Abstract
Wireless sensor networks consist of some sensor nodes that have a minimum operational capability, with less memory capacity for storing data and limited energy source. The deployment of these nodes or sensors takes place randomly in a dynamic or static environment. This type of placement of nodes in a hostile environment can be charge by the malicious nodes in a wireless sensor network (WSN). This vulnerability in nodes makes the wireless sensor network unstable and leads to many types of demerits like limited battery lifetime, less computing, and limited memory space. To avoid these attacks and to reduce the impact created by the malicious nodes, we suggest a simple and effective way of detecting and removing unhealthy nodes in the environment. We proposed a simple scheme by using the Artificial Bee Colony algorithm which is known as the cuddle death design. The theme of a scheme is to find the unhealthy or malicious cluster head nodes in the network and removing that particular node without creating any harm to the other nodes in the environment. It also helps to improve the energy efficiency, packet delivery ratio with maximum throughput in WSN.






Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Manimurugan S et al (2020) Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system. Microprocess Microsyst 79:103261
Zhang X, Xiaohui Lu, Zhang X (2020) Mobile wireless sensor network lifetime maximization by using evolutionary computing methods. Ad Hoc Netw 101:102094
Garg S et al (2020) En-ABC: an ensemble artificial bee colony based anomaly detection scheme for cloud environment. J Parallel Distrib Comput 135:219–233
Pang C, Xu G, Zhang Y (2020) A new energy efficient management approach for wireless sensor networks in target tracking. Defence Technol. https://doi.org/10.1016/j.dt.2020.05.022
Dwivedi S, Vardhan M, Tripathi S (2020) An effect of chaos grasshopper optimization algorithm for protection of network infrastructure. Comput Netw 176:107251
Singh M, Mehta G, Vaid C, Oberoi P (2012) Detection of malicious node in wireless sensor network based on data mining. In: 2012 International Conference on Computing Sciences, IEEE, pp 291–294
Guimaraes DA, Sakai LJ, Alberti AM, De Souza RAA (2016) Increasing the lifetime of mobile wsns via dynamic optimization of sensor node communication activity. Sensors 16(9):1536
Rambabu B, Reddy AV, Janakiraman S (2019) Hybrid Artificial Bee Colony and Monarchy Butterfly Optimization Algorithm (HABC-MBOA)-based cluster head selection for WSNs. J King Saud Univ Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2019.12.006
Le Nguyen P, Nguyen K, Vu H, Ji Y (2019) TELPAC: A time and energy efficient protocol for locating and patching coverage holes in WSNs. J Netw Comput Appl 147:102439
Suma N, Purusothaman T (2014) Secure authentication based multipath routing protocol for WSNs. J Theor Appl Inf Technol 59:222–231
Guo H, Gao Y, Xu T, Zhang X, Ye J (2019) A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks. Ad Hoc Netw 95:101965
Subhaponmani S, Balakrishnan C (2014) SDRP and SSO mechanism for impersonation attack in wireless sensor networks. Int J Adv Res Comput Sci Technol
Thiruppathy Kesavan V, Radhakrishnan S (2015) Secure clustering and routing for heterogeneous mobile wireless sensor networks with dynamic key management. J Exp Theor Artif Intell 28:971–988
Kumar M, Verma S, Lata K (2015) Secure data aggregation in wireless sensor networks using homomorphic encryption. Int J Electron 102(4):690–702
Sharmila S, Umamaheswari G (2013) Node ID based detection of Sybil attack in mobile wireless sensor network. Int J Electron 100(10):1441–1454
Verma VK, Singh S, Pathak NP (2016) Impact of malicious servers over trust and reputation models in wireless sensor networks. Int J Electron 103(3):530–540
Hamedheidari S, Rafeh R (2013) A novel agent-based approach to detect sinkhole attacks in wireless sensor networks. Comput Secur 37:1–14
Hashim HA, Ayinde BO, Abido MA (2016) Optimal placement of relay nodes in wireless sensor network using artificial bee colony algorithm. Journal of Network and Computer Applications 64:239–248
Yousefi S et al (2020) An energy-efficient artificial bee colony-based clustering in the internet of things. Comput Electr Eng 86:106733
Wang H, Wang W, Xiao S, Cui Z, Xu M, Zhou X (2020) Improving Artificial Bee Colony algorithm using a new neighborhood selection mechanism. Inf Sci 527:227–240
Saad E, Elhosseini MA, Haikal AY (2019) Culture-based artificial bee colony with heritage mechanism for optimization of wireless sensors network. Appl Soft Comput 79:59–73
Liang G, Yu H (2018) Network selection algorithm for heterogeneous wireless networks based on service characteristics and user preferences. EURASIP J Wirel Commun Netw 2018(1):241
Yadav AS, Khushboo K, Singh VK, Kushwaha DS (2020) Increasing efficiency of sensor nodes by clustering in section based hybrid routing protocol with artificial bee colony. Procedia Comput Sci 171:887–896
Mitra R, Khan T (2012) Secure and reliable data transmission in wireless sensor network: a survey. Int J Comput Eng Res 2(3):748–754
Raghav RS, Thirugnansambandam K, Anguraj DK (2020) Beeware routing scheme for detecting network layer attacks in wireless sensor networks. Wirel Pers Commun 112:2439–2459
Idrees AK, Deschinkel K, Salomon M, Couturier R (2016) Perimeter based coverage optimization to improve lifetime in wireless sensor networks. Eng Optim 48:1951–1972
Singh AK, Purohit N, Varma S (2014) Analysis of lifetime of wireless sensor network with base station moving on different paths. Int J Electron 101(5):605–620
Wu G, Chen X, Yao L, Lee Y, Yim K (2014) An efficient wormhole attack detection method in wireless sensor networks. Comput Sci Inf Syst 11(3):1127–1141
Ould Amara S, Beghdad R, Oussalah M (2013) Securing wireless sensor networks: a survey. EDPACS 47(2):6–29
Saleem K, Derhab A, Orgun MA, Al-Muhtadi J, Rodrigues JJ, Khalil MS, Ali Ahmed A (2016) Cost-effective encryption-based autonomous routing protocol for efficient and secure wireless sensor networks. Sensors 16(4):460
Gupta B (2014) On secure communication in a sensor network. Commun Stat Theory Methods 43(21):4642–4649
Ibrahim A, Rahman MM, Roy MC (2015) Detecting sinkhole attacks in wireless sensor network using hop count. Int J Comput Netw Inf Secur 7(3):50
Khandare PV, Kulkarni NP (2014) Pe2a: public encryption with two ack approach to mitigate wormhole attack in WSN. IJRET Int J Res Eng Technol 3(1):102–107
Nidharshini T, Janani V (2012) Detection of duplicate nodes in wireless sensor networks using sequential probability ratio testing. Int J Adv Res Comput Commun Eng 1(10):794–798
Okdem S, Karaboga D, Ozturk C (2011) An application of wireless sensor network routing based on artificial bee colony algorithm. In 2011 IEEE congress of evolutionary computation (CEC). IEEE, pp 326–330
Ren Q, Yao G (2020) An energy-efficient cluster head selection scheme for energy-harvesting wireless sensor networks. Sensors 20(1):187
Benmessahel I, Xie K, Chellal M, Semong T (2019) A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization. Evol Intel 12(2):131–146
Yue Y, Li J, Fan H, Qin Q (2016) Optimization-based artificial bee colony algorithm for data collection in large-scale mobile wireless sensor networks. J Sens. https://doi.org/10.1155/2016/7057490
John J, Rodrigues P (2019) A survey of energy-aware cluster head selection techniques in wireless sensor network. Evol Intell. https://doi.org/10.1007/s12065-019-00308-4
Liang H, Yang S, Li L, Gao J (2019) Research on routing optimization of WSNs based on improved LEACH protocol. EURASIP J Wirel Commun Netw 2019(1):194
Ma J, Zhao Y (2020) An improved artificial bee colony algorithm with multiple search strategy. In: International conference on green, pervasive, and cloud computing. Springer, Cham, pp 92–100
Mahaleh MBNB, Mirroshandel SA (2020) Real-time application of swarm and evolutionary algorithms for line follower automated guided vehicles: a comprehensive study. Evol Intell. https://doi.org/10.1007/s12065-020-00496-4
Kusyk J, Uyar MU, Sahin CS (2018) Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networks. Evol Intel 10(3–4):95–117
Sharma K, Gupta PC, Sharma N (2020) Limaçon inspired artificial bee colony algorithm for numerical optimization. Evol Intell. https://doi.org/10.1007/s12065-020-00430-8
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Raghav, R.S., Prabu, U., Rajeswari, M. et al. Cuddle death algorithm using ABC for detecting unhealthy nodes in wireless sensor networks. Evol. Intel. 15, 1605–1617 (2022). https://doi.org/10.1007/s12065-021-00570-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12065-021-00570-5