Skip to main content

Advertisement

Log in

An Energy Efficient Cluster Head Selection Technique Using Network Trust and Swarm Intelligence

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless sensor networks (WSN) have started appearing in our daily life including home, office, industry and vehicles to name a few. The incremental usage of WSN for environmental monitoring demands safety and security enhancement. Strong security mechanisms incurred by WSN leads to resource and energy utilization overhead resulting in faster drainage of energy. Trust and reputation have been extensively used in literature to detect misbehaving nodes and thus improve overall network Quality of Service (QoS) by avoiding them. This work proposed a trust mechanism for effective cluster head selection in a multi hop WSN using Artificial Bee Colony algorithm. The results show that the proposed method successfully avoids nodes with selfish behavior and malicious nature that enable Black Hole, Denial of Service, or packet dropping. Results illustrates improvements in the packet delivery ratio and energy utilization.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Yuan, Y., Li, C., Yang, Y., Zhang, X., & Li, L. (2014). CAF: Cluster algorithm and a-star with fuzzy approach for lifetime enhancement in wireless sensor networks. Abstract and Applied Analysis, 2014, 936376. doi:10.1155/2014/936376.

  2. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–105.

    Article  Google Scholar 

  3. Sen, J. (2009). A survey on wireless sensor network security. In International journal of communication networks and information security (IJCNIS) (Vol. 1, pp. 2), August 2009.

  4. Pawlowski, A., Guzman, J. L., Rodríguez, F., Berenguel, M., Sánchez, J., & Dormido, S. (2009). Simulation of greenhouse climate monitoring and control with wireless sensor network and event-based control. Sensors, 9(1), 232–252.

    Article  Google Scholar 

  5. Ayadi, A. (2011). Energy-efficient and reliable transport protocols for wireless sensor networks: State-of-art. Wireless Sensor Network, 3(3), 106–113.

    Article  Google Scholar 

  6. Bhuyan, B., Sarma, H. K. D., Sarma, N., Kar, A., & Mall, R. (2010). Quality of service (QoS) provisions in wireless sensor networks and related challenges. Wireless Sensor Network, 2(11), 861–868.

    Article  Google Scholar 

  7. Singh, S. K. (2010). A survey of energy-efficient hierarchical cluster-based routing in wireless sensor networks. International Journal of Advanced Networking and Application, 02(02), 570–580.

    Google Scholar 

  8. Selvam, R. P. (2011 January). An efficient cluster based approach for multi-source multicast routing protocol in mobile ad hoc networks. International Journal of Computer Networks & Communications (IJCNC), 3(1), 154–166.

  9. Singh, S. K. (2010 November). Routing protocols in wireless sensor networks—A survey. International Journal of Computer Science & Engineering Survey (IJCSES), 1(2), 63–83.

  10. Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and counter measures. Journalof Network and Computer Applications, 35(3), 867–880.

    Article  Google Scholar 

  11. Sun, Y. L., Han, Z., Yu, W., & Liu, K. J. R. (2006). A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In Proceedings of the 25th IEEE international conference on computer communications (INFOCOM’06), April 2006, pp. 1–13.

  12. Safiqul Islam, Md. (2011 November). Anomaly intrusion detection system in wireless sensor networks: Security threats and existing approaches. International Journal of Advanced, Science and Technology, 36(1), 8.

  13. Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.

    Article  Google Scholar 

  14. Douceur, J. R. (2002). The sybil attack. In R. Clayton (Ed.), Peer-to-peer Systems (pp. 251–260). Berlin: Springer.

    Chapter  Google Scholar 

  15. Sharma, K., & Ghose, M. K. (2010). Wireless sensor networks: An overview on its security threats. IJCA, Special Issue on “Mobile Ad hoc Networks” MANETs, pp. 42–45.

  16. Sangi, A. R., Liu, J., & Liu, Z. (2010). Performance comparison of single and multi-path routing protocol in MANET with selfish behaviors. World Academy of Science, Engineering and Technology, 41, 828–832.

    Google Scholar 

  17. Gupta, S., Nagpal, C. K., & Singla, C. (2011). Impact of selfish node concentration in MANETS. International Journal of Wireless & Mobile Networks (IJWMN), 3, 29–37.

    Article  Google Scholar 

  18. Hussain, S., & Matin, A. W. (2006). Hierarchical cluster-based routing in wireless sensor networks. In Proceeding of 5th international conference on information processing in sensor network (IPSN06), USA.

  19. Zarei, B., Zeynali, M., & Majid Nezhad, V. (2010). Novel cluster based routing protocol in wireless sensor networks. IJCSI International Journal of Computer Science, 7(4), 32–36.

    Google Scholar 

  20. Nguyen, D., Minet, P., Kunz, T., & Lamont, L. (2011). New findings on the complexity of cluster head selection algorithms. In World of wireless, mobile and multimedia networks (WoWMoM), 2011 IEEE international symposium on a IEEE, pp. 1–10.

  21. Ferdous, R., Muthukkumarasamy, V., & Sithirasenan, E. (2011). Trust-based cluster head selection algorithm for mobile ad hoc networks. In Trust, security and privacy in computing and communications (TrustCom), 2011 IEEE 10th international conference on, IEEE, pp. 589–596.

  22. Zhou, Y., Huang, T., & Wang, W. (2009). A trust establishment scheme for cluster-based sensor networks. In Wireless communications, networking and mobile computing, 2009. WiCom’09. 5th international conference on, IEEE, pp. 1–4.

  23. Crosby, G. V., & Pissinou, N. (2007). Cluster-based reputation and trust for wireless sensor networks. In Consumer communications and networking conference.

  24. Zahariadis, T., Leligou, H. C., Trakadas, P., & Voliotis, S. (2010). Trust management in wireless sensor networks. European Transactions on Telecommunications, 21(4), 386–395.

    Google Scholar 

  25. Singh, S. I., & Sinha, S. K. (2009, June). A new trust model based on social characteristics and reputation mechanisms using best local prediction selection approach. In New trends in information and service science, 2009. NISS’09. international conference on, IEEE, pp. 329–335.

  26. Singh, S. I., & Sinha, S. K. (2009). A new trust model based on social characteristics and reputation mechanisms using best local prediction selection approach. In New trends in information and service science, 2009. NISS’09. international conference on, IEEE, pp. 329–335.

  27. Paris, S., Nita-Rotaru, C., Martignon, F., & Capone, A. (2011). EFW: A cross-layermetric for reliable routing in wireless mesh networks with selfish participants. In Proceedings of the IEEE INFOCOM, April 2011, pp. 576–580.

  28. Buchegger, S., & Le Boudec, J.-Y. (2002). Performance analysis of the CONFIDANT protocol. (cooperation of nodes: Fairness). In International symposium on mobile ad hoc networking andcomputing (MOBIHOC’02), June 2002, pp. 226–236.

  29. Duan, J., Yang, D., Zhu, H., Zhang, S., & Zhao, J. (2014). TSRF: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks, 2014, 209436. doi:10.1155/2014/209436.

  30. Zhang, C., Zhu, X., Song, Y., & Fang, Y. (2010). A formal study of trust based routing in wireless ad hoc networks. In Proceedings of theIEEE INFOCOM, March 2010.

  31. Theodorakopoulos, G., & Baras, J. S. (2006). On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 318–328.

    Article  Google Scholar 

  32. Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184–197.

    Article  Google Scholar 

  33. Pirzada, A. A., McDonald, C., & Datta, A. (2006). Performance comparison of trust-based reactive routing protocols. IEEE Transactions on Mobile Computing, 5(6), 695–710.

    Article  Google Scholar 

  34. Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.

    Article  MathSciNet  Google Scholar 

  35. Lopez, J., Roman, R., Agudo, I., & Fernandez-Gago, C. (2010). Trust management systems for wireless sensor networks: Best practices. Computer Communications, 33(9), 1086–1093.

    Article  Google Scholar 

  36. Ganeriwal, S., Balzano, L. K., & Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(3), 15.

    Article  Google Scholar 

  37. Patel, J., Teacy, W. L., Jennings, N. R., & Luck, M. (2005). A probabilistic trust model for handling inaccurate reputation sources. In Trust management (pp. 193–209). Berlin: Springer.

  38. Jsang, A., & Ismail, R. (2002). The beta reputation system. In Proceedings of the 15th bled electronic commerce conference, pp. 41–55.

  39. Zou, W., Zhu, Y., Chen, H., & Sui, X. (2010). A clustering approach using cooperative artificial bee colony algorithm. Discrete dynamics in nature and society, 2010.

  40. Akay, B., & Karaboga, D. (2009). Parameter tuning for the artificial bee colony algorithm. In Proceeding of the 1st international conference on computational collective intelligence (ICCCI’09), Wroclaw, Poland, 2009, pp. 608–619.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Juliana.

Ethics declarations

Conflict of interests

The author(s) declare that they have no competing interests.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Juliana, R., Uma Maheswari, P. An Energy Efficient Cluster Head Selection Technique Using Network Trust and Swarm Intelligence. Wireless Pers Commun 89, 351–364 (2016). https://doi.org/10.1007/s11277-016-3269-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3269-x

Keywords

Navigation