Abstract
Opportunistic routing (OR) is the area of research in the trending scenario as the traditional methods for ensuring secure routing in the Wireless Sensor Networks (WSNs) suffer from the security and reliability issues. Though the existing multi-hop routing protocols are cheap and require less-intensive deployment, security is a major concern. The paper proposes the OR in WSNs using the hybrid optimization algorithm named, Monarch-Cat Swarm Optimization (M-CSO) which is the integration of Monarch Butterfly Optimization in Cat Swarm Optimization. The framework operates on two crucial aspects: one is to select the secure nodes and the other is to choose opportunistic nodes among selected secure nodes. The selection of secure nodes through the tolerant constant is based on the parameters of trust, connectivity, and QoS. The first two parameters are direct whereas, for QoS, Link Life Time and delay are considered to define it. Secondly, opportunistic nodes are optimally chosen through proposed M-CSO, based on the fitness parameters trust, distance, delay, and connectivity. The effectiveness of M-CSO based routing framework is evaluated using the performance metrics with 50 and 100 nodes in the presence of the attacks DoS, and Blackhole. The maximal detection rate, maximal throughput, minimum delay and minimum distance of the proposed M-CSO are 74.95, 77.7, 6.7 s and 102.67, respectively which is far better than competing methods Trust aware routing framework, Simple Opportunistic Adaptive Routing and Ant Colony Optimization for secured routing protocol. Moreover, M-CSO shows better performance as compared to the existing trust and opportunity based routing and optimization schemes.







Similar content being viewed by others
References
Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184–197.
Townsend, C., & Arms, S. (2005). Wireless sensor networks. MicroStrain, 20(9), 15–21.
Zahedi, A., & Parma, F. (2018). An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Networking and Applications, 1–10.
Choi, J. G., & Bahk, S. (2007). Cell-throughput analysis of the proportional fair scheduler in the single-cell environment. IEEE Transactions on Vehicular Technology, 56(2), 766–778.
Qin, D., Yang, S., Jia, S., Zhang, Y., Ma, J., & Ding, Q. (2017). Research on trust sensing based secure routing mechanism for wireless sensor network. IEEE Access, 5, 9599–9609.
Saidi, H., Gretete, D., & Adnane, A. (2017). Opportunistic routing in wireless sensors networks. In Proceedings of the 2nd international conference on computing and wireless communication systems (p. 69).
Liu, D., et al. (2016). Duplicate detectable opportunistic forwarding in duty-cycled wireless sensor networks. IEEE/ACM Transactions on Networking, 24(2), 662–673.
Shelke, M., Malhotra, A., & Mahalle, P. N. (2018). Congestion-aware opportunistic routing protocol in wireless sensor networks. In Smart computing and informatics (pp. 63–72). Berlin: Springer.
Rozner, E., Seshadri, J., Mehta, Y. A., & Qiu, L. (2009). SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks. IEEE Transactions on Mobile Computing, 8(12), 1622.
Das, A. K., Chaki, R., & Dey, K. N. (2016). Secure energy efficient routing protocol for wireless sensor network. Foundations of Computing and Decision Sciences, 41(1), 3–27.
Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.
Wang, Y., Zhang, M., & Shu, W. (2018). An emerging intelligent optimization algorithm based on trust sensing model for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 1, 145.
Das, A. K., Chaki, R., & Dey, K. N. (2016). Cluster based energy aware routing scheme CBEARS for wireless sensor network. International Journal of Sensor Network, 21(4), 262–272.
Sinha, D., Kumari, R., & Tripathi, S. (2019). Semisupervised classification based clustering approach in WSN for forest fire detection. Wireless Personal Communications, 109(4), 2561–2605.
Wang, G. G., Deb, S., Zhao, X., & Cui, Z. (2016). A new monarch butterfly optimization with an improved crossover operator. Operational Research, 18(3), 731–755.
Bahrami, M., Bozorg-Haddad, O., & Chu, X. (2018). Cat Swarm Optimization (CSO) algorithm. In Advanced optimization by nature-inspired algorithms (pp. 9–18).
Johnson, D. B., Maltz, D. A., & Broch, J. (2001). DSR: The dynamic source routing protocol for multihop wireless ad hoc networks. Ad Hoc Networking.
Perkins, C. E., & Bhagwat, P. (1994). Highly dynamic destination sequenced distance-vector routing (dsdv) for mobile computers. In Proceedings of ACM SIGCOMM.
Perkins, C. E., & Royer, E. M. (1999). Ad hoc on-demand distance vector routing. In Proceedings of the workshop on mobile computing systems and applications.
Draves, R., Padhye, J., & Zill, B. (2004). Comparison of routing metrics for multi-hop wireless networks. In Proceedings of ACM SIGCOMM.
Zahariadis, T., Leligou, H., Karkazis, P., Trakadas, P., Papaefstathiou, I., Vangelatos, C., et al. (2011). Design and implementation of a trust-aware routing protocol for Largewsns. International Journal of Network Security & Its Applications, 2(3), 52–68.
Yu, C. M., & Ku, M. L. (2018). Joint hybrid transmission and adaptive routing for lifetime extension of WSNS. IEEE Access, 6, 21658–21667.
Félix, G., Gregorio, M., Pérez, M., & Antonio, F. (2009). TACS, a trust model for P2P networks. Wireless Personal Communications, 51(1), 153–164.
Gu, X., Wang, J., Qiu, J., & Jiang, Z. (2017). Self-recommendation mechanism in trust calculation among nodes in WSN. Wireless Personal Communications, 97(3), 3705–3723.
Karthik, N., & Ananthanarayana, V. S. (2017). A hybrid trust management scheme for wireless sensor networks. Wireless Personal Communications, 97(4), 5137–5170.
Kshirsagar, V., Kanthe, A. M., & Simunic, D. (2018). Trust based detection and elimination of packet drop attack in the mobile ad-hoc networks. Wireless Personal Communications, 100(2), 311–320.
Das, A., & Islam, M. M. (2012). SecuredTrust: A dynamic trust computation model for secured communication in multiagent systems. IEEE Transactions on Dependable and Secure Computing, 9(2), 261–274.
Chintalapalli, R. M., & Ananthula, V. R. (2018). M-LionWhale: Multi-objective optimisationmodel for secure routing in mobile ad-hocnetwork. IET Communications, 12(12), 1406–1415.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Patil, P.A., Deshpande, R.S. & Mane, P.B. Trust and Opportunity Based Routing Framework in Wireless Sensor Network Using Hybrid Optimization Algorithm. Wireless Pers Commun 115, 415–437 (2020). https://doi.org/10.1007/s11277-020-07579-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07579-6