Abstract
Cooperation among sensor nodes is always essential for achieving reliable data dissemination in Wireless Sensor Network (WSNs). The sensor nodes can cat as a host or a router in which they establish communication between. In this context, the reliability of intermediate sensor nodes that establishes the routing path between the source and destination need to be dynamically assessed for enforcing cooperation. Thus, potential dynamic multi-criteria decision-making model for enforcing cooperation is necessary as the presence of malicious and selfish nodes in WSNs. Which severely crumbles the network performance. In this paper, Hybrid Grey PIPRECIA and Grey OCRA Method (HGP-GOCRAM) -based Dynamic Multi-Criteria Decision-Making Model is proposed for thwarting malicious and selfish nodes for achieving maximized cooperation among the sensor nodes of the routing path. This HGP-GOCRAM specifically used Grey Pivot Pairwise Relative Criteria Importance Assessment (PIPRECIA-G) for determining the weights of the criteria considered for evaluating the cooperation degree of the sensor nodes. It further used Grey Operational Competitiveness Rating (OCRA-G) for identifying the rank of the sensor nodes to isolate the worst cooperating nodes dynamically from the rouging path. The simulation results of the proposed HGP-GOCRAM achieved under different malicious and selfish node confirmed an improved packet delivery rate of 22.31%, maximized throughput of 19.78%, with minimized energy consumptions of 20.98% and end-to-end delay of 22.64%, better than the competitive cooperation enforcement approaches used for investigation. The results also proved that the proposed HGP-GOCRAM is capable in achieving rapid and accurate detection and isolation of malicious and selfish nodes.
Similar content being viewed by others
Availability of data and materials
Not Applicable.
References
Sun W, Zhang L, Lv Q, Liu Z, Li W, Li Q (2023) Dynamic collaborative optimization of end-to-end delay and power consumption in wireless sensor networks for smart distribution grids. Comput Commun 202:87–96
Dutta H, Bhuyan AK, Biswas S (2023) Reinforcement learning based flow and energy management in resource-constrained wireless networks. Comput Commun 202:73–86
Praveen R, Pabitha P (2023) ASK-RAM-IMOT: Autonomous shared keys based remote authentication method for Internet of Medical Things applications. Wirel Pers Commun 131(1):273–293. https://doi.org/10.1007/s11277-023-10428-x
Praveen R, Pabitha P (2023) Improved Gentry–Halevi’s fully homomorphic encryption‐based lightweight privacy preserving scheme for securing medical Internet of Things Abstract. Trans Emerg Telecommun Technol 34(4). https://doi.org/10.1002/ett.v34.4, https://doi.org/10.1002/ett.4732
Praveen R, Pabitha P (2023) A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications. J Intell Fuzzy Syst 44(5):7523–7542. https://doi.org/10.3233/JIFS-223617
Li Y, Wu Y (2020) Combine clustering with game to resist selective forwarding in wireless sensor networks. IEEE Access 8:138382–138395
Abbas Q, Hassan SA, Qureshi HK, Dev K, Jung H (2022) A comprehensive survey on age of information in massive IoT networks. Comput Commun
Pabitha P, Chandra Priya J, Praveen R, Jagatheswari S (2023) ModChain: a hybridized secure and scaling blockchain framework for IoT environment. Int J Inf Technol 15(3):1741–1754. https://doi.org/10.1007/s41870-023-01218-6
Yang H, Zhang X, Cheng F (2021) A novel algorithm for improving malicious node detection effect in wireless sensor networks. Mobile Networks and Applications 26:1564–1573
Madhavi S, Santhosh NC, Rajkumar S, Praveen R (2023) Pythagorean Fuzzy Sets-based VIKOR and TOPSIS-based multi-criteria decision-making model for mitigating resource deletion attacks in WSNs. J Intell Fuzzy Syst 44(6):9441–9459
Saha S, Arya R (2022) ARCMT: Anchor node-based range free cooperative multi trusted secure underwater localization using fuzzifier. Comput Commun 193:246–265
Ramasamy V, Srirangan J, Ramalingam P (2021) Fuzzy and position particle swarm optimized routing in VANET. Int J Electr Comput Eng Syst 12(4):199–206
Madhavi S, Udhaya Sankar SM, Praveen R, Jagadish Kumar N (2023) A fuzzy COPRAS-based decision-making framework for mitigating the impact of vampire sensor nodes in wireless sensor nodes (WSNs). Int J Inf Technol 15(4):1859–1870
Dhanaraj RK, Jhaveri RH, Krishnasamy L, Srivastava G, Maddikunta PKR (2021) Black-hole attack mitigation in medical sensor networks using the enhanced gravitational search algorithm. Int J Uncertain Fuzziness Knowl Based Syst 29(Suppl-2):297–315
Roshini A, Kiran KVD, Anudeep KV (2021) Hybrid acknowledgment scheme for early malicious node detection in wireless sensor networks. In: International Conference on Intelligent and Smart Computing in Data Analytics: ISCDA 2020 (pp 263–270). Springer Singapore
Liu Y, Wu Y (2021) Employ DBSCAN and neighbor voting to screen selective forwarding attack under variable environment in event-driven wireless sensor networks. IEEE Access 9:77090–77105
Thangaramya K, Kulothungan K, Indira Gandhi S, Selvi M, Santhosh Kumar SVN, Arputharaj K (2020) Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Comput 24:16483–16497
Sudhakar T, Praveen R, Jagatheswari S (2022) An improved proxy-vehicle based authentication scheme for vehicular ad-hoc networks. Int J Inf Technol 14(5):2441–2449. https://doi.org/10.1007/s41870-022-00938-5
Saidi A, Benahmed K, Seddiki N (2020) Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks. Ad Hoc Netw 106:102215
Al-Maslamani N, Abdallah M (2020) Malicious node detection in wireless sensor network using swarm intelligence optimization. In: 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) (pp 219–224). IEEE
Lai Y, Tong L, Liu J, Wang Y, Tang T, Zhao Z, Qin H (2022) Identifying malicious nodes in wireless sensor networks based on correlation detection. Comput Secur 113:102540
Ge X, Han QL, Zhong M, Zhang XM (2019) Distributed Krein space-based attack detection over sensor networks under deception attacks. Automatica 109:108557
Hu H, Han Y, Wang H, Yao M, Wang C (2021) Trust-aware secure routing protocol for wireless sensor networks. ETRI J 43(4):674–683
Anand C, Vasuki N (2021) Trust based DoS attack detection in wireless sensor networks for reliable data transmission. Wireless Pers Commun 121(4):2911–2926
Arivunambi A, Paramarthalingam A (2022) Intelligent slime mold algorithm for proficient jamming attack detection in wireless sensor network. Glob Transit Proc 3(2):386–391
Teng Z, Du C, Li M, Zhang H, Zhu W (2022) A wormhole attack detection algorithm integrated with the node trust optimization model in WSNs. IEEE Sens J 22(7):7361–7370
Shahid J, Muhammad Z, Iqbal Z, Almadhor AS, Javed AR (2022) Cellular automata trust-based energy drainage attack detection and prevention in Wireless Sensor Networks. Comput Commun 191:360–367
Khan T, Singh K, Ahmad K, Ahmad KAB (2023) A secure and dependable trust assessment (SDTS) scheme for industrial communication networks. Sci Rep 13(1):1910
Sudha I, Mustafa MA, Suguna R, Karupusamy S, Ammisetty V, Shavkatovich SN, Ramalingam M, Kanani P (2023) Pulse jamming attack detection using swarm intelligence in wireless sensor networks. Optik 272:170251
Premkumar M, Ashokkumar SR, Jeevanantham V, Mohanbabu G, AnuPallavi S (2023) Scalable and energy efficient cluster-based anomaly detection against denial-of-service attacks in wireless sensor networks. Wireless Pers Commun 129(4):2669–2691
Alansari Z, Anuar NB, Kamsin A, Belgaum MR (2023) RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things. PeerJ Computer Science 9:e1309
Beslin Pajila PJ, Golden Julie E, Harold Robinson Y (2023) ABAP: Anchor node based DDoS attack detection using adaptive neuro-fuzzy inference system. Wireless Pers Commun 128(2):875–899
Vijayalakshmi S, Bose S, Logeswari G, Anitha T (2023) Hybrid defense mechanism against malicious packet drop** attack for MANET using game theory. Cyber security and applications 1:100011
Desnitsky V (2022) Modeling and Detection of Denial-of-Sleep Attacks on Autonomous IoT Devices in Wireless Sensor Networks. In: Security T, Models P (eds) and Architectures in IoT Environments. Springer International Publishing, Cham, pp 77–97
Dani V (2023) Detection of Denial-of-Service Attack Using Weight based Trust Aware Routing Approach. J Inf Assur Secur 18(3)
Udhaya Sankar SM, Jagadish Kumar N, Elangovan G, Praveen R (2023) An Integrated Z-Number and DEMATEL-Based Cooperation Enforcement Scheme for Thwarting Malicious Nodes in MANETs. Wirel Pers Commun 130(4):2531–2563
Udhaya Sankar SM, Praveen R, Jagadish Kumar N, Jagatheswari S (2023) Fuzzy ELECTRE multi-criteria decision-making technique for achieving reliable data dissemination in MANETs. Int J Inf Technol 15(4):1985–1998
Jagatheswari S, Ramalingam P, Chandra Priya J (2022) Improved grey relational analysis-based TOPSIS method for cooperation enforcing scheme to guarantee quality of service in MANETs. Int J Inf Technol 14(2):887–897
Janakiraman S, Priya MD (2022) Selfish node detection scheme based on bates distribution inspired trust factor for MANETs. EAI Endorsed Trans Energy Web 9(6):e1–e1
Author information
Authors and Affiliations
Contributions
All the authors are equally contributed to the paper.
Corresponding author
Ethics declarations
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Conflict of interest
The authors declare that they have no conflict of interest.
Competing interests
Not Applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Madhavi, S., Praveen, R., Jagadish Kumar, N. et al. Hybrid Grey PIPRECIA and Grey OCRA method-based dynamic multi-criteria decision-making model for mitigating non-cooperating node attacks in WSNs. Peer-to-Peer Netw. Appl. 16, 2607–2629 (2023). https://doi.org/10.1007/s12083-023-01543-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-023-01543-4