Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN

K Thangaramya, K Kulothungan, S Indira Gandhi… - Soft Computing, 2020 - Springer
Soft Computing, 2020Springer
In wireless sensor networks (WSNs), energy optimization and the provision of security are
the major design challenges. Since the wireless sensor devices are energy constrained, the
issue of high energy consumption by the malicious nodes must be addressed well in order
to enhance the network performance by making increased network lifetime, reduced energy
consumption and delay. In the past, many researchers worked in the provision of new
techniques for providing improved security to WSN in order to enhance the reliability in the …
Abstract
In wireless sensor networks (WSNs), energy optimization and the provision of security are the major design challenges. Since the wireless sensor devices are energy constrained, the issue of high energy consumption by the malicious nodes must be addressed well in order to enhance the network performance by making increased network lifetime, reduced energy consumption and delay. In the past, many researchers worked in the provision of new techniques for providing improved security to WSN in order to enhance the reliability in the routing process. However, most of the existing routing techniques are not able to achieve the required security through the use of intelligent techniques for safeguarding the sensor nodes from malicious attacks. In order to address these problems, a new fuzzy temporal clustering-based secured communication model with trust analysis and outlier detection has been developed in this research work. For this purpose, a new fuzzy temporal rule-based cluster-based routing algorithm with trust modelling and outlier detection for monitoring the nodes participating in the communication has been proposed. In addition, a fuzzy temporal rule- and distance-based outlier detection algorithm is also proposed in this paper for distinguishing the malicious nodes from other nodes within each cluster of the network and has been used in the secured routing algorithm. The proposed secure routing algorithm uses the temporal reasoning tasks of explanation-based learning and prediction as well as spatial constraints for making efficient routing decisions through the application of trust and key management techniques for performing effective authentication of nodes and thereby isolating the malicious nodes from communication through outlier detection. By applying these two proposed algorithms for communication in the proposed work, it is proved through experiments that the proposed secure routing algorithm and the outlier detection algorithm are able to perform secured and reliable routing through genuine cluster head nodes more effectively. Moreover, these two algorithms provide improved quality of service with respect to the reliability of communication, packet delivery ratio, reduction in end-to-end delay and reduced energy consumption.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果