An Enhanced Trust-Based Kalman Filter Route Optimization Technique for Wireless Sensor Networks

Wireless Sensor Networks are generally employed for observing and monitoring specific environments. WSNs are made from a huge amount of low-cost sensor nodes separated and distributed in different environments for distributing data through sensor nodes. The collection of data by the various sensors were transmitted into the Base Station. An enhanced Trust-Based Adaptive Acknowledgment based Intrusion-Detection System was proposed from positive distributions in WSNs. A Kalman filter algorithm is used in Multi-objective Particle Swarm Optimization to predict trust nodes over the WSN. Simulations were carried out for non-malicious (0% malicious) networks, and various ranges of malicious nodes in the network were investigated. The outcomes show that the proposed MPSO achieves an improvement of 3.3% than PSO at 0% malicious nodes concerning the PDR. Similarly, at 30% malicious, the PDR of MPSO achieves better by 3.5% than PSO in WSN.

[1]  Sha Xuejun,et al.  An Energy-Efficient Message Passing Approach in MAC Design for Wireless Sensor Networks , 2008, 2008 4th IEEE International Conference on Circuits and Systems for Communications.

[2]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[3]  Reza Firsandaya Malik,et al.  The New Multipoint Relays Selection in OLSR using Particle Swarm Optimization , 2012 .

[4]  Gaoming Yang,et al.  An intrusion detection algorithm for sensor network based on normalized cut spectral clustering , 2019, PloS one.

[5]  Yang Xiao,et al.  Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.

[6]  Gaige Wang,et al.  A Novel Hybrid Bat Algorithm with Harmony Search for Global Numerical Optimization , 2013, J. Appl. Math..

[7]  M Reyes Sierra,et al.  Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art , 2006 .

[8]  Elisa Bertino,et al.  Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.

[9]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[10]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[11]  V. Selvi,et al.  Comparative Analysis of Ant Colony and Particle Swarm Optimization Techniques , 2010 .

[12]  Sudhakar Sengan,et al.  Novel Collision Detection and Avoidance System for Midvehicle Using Offset-Based Curvilinear Motion , 2021, Wirel. Pers. Commun..

[13]  M. Donelli,et al.  WSN-based solutions for security and surveillance , 2010, The 40th European Microwave Conference.

[14]  R. Tavakkoli-Moghaddam,et al.  A New Multi-objective Competitive Open Vehicle Routing Problem Solved by Particle Swarm Optimization , 2012 .

[15]  K. R. Valluvan,et al.  An Energy Aware Trust Based Intrusion Detection System with Adaptive Acknowledgement for Wireless Sensor Network , 2017, Wirel. Pers. Commun..

[16]  Yiwei Thomas Hou,et al.  Optimal base station placement in wireless sensor networks , 2009, TOSN.

[17]  Abhishek Toofani,et al.  Solving Routing Problem using Particle Swarm Optimization , 2012 .

[18]  Ruirui Zhang,et al.  Intrusion Detection in Wireless Sensor Networks with an Improved NSA Based on Space Division , 2019, J. Sensors.

[19]  Fangmin Sun,et al.  A Review of Attacks and Security Protocols for Wireless Sensor Networks , 2014, J. Networks.

[20]  Ritu Tiwari,et al.  Particle swarm optimization and feature selection for intrusion detection system , 2020, Sādhanā.

[21]  Julio Muñoz,et al.  A flooding routing algorithm for a wireless sensor network for seismic events , 2015, 2015 International Conference on Computing Systems and Telematics (ICCSAT).

[22]  James Kennedy,et al.  Particle swarm optimization , 1995, Proceedings of ICNN'95 - International Conference on Neural Networks.

[23]  Charles K. Ayo,et al.  Impact of Mobile and Wireless Technology on Healthcare Delivery services , 2007 .

[24]  Manoj Kumar Tiwari,et al.  Multi-objective modeling of production and pollution routing problem with time window: A self-learning particle swarm optimization approach , 2016, Comput. Ind. Eng..

[25]  S. Madhavi,et al.  An Intrusion Detection System in Mobile AdHoc Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[26]  Sudhakar Sengan,et al.  Improved Network Traffic by Attacking Denial of Service to Protect Resource Using Z-Test Based 4-Tier Geomark Traceback (Z4TGT) , 2020, Wirel. Pers. Commun..

[27]  S. Chenthur Pandian,et al.  Hybrid cluster-based geographical routing protocol to mitigate malicious nodes in mobile ad hoc network , 2016, Int. J. Ad Hoc Ubiquitous Comput..

[28]  Dipti D. Patil,et al.  Multi-Objective Particle Swarm Optimization (MOPSO) based on Pareto Dominance Approach , 2014 .

[29]  E. Baburaj,et al.  An Intelligent Mesh Based Multicast Routing Algorithm for MANETs using Particle Swarm Optimization , 2008 .

[30]  Michael F. P. O'Boyle,et al.  Hybrid Optimizations: Which Optimization Algorithm to Use? , 2006, CC.

[31]  Azeddine Bilami,et al.  Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[32]  Farrukh Aslam Khan,et al.  Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization , 2012, Appl. Soft Comput..

[33]  Ahmad Khonsari,et al.  Detection and mitigation of sinkhole attacks in wireless sensor networks , 2014, J. Comput. Syst. Sci..

[34]  Maoguo Gong,et al.  Complex Network Clustering by Multiobjective Discrete Particle Swarm Optimization Based on Decomposition , 2014, IEEE Transactions on Evolutionary Computation.