A cognitive energy efficient and trusted routing model for the security of wireless sensor networks: CEMT

AB Feroz Khan, G Anandharaj - Wireless Personal Communications, 2021 - Springer
AB Feroz Khan, G Anandharaj
Wireless Personal Communications, 2021Springer
There are many smart applications evolved in the area of the wireless sensor networks. The
applications of WSNs are exponentially increasing every year which creates a lot of security
challenges that need to be addressed to safeguard the devices in WSN. Due to the dynamic
characteristics of these resource constrained devices in WSN, there must be high level
security requirements to be considered to create a high secure environments. This paper
presents an efficient multi attribute based routing algorithm to provide secure routing of …
Abstract
There are many smart applications evolved in the area of the wireless sensor networks. The applications of WSNs are exponentially increasing every year which creates a lot of security challenges that need to be addressed to safeguard the devices in WSN. Due to the dynamic characteristics of these resource constrained devices in WSN, there must be high level security requirements to be considered to create a high secure environments. This paper presents an efficient multi attribute based routing algorithm to provide secure routing of information for WSNs. The work proposed in this paper can decrease the energy and enhances the performance of the network than the currently available routing algorithm such as multi-attribute pheromone ant secure routing algorithm based on reputation value and ant-colony optimization algorithm. The proposed work secures the network environment with the improved detection techniques based on nodes’ higher coincidence rates to find the malicious behavior using trust calculation algorithm. This algorithm uses some QoS parameters such as reliability rate, elapsed time to detect impersonation attacks, and stability rate for trust related attacks, to perform an efficient trust calculation of the nodes in communication. The outcome of the simulation show that the proposed method enhances the performance of the network with the improved detection rate and secure routing service.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果