission in WSN: an overview. Dynamic Wireless Sensor Networks: 115–143

  7. Enami N, Moghadam RA, Ahmadi KD (2010) A new neural network based energy efficient clustering protocol for wireless sensor networks. In 5th international conference on computer sciences and convergence information technology (ICCIT), IEEE: 40–45

  8. Geetha V, Chandrasekaran K (2014) A distributed trust based secure communication framework for wireless sensor network. Wirel Sens Netw 6:173–183

    Article  Google Scholar 

  9. Gilbert EPK, Baskaran K, Rajsingh EB, Lydia M, Selvakumar AI (2019) Trust aware nature inspired optimised routing in clustered wireless sensor networks. Int J Bio-Insp Comput 14(2):103

    Article  Google Scholar 

  10. Guo W, Looi M (2012) A framework of trust-energy balanced procedure for cluster head selection in wireless sensor networks. J Netw 7(10):1592–1599

    Google Scholar 

  11. He T, Krishnamurthy S, Stankovic J A, Abdelzaher T, Luo L, Stoleru R, Yan T, Gu L, Hui J, Krogh B (2004).Energy-efficient surveillance system using wireless sensor networks. In proceedings of the 2nd international conference on Mobile Systems, Applications, and Services, 270–283

  12. Heinzelman WR, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd annual Hawaii international conference on system sciences, 10

  13. Hoang D C, Yadav P, Kumar R, Panda SK (2010) A robust harmony search algorithm based clustering protocol for wireless sensor networks. In communications workshops (ICC), 2010 IEEE international conference, 1–5

  14. John J, Rodrigues P (2019) MOTCO: multi-objective Taylor crow optimization algorithm for cluster head selection in energy aware wireless sensor network. Mob Netw Appl 24(5):1509–1525

  15. Juliana R, Maheswari PU (2016) An energy efficient cluster head selection technique using network trust and swarm intelligence. Wirel Pers Commun 89(2):351–364

  16. Kuila P, Jana PK (2014) A novel differential evolution based clustering algorithm for wireless sensor networks. Appl Soft Comput 25:414–425

    Article  Google Scholar 

  17. Mahajan S, Dhiman PK (2016) Clustering in WSN: a review. Int J Adv Res Comput Sci 7:198–201

    Google Scholar 

  18. Mallick C, Satpathy S (2018) Challenges and design goals of wireless sensor networks: a state-of-the-art review. Int J Comput Appl 179:42–47

    Google Scholar 

  19. Mittal N (2019) Moth flame optimization based energy efficient stable clustered routing approach for wireless sensor networks. Wirel Pers Commun 104(2):677–694

    Article  Google Scholar 

  20. Nimbalkar NB, Das S, Wagh SJ (2015) Trust based energy efficient clustering using genetic algorithm in wireless sensor networks (teecga). Int J Comput Appl 112(9):30–33

  21. Pavani M, Rao PT (2019) Adaptive PSO with optimized firefly algorithms for secure cluster based routing in wireless sensor networks. IET Wirel Sens Syst 9(5):274–283

  22. Qureshi S G, Shandilya S K (2020) Advances in cyber security paradigm: a review. A. Abraham et al. (Eds.): HIS 2019, AISC 1179, 268–276

  23. Qureshi SG, Shandilya SK (2021) Novel fuzzy based crow search optimization algorithm for secure node-to-node data transmission in WSN. Wireless personal communications, 1-21

  24. Qureshi SG, Shandilya SK (2021) Novel hybridized crow whale optimization and QoS based bipartite coverage routing for secure data transmission in wireless sensor networks. J Intell Fuzzy Syst 1–15

  25. Ramesh S, Yaashuwanth C (2019) Enhanced approach using trust based decision making for secured wireless streaming video sensor networks. Multimed Tools Appl 79(15):10157–10176

    Google Scholar 

  26. Rehman E, Sher M, Naqvi SHA, Khan KB, Ullah K (2017) Energy efficient secure trust based clustering algorithm for mobile wireless sensor network. Journal of computer networks and communications, pp 8-p

  27. Sahoo R, Singh M, Sardar A R, Mohapatra S, Sarkar SK (2013) TREE-CR: trust based secure and energy efficient clustering in WSN. In emerging trends in computing, communication and nanotechnology (ICE-CCN), 2013 international conference, 532–538

  28. Sahoo R, Singh M, Sahoo BM, Majumder K, Ray S, Sarkar SK (2013) A light weight trust based secure and energy efficient clustering in wireless sensor network: honey bee mating intelligence approach. Procedia Technol 10:515–523

  29. Sharawi M, Emary E (2016) Clustering optimization for WSN based on nature-inspired algorithms. In nature inspired computation in engineering, Springer, Cham: 111–132

  30. Sharma R, Vashisht V, Singh AV, Kumar S (2018) Analysis of existing clustering algorithms for wireless sensor networks. Sys Perfor Manag Anal:259–277

  31. Sharma R, Vashisht V, Singh U (2019) Nature inspired algorithms for energy efficient clustering in wireless sensor networks. 2019 9th international conference on cloud computing, Data Sci Eng (confluence), IEEE: 365–370

  32. Sharma R, Vashisht V, Singh U (2020) EeTMFO/GA: a secure and energy efficient cluster head selection in wireless sensor networks. Telecommun Syst 74(3):253–268

  33. Siddiqi M, Mugheri A, Khoso M (2018) Analysis on security methods of wireless sensor network (WSN). Sukkur IBA J Comput Math Sci 2(1):52–60

    Google Scholar 

  34. Singh A, Sharma S, Singh J (2021) Nature-inspired algorithms for wireless sensor networks: a comprehensive survey. Comput Sci Rev 39:100342

    Article  MathSciNet  Google Scholar 

  35. Song MAO, Lin ZC (2011) Unequal clustering algorithm for WSN based on fuzzy logic and improved ACO. J China Univ Posts Telecom 18(6):89–97

    Article  Google Scholar 

  36. Subramanian P, Sahayaraj JM, Senthilkumar S, Alex DS (2020) A hybrid Grey wolf and crow search optimization algorithm based optimal cluster head selection scheme for wireless sensor networks. Wireless personal communications, 1-21

  37. Tolba FD, Ajib W, Obaid A (2013) Distributed clustering algorithm for mobile wireless sensors networks. In SENSORS, 1–4

  38. Umar IA, Hanapi ZM, Sali A, Zulkarnain ZA (2017) Trufix: a configurable trust-based cross-layer protocol for wireless sensor networks. IEEE Access 5:2550–2562

  39. Wang T, Zhang G, Yang X, Vajdi A (2016) A trusted and energy efficient approach for cluster-based wireless sensor networks. Int J Distrib Sen Netw 12(4):3815834

    Article  Google Scholar 

  40. Weichao W, Fei D, Qijian X (2009) An improvement of LEACH routing protocol based on trust for wireless sensor networks. In 2009 5th international conference on wireless communications. Networking and mobile computing 1–4

  41. Yilmaz O, Demirci S, Kaymak Y, Ergun S, Yildirim A (2012) Shortest hop multipath algorithm for wireless sensor networks. Comput Math Appl 63(1):48–59

  42. Zhang W, Li L, Han G, Zhang L (2017) E2HRC: an energy efficient heterogeneous ring clustering routing protocol for wireless sensor networks. IEEE Access 5:1702–1713

Download references

Funding

Not applicable as no funding was received for this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shishir Kumar Shandilya.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. Hence, the authors declare No Conflict of Interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Qureshi, S.G., Shandilya, S.K. Nature-inspired adaptive decision support system for secured clustering in cyber networks. Multimed Tools Appl 83, 3153–3187 (2024). https://doi.org/10.1007/s11042-022-13336-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13336-7

Keywords

Navigation