An Energy Efficient Cluster Head Selection Technique Using Network Trust and Swarm Intelligence

Wireless sensor networks (WSN) have started appearing in our daily life including home, office, industry and vehicles to name a few. The incremental usage of WSN for environmental monitoring demands safety and security enhancement. Strong security mechanisms incurred by WSN leads to resource and energy utilization overhead resulting in faster drainage of energy. Trust and reputation have been extensively used in literature to detect misbehaving nodes and thus improve overall network Quality of Service (QoS) by avoiding them. This work proposed a trust mechanism for effective cluster head selection in a multi hop WSN using Artificial Bee Colony algorithm. The results show that the proposed method successfully avoids nodes with selfish behavior and malicious nature that enable Black Hole, Denial of Service, or packet dropping. Results illustrates improvements in the packet delivery ratio and energy utilization.

[1]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[2]  Rodrigo Roman,et al.  Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..

[3]  Yuguang Fang,et al.  A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[4]  Weisong Shi,et al.  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.

[5]  Shailender Gupta,et al.  IMPACT OF SELFISH NODE CONCENTRATION IN MANET S , 2011 .

[6]  Jaydip Sen,et al.  A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..

[7]  Dong Yang,et al.  TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[8]  Zhiping Liu,et al.  Performance Comparison of Single and Multi-Path Routing Protocol in MANET with Selfish Behaviors , 2010 .

[9]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[10]  Nicholas R. Jennings,et al.  A Probabilistic Trust Model for Handling Inaccurate Reputation Sources , 2005, iTrust.

[11]  Dervis Karaboga,et al.  Parameter Tuning for the Artificial Bee Colony Algorithm , 2009, ICCCI.

[12]  Thomas Kunz,et al.  New findings on the complexity of cluster head selection algorithms , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[13]  Networks Shio,et al.  A Survey of Energy-Efficient Hierarchical Cluster-Based Routing in Wireless Sensor , 2010 .

[14]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[15]  Wei Wang,et al.  A Trust Establishment Scheme for Cluster-Based Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[16]  Ahmed Ayadi,et al.  Energy-Efficient and Reliable Transport Protocols for Wireless Sensor Networks: State-of-Art , 2011, Wirel. Sens. Netw..

[17]  Sajid Hussain,et al.  Hierarchical Cluster-based Routing in Wireless Sensor Networks , 2006 .

[18]  M. R. Tripathy,et al.  Routing Protocols in Wireless Sensor Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[19]  Gongxuan Zhang,et al.  Hierarchical Clustering Routing Protocol Based on Optimal Load Balancing in Wireless Sensor Networks , 2013, APPT.

[20]  S. Challa,et al.  Trust Management in Wireless Sensor Networks , 2007 .

[21]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[22]  Shio Kumar Singh,et al.  A Survey of Energy-Efficient Hierarchical Cluster-Based Routing in Wireless Sensor , 2010 .

[23]  Niki Pissinou,et al.  Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[24]  Xiangliang Zhang,et al.  CAF: Cluster Algorithm and A-Star with Fuzzy Approach for Lifetime Enhancement in Wireless Sensor Networks , 2014 .

[25]  Kalpana Sharma,et al.  Wireless Sensor Networks: An Overview on its Security Threats , 2010 .

[26]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[27]  Zhiping Jia,et al.  Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..

[28]  Rajib Mall,et al.  Quality of Service (QoS) Provisions in Wireless Sensor Networks and Related Challenges , 2010, Wirel. Sens. Netw..

[29]  V. Palanisamy,et al.  AN EFFICIENT CLUSTER BASED APPROACH FOR MULTI -SOURCE MULTICAST ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS , 2011 .

[30]  Yunlong Zhu,et al.  A Clustering Approach Using Cooperative Artificial Bee Colony Algorithm , 2010 .

[31]  Vallipuram Muthukkumarasamy,et al.  Trust-Based Cluster Head Selection Algorithm for Mobile Ad Hoc Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[32]  Amitava Datta,et al.  Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.

[33]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[34]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[35]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[36]  Francisco Rodríguez,et al.  Simulation of Greenhouse Climate Monitoring and Control with Wireless Sensor Network and Event-Based Control , 2009, Sensors.

[37]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[38]  Vahid Majid Nezhad,et al.  Novel Cluster Based Routing Protocol in Wireless Sensor Networks , 2010 .

[39]  Safiqul Islam,et al.  Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches , 2011 .

[40]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[41]  Antonio Capone,et al.  EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants , 2011, 2011 Proceedings IEEE INFOCOM.

[42]  Smriti Kumar Sinha,et al.  A New Trust Model Based on Social Characteristics and Reputation Mechanisms Using Best Local Prediction Selection Approach , 2009, 2009 International Conference on New Trends in Information and Service Science.