Nature-Inspired Decision Support System for Securing Clusters of Wireless Sensor Networks in Advanced IoT Environments | Wireless Personal Communications Skip to main content
Log in

Nature-Inspired Decision Support System for Securing Clusters of Wireless Sensor Networks in Advanced IoT Environments

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

With the recent advancements in the Internet of Things (IoT) in which Wireless Sensor Networks (WSNs) is the core part, bring automation to the processes of sensing, transmitting, and monitoring the nodes. However, various cyber threats and unsafe communications limit the potential of such advanced IoT environments. Multiple security algorithms and models are gaining the attention of researchers and industries to build robust and strong safeguard for WSNs against various cyber threats; however, due to resource-constrained sensor nodes, designing the energy-efficient security algorithm is difficult without the support of a decision support system. This paper presents a nature-inspired approach to creating a Decision Support System (DSS) for a secure and protected clustering mechanism. The proposed model works on a hybrid trust model that evaluates each sensor node before the selection of Cluster Head (CH) by measuring the various parameters of the sensor node. This hybrid trust model is the core of the proposed decision support system to precisely categorize each node as malicious or legitimate. The proposed model is tested on various attack scenarios to analyze the performance of the proposed method and experimental results have been compared with the existing protocols such as LEACH, eeTMFO/GA, and TMS in terms of throughput, delay, consumed energy, and communication overhead. The proposed model has shown a higher throughput value of 37.03(%), less delay of 0.0217 (sec.), minimum energy consumption of 0.0579 (J), and minimum overhead of 5.409 (%) as compared to existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data Availability (data transparency)

The datasets analyzed during the current study are available from the corresponding author on reasonable request.

Code Availability

The code is available from the corresponding author on reasonable request.

References

  1. Siddiqi, M., Mugheri, A. A., & Khoso, M. (2018). Analysis on security methods of Wireless Sensor Network (WSN). Sukkur IBA Journal of Computing and Mathematical Sciences, 2(1), 52–60

    Article  Google Scholar 

  2. Mallick, C., & Satpathy, S. (2018). Challenges and design goals of wireless sensor networks: A state-of-the-art review. International Journal of Computer Applications, 179, 42–47

    Article  Google Scholar 

  3. Sharma, R., Vashisht, V., Singh, A. V., & Kumar, S. (2019). Analysis of existing clustering algorithms for wireless sensor networks. In Kapur, P., Klochkov, Y., Verma, A., Singh, G. (eds) System performance and management analytics (pp. 259–277). Springer

  4. Almalkawi, I. T., Zapata, G., Al-Karaki, M., J. N., & Morillo-Pozo, J. (2010). Wireless multimedia sensor networks: Current trends and future directions. Sensor, 10(7), 6662–6717

    Article  Google Scholar 

  5. Harjito, B., & Han, S. (2010). Wireless multimedia sensor networks applications and security challenges. 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, 842–846

  6. He, T., Krogh, B., Krishnamurthy, S., Stankovic, J. A., Abdelzaher, T., Luo, L., & Hui, J. (2004). Energy-efficient surveillance system using wireless sensor networks. Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services -MobiSYS ’04, 270–283

  7. Hussain, M. A., & Kyung Sup, K. (2009). WSN research activities for military application. In 2009 11th International Conference on Advanced Communication Technology, 1, 271–274

  8. Sharma, R., Vashisht, V., Singh, A. V., & Kumar, S. (2019). Analysis of existing clustering algorithms for wireless sensor networks. In Kapur, P., Klochkov, Y., Verma, A., Singh, G. (eds), System performance and management analytics (pp. 259–277). Springer

  9. Cho, J. H., Swami, A., & Chen, I. R. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583

    Article  Google Scholar 

  10. Willig, A., & Karl, H. (2005). Data transport reliability in wireless sensor networks. A survey of issues and solutions. PIK - Praxis der Informationsverarbeitung und Kommunikation, 28(2), 86–92

    Article  Google Scholar 

  11. Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In System sciences, 2000 proceedings of the 33rd annual Hawaii international conference, p. 10

  12. Hoang, D. C., Yadav, P., Kumar, R., & Panda, S. K. (2010). A robust harmony search algorithm based clustering protocol for wireless sensor networks. In Communications workshops (ICC), 2010 IEEE international conference (pp. 1–5). IEEE

  13. Song, M. A. O., & Zhao, C. L. (2011). Unequal clustering algorithm for WSN based on fuzzy logic and improved ACO. The Journal of China Universities of Posts and Telecommunications, 18(6), 89–97

    Article  Google Scholar 

  14. Enami, N., Moghadam, R. A., & Ahmadi, K. D. (2010). A new neural network based energy efficient clustering protocol for wireless sensor networks. In Computer sciences and convergence information technology (ICCIT), 2010 5th international conference (pp. 40–45)

  15. Bagci, H., & Yazici, A. (2010). An energy aware fuzzy unequal clustering algorithm for wireless sensor networks. In Fuzzy systems (FUZZ), 2010 IEEE international conference (pp. 1–8). IEEE

  16. Chandrasekaran, V. G. K (2014). A distributed trust based secure communication framework for wireless sensor network. Wireless Sensor Network, 6(09), 173–183

    Article  Google Scholar 

  17. Guo, W. W., & Looi, M. (2012). A framework of trust-energy balanced procedure for cluster head selection in wireless sensor networks. Journal of Networks, 7(10), 1592

    Article  Google Scholar 

  18. Tolba, F. D., Ajib, W., & Obaid, A. (2013). Distributed clustering algorithm for mobile wireless sensors networks. In SENSORS, 1–4

  19. Sahoo, R. R., Singh, M., Sardar, A. R., Mohapatra, S., & Sarkar, S. K. (2013). TREE-CR: Trust based secure and energy efficient clustering in WSN. In Emerging trends in computing, communication and nanotechnology (ICE-CCN), 2013 international conference (pp. 532–538)

  20. Sahoo, R. R., Singh, M., Sahoo, B. M., Majumder, K., Ray, S., & Sarkar, S. K. (2013). A light weight trust based secure and energy efficient clustering in wireless sensor network: Honey bee mating intelligence approach. Procedia Technology, 10, 515–523

    Article  Google Scholar 

  21. Nimbalkar, N. B., Das, S. S., & Wagh, S. J. (2015). Trust based energy efficient clustering using genetic algorithm in wireless sensor networks (teecga). International Journal of Computer Applications, 112(9), 30–33

    Google Scholar 

  22. Dahane, A., Berrached, N. E., & Loukil, A. (2015). Balanced and safe weighted clustering algorithm for mobile wireless sensor networks. In IFIP international conference on computer science and its applications (pp. 429–441)

  23. Juliana, R., & Maheswari, P. U. (2016). An energy efficient cluster head selection technique using network trust and swarm intelligence. Wireless Personal Communications, 89(2), 351–364

    Article  Google Scholar 

  24. Wang, T., Zhang, G., Yang, X., & Vajdi, A. (2016). A trusted and energy efficient approach for cluster-based wireless sensor networks. International Journal of Distributed Sensor Networks, 12(4), 3815834

    Article  Google Scholar 

  25. Kuila, P., & Jana, P. K. (2014). A novel differential evolution based clustering algorithm for wireless sensor networks. Applied Soft Computing, 25, 414–425

    Article  Google Scholar 

  26. Sharawi, M., & Emary, E. (2016). Clustering optimization for WSN based on nature-inspired algorithms. Studies in Computational Intelligence, 111–132

  27. Rehman, E., Sher, M., Naqvi, S. H. A., Badar Khan, K., & Ullah, K. (2017). Energy efficient secure trust based clustering algorithm formobile wireless sensor network. Journal of Computer Networks and Communications,1630673

  28. Mittal, N. (2019). Moth flame optimization based energy efficient stable clustered routing approach for wireless sensor networks. Wireless Personal Communications, 104(2), 677–694

    Article  Google Scholar 

  29. Sharma, R., Vashisht, V., & Singh, U. (2019). Nature inspired algorithms for energy efficient clustering in wireless sensor networks. 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (pp. 365–370)

  30. Sharma, R., Vashisht, V., & Singh, U. (2019). EEFCM-DE: Energy efficient clustering based on fuzzy C means and differential evolution algorithm in wireless sensor networks. IET Communications, 13(8), 996–1007

    Article  Google Scholar 

  31. Pavani, M., & Trinatha Rao, P. (2019). Adaptive PSO with optimized firefly algorithms for secure cluster based routing in wireless sensor networks. IET Wireless Sensor Systems, 9(5), 274–283

    Article  Google Scholar 

  32. Gilbert, E. P. K., Baskaran, K., Rajsingh, E. B., Lydia, M., & Selvakumar, A. I. (2019). Trust aware nature inspired optimised routing in clustered wireless sensor networks. International Journal of Bio-Inspired Computation, 14(2), 103–113

    Article  Google Scholar 

  33. Souri, A., Rahmani, A. M., Navimipour, N. J., & Rezaei, R. (2019). A symbolic model checking approach in formal verification of distributed systems. Human-centric Computing and Information Sciences, 9(1), 1–27

    Article  Google Scholar 

  34. Ramesh, S., & Yaashuwanth, C. (2019). Enhanced approach using trust based decision making for secured wireless streaming video sensor networks. Multimedia Tools and Applications, 79(15), 10157–10176

    Google Scholar 

  35. Sharma, R., Vashisht, V., & Singh, U. (2020). eeTMFO/GA: a secure and energy efficient cluster head selection in wireless sensor networks. Telecommunication Systems 74(3), 253-268

  36. Umar, I. A., Hanapi, Z. M., Sali, A., & Zulkarnain, Z. A. (2017). Trufix: A configurable trust-based cross-layer protocol for wireless sensor networks. IEEE Access : Practical Innovations, Open Solutions, 5, 2550–2562

    Article  Google Scholar 

  37. Hosseinzadeh, M., Tho, Q. T., Ali, S., Rahmani, A. M., Souri, A., Norouzi, M., & Huynh, B. (2020). A hybrid service selection and composition model for cloud-edge computing in the internet of things. IEEE Access : Practical Innovations, Open Solutions, 8, 85939–85949

    Article  Google Scholar 

  38. Singh, A., Sharma, S., & Singh, J. (2021). Nature-inspired algorithms for wireless sensor networks: A comprehensive survey. Computer Science Review, 39, 100342

    Article  MathSciNet  MATH  Google Scholar 

  39. Mukherjee, P., & Das, A. (2020). Nature-Inspired algorithms for reliable, low-latency communication in wireless sensor networks for pervasive healthcare applications. In De, D., Mukherjee, A., Kumar Das, S., Dey, N. (eds) Nature Inspired Computing for Wireless Sensor Networks (pp. 321–341). Springer

  40. Qureshi, S. G., & Shandilya, S. K. (2021). Novel fuzzy based crow search optimization algorithm for secure node-to-node data transmission in WSN. Wireless Personal Communications,1–21

  41. Qureshi, S. G., & Shandilya, S. K. (2021). Novel hybridized crow whale optimization and QoS based bipartite coverage routing for secure data transmission in wireless sensor networks. Journal of Intelligent & Fuzzy Systems (Preprint), 41(1), 1–15

    Google Scholar 

  42. Qureshi, S. G., & Shandilya, S. K. (2021). Advances in Cyber Security Paradigm: A Review. In International conference on hybrid intelligent systems, HIS 2019 (pp. 268–276). Springer

Download references

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Contributions

Shahana Gajala Qureshi: Conceptualization, Methodology, Formal Analysis, Documentation and Reporting. Shishir Kumar Shandilya: Validation, Visualization, Supervision. Suresh Chandra Satapathy: Editing, Correspondence, Supervision. Massimo Ficco: Supervision, Data Analysis.

Corresponding author

Correspondence to Suresh Chandra Satapathy.

Ethics declarations

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Qureshi, S.G., Shandilya, S.K., Satapathy, S.C. et al. Nature-Inspired Decision Support System for Securing Clusters of Wireless Sensor Networks in Advanced IoT Environments. Wireless Pers Commun 128, 67–88 (2023). https://doi.org/10.1007/s11277-022-09601-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09601-5

Keywords