Abstract
In wireless sensor networks (WSNs), energy optimization and the provision of security are the major design challenges. Since the wireless sensor devices are energy constrained, the issue of high energy consumption by the malicious nodes must be addressed well in order to enhance the network performance by making increased network lifetime, reduced energy consumption and delay. In the past, many researchers worked in the provision of new techniques for providing improved security to WSN in order to enhance the reliability in the routing process. However, most of the existing routing techniques are not able to achieve the required security through the use of intelligent techniques for safeguarding the sensor nodes from malicious attacks. In order to address these problems, a new fuzzy temporal clustering-based secured communication model with trust analysis and outlier detection has been developed in this research work. For this purpose, a new fuzzy temporal rule-based cluster-based routing algorithm with trust modelling and outlier detection for monitoring the nodes participating in the communication has been proposed. In addition, a fuzzy temporal rule- and distance-based outlier detection algorithm is also proposed in this paper for distinguishing the malicious nodes from other nodes within each cluster of the network and has been used in the secured routing algorithm. The proposed secure routing algorithm uses the temporal reasoning tasks of explanation-based learning and prediction as well as spatial constraints for making efficient routing decisions through the application of trust and key management techniques for performing effective authentication of nodes and thereby isolating the malicious nodes from communication through outlier detection. By applying these two proposed algorithms for communication in the proposed work, it is proved through experiments that the proposed secure routing algorithm and the outlier detection algorithm are able to perform secured and reliable routing through genuine cluster head nodes more effectively. Moreover, these two algorithms provide improved quality of service with respect to the reliability of communication, packet delivery ratio, reduction in end-to-end delay and reduced energy consumption.
Similar content being viewed by others
References
Allen JF (1983) Maintaining knowledge about temporal intervals. Commun ACM 26(11):832–843
Alshammari H, Ghorbel O, Aseeri M, Abid M (2018) Non-negative matrix factorization (NMF) for outlier detection in wireless sensor networks, pp 506–511
Anwar RW, Zainal A, Outay F, Yasar A, Iqbal S (2019) BTEM: belief based trust evaluation mechanism for wireless sensor networks. Future Gener Comput Syst 96:605–616
Ayadi A, Ghorbel O, Obeidad AFM, Abid M (2017) Outlier detection approaches for wireless sensor networks: a survey. Comput Netw 129(1):319–333
Bao F, Chen IR, Chang M, Cho JH (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Serv Manag 9(2):169–183
Dang H, Wu H (2010) Clustering and cluster-based routing protocol for delay-tolerant mobile networks. IEEE Trans Wirel Commun 9(6):1874–1881
Das A, Islam MM (2012) Secured trust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Trans Dependable Secure Comput 9(2):261–274
Dean TL, McDermott DV (1987) Temporal database management. Artif Intell 32(1):1–55
Deng H, Yang Y, Jin G, Xu R, Shi W (2010) Building a trust-aware dynamic routing solution for wireless sensor networks. In: Proceedings of the IEEE GLOBECOM workshop, pp 153–157
Donald DM, Sanchez S, Madria S, Ercal F (2015) A survey of methods for finding outliers in wireless sensor networks. J Netw Syst Manag 23(1):163–182
Duan J, Qin Y, Zhang S, Zheng T, Zhang H (2011) Issues of trust management for mobile wireless sensor networks. In: 7th international conference on wireless communications, networking and mobile computing, pp 1–4
Fawzy A, Mokhtar HMO, Hegazy O (2013) Outliers detection and classification in wireless sensor networks. Egypt Inform J 14:157–164
Ganeriwal S, Balzano LK, Srivastava MB (2008) Reputation based framework for high integrity sensor networks. ACM Trans Sens Netw 4(3):66–77
Gilbert EPK, Kaliaperumal B, Rajsingh EB, Lydia M (2018) Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks. Comput Electr Eng 72:894–909
Hamdane B, Boussada R, Elhdhili ME, El Fatmi SG (2017) Hierarchical identity based cryptography for security and trust in named data networking. In: 2017 IEEE 26th international conference on enabling technologies: infrastructure for collaborative enterprises, pp 226–231
Han J, Kamber M, Pei J (2011) Data mining: concepts and techniques. The Morgan Kaufmann series in data management systems, 3rd edn. Morgan Kaufmann Publishers, Burlington
Hodge V, Austin J (2003) A survey of outlier detection methodologies. Artif Intell Rev 22:85–126
Izadi D, Abawajy J, Ghanavati S (2015) An alternative clustering scheme in WSN. IEEE Sens J 15(7):4148–4155
Jabeen F, Fernandes AAA (2012) An algorithmic strategy for in network distributed spatial analysis in wireless sensor networks. J Parallel Distrib Comput 72:1628–1653
Jaisankar N, Ganapathy S, Yogesh P, Kannan A, Anand K (2012) An intelligent agent-based intrusion detection system using fuzzy rough set based outlier detection. Soft Comput Tech Vis Sci 395:147–153
Kerrache CA, Calafate CT, Cano J-C, Lagraa N, Manzoni P (2016) Trust management for vehicular networks: an adversary-oriented overview. IEEE Access 4:9293–9307
Kim J, Jang KY, Choo H, Kim W (2007) Energy efficient LEACH with TCP for wireless sensor networks. In: Computational science and its applications–ICCSA 2007, pp 275–285
Kosko B (1986) Fuzzy cognitive maps. Int J Man Mach Stud 24(1):65–75
Lee S-B, Choi Y-H (2006) A secure alternate path routing in sensor networks. Comput Commun 30(1):153–165
Li S, Zhao S, Wang X, Zhang K, Li L (2014) Adaptive and secure load-balancing routing protocol for service-oriented wireless sensor networks. IEEE Syst J 8(3):858–867
Lin H, Wang L, Kong R (2015) Energy efficient clustering protocol for large-scale sensor networks. IEEE Sens J 15(12):7150–7160
Liu Y, Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensics Secur 11(9):2013–2027
Logambigai R, Kannan A (2016) Fuzzy logic based unequal clustering for wireless sensor networks. Wirel Netw 22:945–957
Logambigai R, Ganapathy S, Kannan A (2018) Energy–efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Comput Electr Eng 68:62–75
Mahmoud MEM, Lin X, Shen X (2015) Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Trans Parallel Distrib Syst 26(4):1140–1153
Mazinani A, Mazinani SM, Mirzaie M (2019) FMCR-CT: an energy-efficient fuzzy multi cluster based routing with a constant threshold in wireless sensor network. Alex Eng J 58:127–141
Miglani A, Bhatia T, Goel S (2015) Trust-based energy efficient routing in LEACH for wireless sensor networks. In: Proceedings of 2015 global conference on communication technologies, pp 361–365
Moonesignhe HDK, Tan P-N (2006) Outlier detection using random walks. In: IEEE international conference on tools with artificial intelligence (ICTAI'06), pp 532–539
Muthurajkumar S, Ganapathy S, Vijayalakshmi M, Kannan A (2017) An intelligent secured and energy efficient routing algorithm for MANETs. Wirel Pers Commun 96(2):1753–1769
Russell S, Norvig P (1994) Artificial intelligence: a modern approach. Prentice Hall, Englewood
Saeed N, Al-Naffouri TY, Alouini M-S (2019) Outlier detection and optimal anchor placement for 3-D underwater optical wireless sensor network localization. IEEE Trans Commun 67(1):611–622
Santhosh Kumar SVN, Palanichamy Y (2018) Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wirel Netw 24(4):1343–1360
Sethukkarasi R, Ganapathy S, Yogesh P, Kannan A (2014) An intelligent neuro fuzzy temporal knowledge representation model for mining temporal patterns. Int J Fuzzy Syst 26(3):1167–1178
Shahid N, Naqvi IH, Qaisar SB (2012) Quarter-sphere SVM: attribute and spatio-temporal correlations based outlier & event detection in wireless sensor networks. In: 2012 IEEE wireless communications and networking conference: mobile and wireless networks, pp 2048–2053
Shaikh RA, Jameel H, d’Auriol BJ, Lee H, Lee S, Song YJ (2009) Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans Parallel Distrib Syst 20(11):1698–1712
Shamim Hossain M, You X, Xiao W, Song JLE (2019) QoS-oriented multimedia transmission using multipath routing. Future Gener Comput Syst 99:226–234
Shiva Murthy G, D’Souza RJ, Varaprasad G (2012) Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks. IEEE Trans Sens J 12(10):2941–2949
Sree Rathna Lakshmi NVS, Babu S, Bhalaji N (2017) Analysis of clustered QoS routing protocol for distributed wireless sensor network. Comput Electr Eng 64:173–181
Stallings W (2005) Cryptography and network security principles and practices, 4th edn. Prentice Hall, Englewood
Sun G, Li Y, Hongfang Yu, Vasilakos AV, Xiaojiang D, Guizani M (2019) Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks. Future Gener Comput Syst 91:347–360
Thangaramya K, Kulothungan K, Logambigai R, Selvi M, Ganapathy S, Kannan A (2019) Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. Comput Netw 151:211–223
Weichao W, Fei D, Qijian X (2009) An improvement of LEACH routing protocol based on trust for wireless sensor networks, 2009. In: 5th conference on wireless communications and mobile computing, pp 1–4
Younis O, Fahmy S (2004) HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Trans Mob Comput 3(4):366–379
Zadeh LA (1965) Fuzzy sets. Inf Control 8(3):338–353
Acknowledgements
We wish to thank Dr.S.V.N. Santhosh kumar and Dr.M.Selvi Assistant Professors from VIT, Vellore, Tamil Nadu, India, who has supported us along the way. We are grateful to our family members and friends who have provided us through moral and emotional support in our life.
Funding
Not applicable.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
All authors state that there is no conflict of interest.
Human and animal rights
Humans/Animals are not involved in this work. We used our own data.
Additional information
Communicated by V. Loia.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Thangaramya, K., Kulothungan, K., Indira Gandhi, S. et al. Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Comput 24, 16483–16497 (2020). https://doi.org/10.1007/s00500-020-04955-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-020-04955-z