Abstract
The widespread use of hierarchical wireless sensor networks (HWSN) in various industries, including environmental monitoring, healthcare, and intrusion detection, has made the development of trust among sensor nodes (SNs) essential for enhancing security, dependability, and productive cooperation. However, the existing techniques for HWSN trust management are ineffective because of their poor reliability, increased communication overheads, inaccurate cluster head (CH) selection, etc. The large-scale energy-aware trust optimization (LS-EATO) algorithm is proposed for CH selection and malicious node (MN) detection to avoid these issues. A harmonic search genetic algorithm (HGA) is initially used to select the CH based on energy, trust, distance, and density. By considering trust value, this method avoids the selection of an MN node as the CH. Afterward, MNs are detected using the energy-aware intra and inter-cluster trust (EAIICT) estimation model, which depends on two modules, such as direct trust (DT) and indirect trust (IDT) at the inter-cluster level and intra-cluster level. During this process, the estimation of DT depends upon the communication trust and the data trust. Then the estimation of IDT is based on the feedback trust. This model calculates trust in distributed and centralized ways to find the MNs. Additionally, by considering residual energy (RE) in the trust computation, this estimation approach prevents choosing nodes with low energy as the trustworthy node. Furthermore, the proposed LS-EATO technique is simulated in MATLAB and compared to the existing approaches to show the effectiveness of the proposed approach. The experimental analysis represents the trustworthiness of the proposed scheme in terms of communication overhead, detection accuracy, detection rate, and energy consumption for different network sizes.
Similar content being viewed by others
Data availability
Data sharing is not applicable to this article as no new data were created or analyzed in this study.
References
She W, Liu Q, Tian Z, Chen JS, Wang B, Liu W (2019) Blockchain trust model for malicious node detection in wireless sensor networks. IEEE Access 7:38947–38956
Yang H, Zhang X, Cheng F (2020) A novel algorithm for improving malicious node detection effect in wireless sensor networks. Mobile Netw Appl. https://doi.org/10.1007/s11036-019-01492-4
Jaint B, Indu S, Pandey N, Pahwa K (2019) Malicious Node Detection in Wireless Sensor Networks Using Support Vector Machine. In 2019 3rd International Conference on Recent Developments in Control, Automation & Power Engineering (RDCAPE) IEEE, 247–252
Yang H, Zhang X, Cheng F (2019) A novel wireless sensor networks malicious node detection method. In International Conference on Security and Privacy in New Computing Environments. Springer, Cham, 697–706
Teng Z, Pang B, Sun M, Xie L, Guo L (2021) A malicious node identification strategy with environmental parameters optimization in wireless sensor network. Wireless Pers Commun 117(2):1143–1162
Gandhimathi L, Murugaboopathi G (2021) Mobile malicious node detection using mobile agent in cluster-based wireless sensor networks. Wireless Pers Commun 117(2):1209–1222
Alghamdi TA (2019) Convolutional technique for enhancing security in wireless sensor networks against malicious nodes. HCIS 9(1):1
Zhang W, Zhu S, Tang J, Xiong N (2018) A novel trust management scheme based on Dempster-Shafer evidence theory for malicious nodes detection in wireless sensor networks. J Supercomput 74(4):1779–1801
Kumar S, Mehfuz S (2019) A PSO based malicious node detection and energy efficient clustering in wireless sensor network. In 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN) IEEE, 859–863
Al-Maslamani N, Abdallah M (2020) Malicious node detection in wireless sensor network using swarm intelligence optimization. In 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) IEEE, 219–224
Gomathi S, Krishnan CG (2020) Malicious node detection in wireless sensor networks using an efficient secure data aggregation protocol. Wireless Pers Commun 113(4):1775–1790
Jamshidi M, Zangeneh E, Esnaashari M, Darwesh AM, Meybodi MR (2019) A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it. Wireless Pers Commun 105(1):145–173
Prithi S, Sumathi S (2020) LD2FA-PSO: a novel learning dynamic deterministic finite automata with PSO algorithm for secured energy efficient routing in wireless sensor network. Ad Hoc Netw 97:102024
Ghugar U, Pradhan J, Bhoi SK, Sahoo RR, Panda SK (2018) PL-IDS: physical layer trust based intrusion detection system for wireless sensor networks. Int J Inf Technol 10(4):489–494
Khan T, Singh K, Abdel-Basset M, Long HV, Singh SP, Manjul M (2019) A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks. IEEE Access 7:58221–58240
Gao M, Wu Y, Nan J, Cui S (2019) Multimedia detection algorithm of malicious nodes in intelligent grid based on fuzzy logic. Multimed Tools Appl 78(17):24011–24022
Gao B, Maekawa T, Amagata D, Hara T (2018) Environment-adaptive malicious node detection in MANETs with ensemble learning. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) IEEE, 556–566
Anwar RW, Zainal A, Outay F, Yasar A, Iqbal S (2019) BTEM: belief based trust evaluation mechanism for wireless sensor networks. Futur Gener Comput Syst 96:605–616
Sharma N, Sharma M, Sharma DP (2020) A Trust based scheme for spotting malicious node of wormhole in dynamic source routing protocol. In 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) IEEE, 1232–1237
Ma Z, Liu L, Meng W (2020) DCONST: detection of multiple-mix-attack malicious nodes using consensus-based trust in IoT networks. In Australasian Conference on Information Security and Privacy, Springer, Cham. 247–267
Yin X (2019) Li S (2019) Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networks. EURASIP J Wirel Commun Netw 1:1
Das R, Dash D, Sarkar MK (2020) HTMS: fuzzy based hierarchical trust management scheme in WSN. Wireless Pers Commun. https://doi.org/10.1007/s11277-020-07092-w
Mirsadeghi F, Rafsanjani MK, Gupta BB (2021) A trust infrastructure based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Netw Appl 14(4):2537–2553
Swaroop GV, Murugaboopathi G (2019) Secure and reliable communication scheme for MANET using ECMS cluster head-based certificate revocation. Clust Comput 22(5):11513–11525
Zahedi A, Parma F (2019) An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Netw Appl 12(1):167–176
Saidi A, Benahmed K, Seddiki N (2020) Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks. Ad Hoc Netw 106:102215
Kalidoss T, Rajasekaran L, Kanagasabai K, Sannasi G, Kannan A (2020) QoS aware trust based routing algorithm for wireless sensor networks. Wireless Pers Commun 110(4):1637–1658
Shahraki A, Taherkordi A, Haugen Ø, Eliassen F (2020) Clustering objectives in wireless sensor networks: a survey and research direction analysis. Comput Netw 180:107376
Shahraki A, Taherkordi A, Haugen Ø, Eliassen F (2020) A survey and future directions on clustering: from WSNs to IoT and modern networking paradigms. IEEE Trans Netw Serv Manag 18(2):2242–2274
Funding
There is no funding for this study.
Author information
Authors and Affiliations
Contributions
All the authors have participated in writing the manuscript and have revised the final version. All authors read and approved the final manuscript. All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by RD, MD. The first draft of the manuscript was written by RD and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript. Conceptualization: RD; Methodology: RD; Formal analysis and investigation: RD, MD; Writing—original draft preparation: RD; Writing—review and editing: RD; Supervision: MD.
Corresponding author
Ethics declarations
Conflict of interest
Authors declares that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants and/or animals performed by any of the authors.
Informed consent
There is no informed consent for this study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Das, R., Dwivedi, M. Cluster head selection and malicious node detection using large-scale energy-aware trust optimization algorithm for HWSN. J Reliable Intell Environ 10, 55–71 (2024). https://doi.org/10.1007/s40860-022-00200-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40860-022-00200-6