Trust-based secure clustering in WSN-based intelligent transportation systems

Increasing the number of vehicles on roads leads to congestion and safety problems. Wireless Sensor Network (WSN) is a promising technology providing Intelligent Transportation Systems (ITS) to address these problems. Usually, WSN-based applications, including ITS ones, incur high communication overhead to support efficient connectivity and communication activities. In the ITS environment, clustering would help in addressing the high communication overhead problem. In this paper, we introduce a bio-inspired and trust-based cluster head selection approach for WSN adopted in ITS applications. A trust model is designed and used to compute a trust level for each node and the Bat Optimization Algorithm (BOA) is used to select the cluster heads based on three parameters: residual energy, trust value and the number of neighbors. The simulation results showed that our proposed model is energy efficient (i.e., its power consumption is more efficient than many well-known clustering algorithm such as LEACH, SEP, and DEEC under homogeneous and heterogeneous networks). In addition, the results demonstrated that our proposed model achieved longer network lifetime, i.e., nodes are kept alive longer than what LEACH, SEP and DEEC can achieve. Moreover, the the proposed model showed that the average trust value of selected Cluster Head (CH) is high under different percentage (30% and 50%) of malicious nodes.

[1]  Tiecheng Wang,et al.  TIBCRPH: Traffic Infrastructure Based Cluster Routing Protocol with Handoff in VANET , 2010, The 19th Annual Wireless and Optical Communications Conference (WOCC 2010).

[2]  Tarek Gaber,et al.  Trust and Bio-Inspired-Based Clustering Techniques in Wireless Sensor Networks: A Survey , 2017, AISI.

[3]  Ramjee Prasad,et al.  Mobility and Heterogeneity Aware Cluster-Based Data Aggregation for Wireless Sensor Network , 2016, Wirel. Pers. Commun..

[4]  Ramachandran Amutha,et al.  Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms , 2013, Journal of Communications and Networks.

[5]  P. Ganesh Kumar,et al.  An Effective Clustering Approach with Data Aggregation Using Multiple Mobile Sinks for Heterogeneous WSN , 2016, Wirel. Pers. Commun..

[6]  Gennaro Boggia,et al.  Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.

[7]  Lawrence A. Klein,et al.  Sensor Technologies and Data Requirements for Its , 2001 .

[8]  Ahmed Farouk,et al.  Dynamic Multi-hop Clustering in a Wireless Sensor Network: Performance Improvement , 2017, Wireless Personal Communications.

[9]  Enrique Alba,et al.  Performance analysis of optimized VANET protocols in real world tests , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[10]  Mohamed Elhoseny,et al.  Optimizing K-coverage of mobile WSNs , 2018, Expert Syst. Appl..

[11]  Xin-She Yang,et al.  Bat Algorithm and Cuckoo Search: A Tutorial , 2013, Artificial Intelligence, Evolutionary Computing and Metaheuristics.

[12]  Jaecheol Ryou,et al.  ID-based sensor node authentication for multi-layer sensor networks , 2014, Journal of Communications and Networks.

[13]  Ahmed Farouk,et al.  K-Coverage Model Based on Genetic Algorithm to Extend WSN Lifetime , 2017, IEEE Sensors Letters.

[14]  Maamoun Ahmed,et al.  Data Mining and Fusion Techniques for WSNs as a Source of the Big Data , 2015 .

[15]  Aboul Ella Hassanien,et al.  Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations , 2014, Bio-inspiring Cyber Security and Cloud Services.

[16]  Xiaohui Yuan,et al.  An energy efficient encryption method for secure dynamic WSN , 2016, Secur. Commun. Networks.

[17]  Wang-Cheol Song,et al.  Traffic aware optimized zone based hierarchal link state routing protocol for VANET , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[18]  Yang Li-zhen,et al.  SLEACH: Secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks , 2008, Wuhan University Journal of Natural Sciences.

[19]  Mohamed Elhoseny,et al.  A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption , 2016, J. King Saud Univ. Comput. Inf. Sci..

[20]  Song Guo,et al.  Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications , 2014, IEEE Transactions on Parallel and Distributed Systems.

[21]  Mohamed Elhoseny,et al.  Balancing Energy Consumption in Heterogeneous Wireless Sensor Networks Using Genetic Algorithm , 2015, IEEE Communications Letters.

[22]  Mohsen Guizani,et al.  Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[23]  Mohamed Elhoseny,et al.  Self-maintenance model for Wireless Sensor Networks , 2017, Comput. Electr. Eng..

[24]  Xuemin Shen,et al.  EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Mobile Computing.

[25]  Werner Wiesbeck,et al.  Automatic cell planning for a low-cost and spectrum efficient wireless network , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).

[26]  Aboul Ella Hassanien,et al.  An Overview of Self-Protection and Self-Healing in Wireless Sensor Networks , 2014, Bio-inspiring Cyber Security and Cloud Services.

[27]  Xin-She Yang,et al.  A New Metaheuristic Bat-Inspired Algorithm , 2010, NICSO.

[28]  Abdelhamid Mellouk,et al.  QoS Swarm Bee Routing Protocol for Vehicular Ad Hoc Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[29]  Joaquim Ferreira,et al.  Introduction to Intelligent Transportation Systems , 2016 .

[30]  Jean-Marie Bonnin,et al.  Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.