Skip to main content

Advertisement

Log in

Cluster head selection and malicious node detection using large-scale energy-aware trust optimization algorithm for HWSN

  • Original Article
  • Published:
Journal of Reliable Intelligent Environments Aims and scope Submit manuscript

Abstract

The widespread use of hierarchical wireless sensor networks (HWSN) in various industries, including environmental monitoring, healthcare, and intrusion detection, has made the development of trust among sensor nodes (SNs) essential for enhancing security, dependability, and productive cooperation. However, the existing techniques for HWSN trust management are ineffective because of their poor reliability, increased communication overheads, inaccurate cluster head (CH) selection, etc. The large-scale energy-aware trust optimization (LS-EATO) algorithm is proposed for CH selection and malicious node (MN) detection to avoid these issues. A harmonic search genetic algorithm (HGA) is initially used to select the CH based on energy, trust, distance, and density. By considering trust value, this method avoids the selection of an MN node as the CH. Afterward, MNs are detected using the energy-aware intra and inter-cluster trust (EAIICT) estimation model, which depends on two modules, such as direct trust (DT) and indirect trust (IDT) at the inter-cluster level and intra-cluster level. During this process, the estimation of DT depends upon the communication trust and the data trust. Then the estimation of IDT is based on the feedback trust. This model calculates trust in distributed and centralized ways to find the MNs. Additionally, by considering residual energy (RE) in the trust computation, this estimation approach prevents choosing nodes with low energy as the trustworthy node. Furthermore, the proposed LS-EATO technique is simulated in MATLAB and compared to the existing approaches to show the effectiveness of the proposed approach. The experimental analysis represents the trustworthiness of the proposed scheme in terms of communication overhead, detection accuracy, detection rate, and energy consumption for different network sizes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

References

  1. She W, Liu Q, Tian Z, Chen JS, Wang B, Liu W (2019) Blockchain trust model for malicious node detection in wireless sensor networks. IEEE Access 7:38947–38956

    Article  Google Scholar 

  2. Yang H, Zhang X, Cheng F (2020) A novel algorithm for improving malicious node detection effect in wireless sensor networks. Mobile Netw Appl. https://doi.org/10.1007/s11036-019-01492-4

    Article  Google Scholar 

  3. Jaint B, Indu S, Pandey N, Pahwa K (2019) Malicious Node Detection in Wireless Sensor Networks Using Support Vector Machine. In 2019 3rd International Conference on Recent Developments in Control, Automation & Power Engineering (RDCAPE) IEEE, 247–252

  4. Yang H, Zhang X, Cheng F (2019) A novel wireless sensor networks malicious node detection method. In International Conference on Security and Privacy in New Computing Environments. Springer, Cham, 697–706

  5. Teng Z, Pang B, Sun M, Xie L, Guo L (2021) A malicious node identification strategy with environmental parameters optimization in wireless sensor network. Wireless Pers Commun 117(2):1143–1162

    Article  Google Scholar 

  6. Gandhimathi L, Murugaboopathi G (2021) Mobile malicious node detection using mobile agent in cluster-based wireless sensor networks. Wireless Pers Commun 117(2):1209–1222

    Article  Google Scholar 

  7. Alghamdi TA (2019) Convolutional technique for enhancing security in wireless sensor networks against malicious nodes. HCIS 9(1):1

    MathSciNet  CAS  Google Scholar 

  8. Zhang W, Zhu S, Tang J, Xiong N (2018) A novel trust management scheme based on Dempster-Shafer evidence theory for malicious nodes detection in wireless sensor networks. J Supercomput 74(4):1779–1801

    Article  Google Scholar 

  9. Kumar S, Mehfuz S (2019) A PSO based malicious node detection and energy efficient clustering in wireless sensor network. In 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN) IEEE, 859–863

  10. Al-Maslamani N, Abdallah M (2020) Malicious node detection in wireless sensor network using swarm intelligence optimization. In 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) IEEE, 219–224

  11. Gomathi S, Krishnan CG (2020) Malicious node detection in wireless sensor networks using an efficient secure data aggregation protocol. Wireless Pers Commun 113(4):1775–1790

    Article  Google Scholar 

  12. Jamshidi M, Zangeneh E, Esnaashari M, Darwesh AM, Meybodi MR (2019) A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it. Wireless Pers Commun 105(1):145–173

    Article  Google Scholar 

  13. Prithi S, Sumathi S (2020) LD2FA-PSO: a novel learning dynamic deterministic finite automata with PSO algorithm for secured energy efficient routing in wireless sensor network. Ad Hoc Netw 97:102024

    Article  Google Scholar 

  14. Ghugar U, Pradhan J, Bhoi SK, Sahoo RR, Panda SK (2018) PL-IDS: physical layer trust based intrusion detection system for wireless sensor networks. Int J Inf Technol 10(4):489–494

    Google Scholar 

  15. Khan T, Singh K, Abdel-Basset M, Long HV, Singh SP, Manjul M (2019) A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks. IEEE Access 7:58221–58240

    Article  Google Scholar 

  16. Gao M, Wu Y, Nan J, Cui S (2019) Multimedia detection algorithm of malicious nodes in intelligent grid based on fuzzy logic. Multimed Tools Appl 78(17):24011–24022

    Article  Google Scholar 

  17. Gao B, Maekawa T, Amagata D, Hara T (2018) Environment-adaptive malicious node detection in MANETs with ensemble learning. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) IEEE, 556–566

  18. Anwar RW, Zainal A, Outay F, Yasar A, Iqbal S (2019) BTEM: belief based trust evaluation mechanism for wireless sensor networks. Futur Gener Comput Syst 96:605–616

    Article  Google Scholar 

  19. Sharma N, Sharma M, Sharma DP (2020) A Trust based scheme for spotting malicious node of wormhole in dynamic source routing protocol. In 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) IEEE, 1232–1237

  20. Ma Z, Liu L, Meng W (2020) DCONST: detection of multiple-mix-attack malicious nodes using consensus-based trust in IoT networks. In Australasian Conference on Information Security and Privacy, Springer, Cham. 247–267

  21. Yin X (2019) Li S (2019) Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networks. EURASIP J Wirel Commun Netw 1:1

    Google Scholar 

  22. Das R, Dash D, Sarkar MK (2020) HTMS: fuzzy based hierarchical trust management scheme in WSN. Wireless Pers Commun. https://doi.org/10.1007/s11277-020-07092-w

    Article  Google Scholar 

  23. Mirsadeghi F, Rafsanjani MK, Gupta BB (2021) A trust infrastructure based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Netw Appl 14(4):2537–2553

    Article  Google Scholar 

  24. Swaroop GV, Murugaboopathi G (2019) Secure and reliable communication scheme for MANET using ECMS cluster head-based certificate revocation. Clust Comput 22(5):11513–11525

    Google Scholar 

  25. Zahedi A, Parma F (2019) An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Netw Appl 12(1):167–176

    Article  Google Scholar 

  26. Saidi A, Benahmed K, Seddiki N (2020) Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks. Ad Hoc Netw 106:102215

    Article  Google Scholar 

  27. Kalidoss T, Rajasekaran L, Kanagasabai K, Sannasi G, Kannan A (2020) QoS aware trust based routing algorithm for wireless sensor networks. Wireless Pers Commun 110(4):1637–1658

    Article  Google Scholar 

  28. Shahraki A, Taherkordi A, Haugen Ø, Eliassen F (2020) Clustering objectives in wireless sensor networks: a survey and research direction analysis. Comput Netw 180:107376

    Article  Google Scholar 

  29. Shahraki A, Taherkordi A, Haugen Ø, Eliassen F (2020) A survey and future directions on clustering: from WSNs to IoT and modern networking paradigms. IEEE Trans Netw Serv Manag 18(2):2242–2274

    Article  Google Scholar 

Download references

Funding

There is no funding for this study.

Author information

Authors and Affiliations

Authors

Contributions

All the authors have participated in writing the manuscript and have revised the final version. All authors read and approved the final manuscript. All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by RD, MD. The first draft of the manuscript was written by RD and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript. Conceptualization: RD; Methodology: RD; Formal analysis and investigation: RD, MD; Writing—original draft preparation: RD; Writing—review and editing: RD; Supervision: MD.

Corresponding author

Correspondence to Rahul Das.

Ethics declarations

Conflict of interest

Authors declares that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants and/or animals performed by any of the authors.

Informed consent

There is no informed consent for this study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Das, R., Dwivedi, M. Cluster head selection and malicious node detection using large-scale energy-aware trust optimization algorithm for HWSN. J Reliable Intell Environ 10, 55–71 (2024). https://doi.org/10.1007/s40860-022-00200-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40860-022-00200-6

Keywords

Navigation