Skip to main content
Log in

Hybrid Grey PIPRECIA and Grey OCRA method-based dynamic multi-criteria decision-making model for mitigating non-cooperating node attacks in WSNs

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Cooperation among sensor nodes is always essential for achieving reliable data dissemination in Wireless Sensor Network (WSNs). The sensor nodes can cat as a host or a router in which they establish communication between. In this context, the reliability of intermediate sensor nodes that establishes the routing path between the source and destination need to be dynamically assessed for enforcing cooperation. Thus, potential dynamic multi-criteria decision-making model for enforcing cooperation is necessary as the presence of malicious and selfish nodes in WSNs. Which severely crumbles the network performance. In this paper, Hybrid Grey PIPRECIA and Grey OCRA Method (HGP-GOCRAM) -based Dynamic Multi-Criteria Decision-Making Model is proposed for thwarting malicious and selfish nodes for achieving maximized cooperation among the sensor nodes of the routing path. This HGP-GOCRAM specifically used Grey Pivot Pairwise Relative Criteria Importance Assessment (PIPRECIA-G) for determining the weights of the criteria considered for evaluating the cooperation degree of the sensor nodes. It further used Grey Operational Competitiveness Rating (OCRA-G) for identifying the rank of the sensor nodes to isolate the worst cooperating nodes dynamically from the rouging path. The simulation results of the proposed HGP-GOCRAM achieved under different malicious and selfish node confirmed an improved packet delivery rate of 22.31%, maximized throughput of 19.78%, with minimized energy consumptions of 20.98% and end-to-end delay of 22.64%, better than the competitive cooperation enforcement approaches used for investigation. The results also proved that the proposed HGP-GOCRAM is capable in achieving rapid and accurate detection and isolation of malicious and selfish nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

Availability of data and materials

Not Applicable.

References

  1. Sun W, Zhang L, Lv Q, Liu Z, Li W, Li Q (2023) Dynamic collaborative optimization of end-to-end delay and power consumption in wireless sensor networks for smart distribution grids. Comput Commun 202:87–96

    Article  Google Scholar 

  2. Dutta H, Bhuyan AK, Biswas S (2023) Reinforcement learning based flow and energy management in resource-constrained wireless networks. Comput Commun 202:73–86

    Article  Google Scholar 

  3. Praveen R, Pabitha P (2023) ASK-RAM-IMOT: Autonomous shared keys based remote authentication method for Internet of Medical Things applications. Wirel Pers Commun 131(1):273–293. https://doi.org/10.1007/s11277-023-10428-x

    Article  Google Scholar 

  4. Praveen R, Pabitha P (2023) Improved Gentry–Halevi’s fully homomorphic encryption‐based lightweight privacy preserving scheme for securing medical Internet of Things Abstract. Trans Emerg Telecommun Technol 34(4). https://doi.org/10.1002/ett.v34.4, https://doi.org/10.1002/ett.4732

  5. Praveen R, Pabitha P (2023) A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications. J Intell Fuzzy Syst 44(5):7523–7542. https://doi.org/10.3233/JIFS-223617

    Article  Google Scholar 

  6. Li Y, Wu Y (2020) Combine clustering with game to resist selective forwarding in wireless sensor networks. IEEE Access 8:138382–138395

    Article  Google Scholar 

  7. Abbas Q, Hassan SA, Qureshi HK, Dev K, Jung H (2022) A comprehensive survey on age of information in massive IoT networks. Comput Commun

  8. Pabitha P, Chandra Priya J, Praveen R, Jagatheswari S (2023) ModChain: a hybridized secure and scaling blockchain framework for IoT environment. Int J Inf Technol 15(3):1741–1754. https://doi.org/10.1007/s41870-023-01218-6

    Article  Google Scholar 

  9. Yang H, Zhang X, Cheng F (2021) A novel algorithm for improving malicious node detection effect in wireless sensor networks. Mobile Networks and Applications 26:1564–1573

    Article  Google Scholar 

  10. Madhavi S, Santhosh NC, Rajkumar S, Praveen R (2023) Pythagorean Fuzzy Sets-based VIKOR and TOPSIS-based multi-criteria decision-making model for mitigating resource deletion attacks in WSNs. J Intell Fuzzy Syst 44(6):9441–9459

    Article  Google Scholar 

  11. Saha S, Arya R (2022) ARCMT: Anchor node-based range free cooperative multi trusted secure underwater localization using fuzzifier. Comput Commun 193:246–265

    Article  Google Scholar 

  12. Ramasamy V, Srirangan J, Ramalingam P (2021) Fuzzy and position particle swarm optimized routing in VANET. Int J Electr Comput Eng Syst 12(4):199–206

    Google Scholar 

  13. Madhavi S, Udhaya Sankar SM, Praveen R, Jagadish Kumar N (2023) A fuzzy COPRAS-based decision-making framework for mitigating the impact of vampire sensor nodes in wireless sensor nodes (WSNs). Int J Inf Technol 15(4):1859–1870

    Google Scholar 

  14. Dhanaraj RK, Jhaveri RH, Krishnasamy L, Srivastava G, Maddikunta PKR (2021) Black-hole attack mitigation in medical sensor networks using the enhanced gravitational search algorithm. Int J Uncertain Fuzziness Knowl Based Syst 29(Suppl-2):297–315

    Article  Google Scholar 

  15. Roshini A, Kiran KVD, Anudeep KV (2021) Hybrid acknowledgment scheme for early malicious node detection in wireless sensor networks. In: International Conference on Intelligent and Smart Computing in Data Analytics: ISCDA 2020 (pp 263–270). Springer Singapore

  16. Liu Y, Wu Y (2021) Employ DBSCAN and neighbor voting to screen selective forwarding attack under variable environment in event-driven wireless sensor networks. IEEE Access 9:77090–77105

    Article  Google Scholar 

  17. Thangaramya K, Kulothungan K, Indira Gandhi S, Selvi M, Santhosh Kumar SVN, Arputharaj K (2020) Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Comput 24:16483–16497

    Article  Google Scholar 

  18. Sudhakar T, Praveen R, Jagatheswari S (2022) An improved proxy-vehicle based authentication scheme for vehicular ad-hoc networks. Int J Inf Technol 14(5):2441–2449. https://doi.org/10.1007/s41870-022-00938-5

  19. Saidi A, Benahmed K, Seddiki N (2020) Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks. Ad Hoc Netw 106:102215

    Article  Google Scholar 

  20. Al-Maslamani N, Abdallah M (2020) Malicious node detection in wireless sensor network using swarm intelligence optimization. In: 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) (pp 219–224). IEEE

  21. Lai Y, Tong L, Liu J, Wang Y, Tang T, Zhao Z, Qin H (2022) Identifying malicious nodes in wireless sensor networks based on correlation detection. Comput Secur 113:102540

    Article  Google Scholar 

  22. Ge X, Han QL, Zhong M, Zhang XM (2019) Distributed Krein space-based attack detection over sensor networks under deception attacks. Automatica 109:108557

    Article  MathSciNet  MATH  Google Scholar 

  23. Hu H, Han Y, Wang H, Yao M, Wang C (2021) Trust-aware secure routing protocol for wireless sensor networks. ETRI J 43(4):674–683

    Article  Google Scholar 

  24. Anand C, Vasuki N (2021) Trust based DoS attack detection in wireless sensor networks for reliable data transmission. Wireless Pers Commun 121(4):2911–2926

    Article  Google Scholar 

  25. Arivunambi A, Paramarthalingam A (2022) Intelligent slime mold algorithm for proficient jamming attack detection in wireless sensor network. Glob Transit Proc 3(2):386–391

    Article  Google Scholar 

  26. Teng Z, Du C, Li M, Zhang H, Zhu W (2022) A wormhole attack detection algorithm integrated with the node trust optimization model in WSNs. IEEE Sens J 22(7):7361–7370

    Article  Google Scholar 

  27. Shahid J, Muhammad Z, Iqbal Z, Almadhor AS, Javed AR (2022) Cellular automata trust-based energy drainage attack detection and prevention in Wireless Sensor Networks. Comput Commun 191:360–367

    Article  Google Scholar 

  28. Khan T, Singh K, Ahmad K, Ahmad KAB (2023) A secure and dependable trust assessment (SDTS) scheme for industrial communication networks. Sci Rep 13(1):1910

    Article  Google Scholar 

  29. Sudha I, Mustafa MA, Suguna R, Karupusamy S, Ammisetty V, Shavkatovich SN, Ramalingam M, Kanani P (2023) Pulse jamming attack detection using swarm intelligence in wireless sensor networks. Optik 272:170251

    Article  Google Scholar 

  30. Premkumar M, Ashokkumar SR, Jeevanantham V, Mohanbabu G, AnuPallavi S (2023) Scalable and energy efficient cluster-based anomaly detection against denial-of-service attacks in wireless sensor networks. Wireless Pers Commun 129(4):2669–2691

    Article  Google Scholar 

  31. Alansari Z, Anuar NB, Kamsin A, Belgaum MR (2023) RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things. PeerJ Computer Science 9:e1309

    Article  Google Scholar 

  32. Beslin Pajila PJ, Golden Julie E, Harold Robinson Y (2023) ABAP: Anchor node based DDoS attack detection using adaptive neuro-fuzzy inference system. Wireless Pers Commun 128(2):875–899

    Article  Google Scholar 

  33. Vijayalakshmi S, Bose S, Logeswari G, Anitha T (2023) Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory. Cyber security and applications 1:100011

    Article  Google Scholar 

  34. Desnitsky V (2022) Modeling and Detection of Denial-of-Sleep Attacks on Autonomous IoT Devices in Wireless Sensor Networks. In: Security T, Models P (eds) and Architectures in IoT Environments. Springer International Publishing, Cham, pp 77–97

    Google Scholar 

  35. Dani V (2023) Detection of Denial-of-Service Attack Using Weight based Trust Aware Routing Approach. J Inf Assur Secur 18(3)

  36. Udhaya Sankar SM, Jagadish Kumar N, Elangovan G, Praveen R (2023) An Integrated Z-Number and DEMATEL-Based Cooperation Enforcement Scheme for Thwarting Malicious Nodes in MANETs. Wirel Pers Commun 130(4):2531–2563

    Article  Google Scholar 

  37. Udhaya Sankar SM, Praveen R, Jagadish Kumar N, Jagatheswari S (2023) Fuzzy ELECTRE multi-criteria decision-making technique for achieving reliable data dissemination in MANETs. Int J Inf Technol 15(4):1985–1998

    Google Scholar 

  38. Jagatheswari S, Ramalingam P, Chandra Priya J (2022) Improved grey relational analysis-based TOPSIS method for cooperation enforcing scheme to guarantee quality of service in MANETs. Int J Inf Technol 14(2):887–897

    Google Scholar 

  39. Janakiraman S, Priya MD (2022) Selfish node detection scheme based on bates distribution inspired trust factor for MANETs. EAI Endorsed Trans Energy Web 9(6):e1–e1

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

All the authors are equally contributed to the paper.

Corresponding author

Correspondence to S. Madhavi.

Ethics declarations

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Conflict of interest

The authors declare that they have no conflict of interest.

Competing interests

Not Applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Madhavi, S., Praveen, R., Jagadish Kumar, N. et al. Hybrid Grey PIPRECIA and Grey OCRA method-based dynamic multi-criteria decision-making model for mitigating non-cooperating node attacks in WSNs. Peer-to-Peer Netw. Appl. 16, 2607–2629 (2023). https://doi.org/10.1007/s12083-023-01543-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-023-01543-4

Keywords

Navigation