Skip to main content

Advertisement

Log in

Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

In wireless sensor networks (WSNs), energy optimization and the provision of security are the major design challenges. Since the wireless sensor devices are energy constrained, the issue of high energy consumption by the malicious nodes must be addressed well in order to enhance the network performance by making increased network lifetime, reduced energy consumption and delay. In the past, many researchers worked in the provision of new techniques for providing improved security to WSN in order to enhance the reliability in the routing process. However, most of the existing routing techniques are not able to achieve the required security through the use of intelligent techniques for safeguarding the sensor nodes from malicious attacks. In order to address these problems, a new fuzzy temporal clustering-based secured communication model with trust analysis and outlier detection has been developed in this research work. For this purpose, a new fuzzy temporal rule-based cluster-based routing algorithm with trust modelling and outlier detection for monitoring the nodes participating in the communication has been proposed. In addition, a fuzzy temporal rule- and distance-based outlier detection algorithm is also proposed in this paper for distinguishing the malicious nodes from other nodes within each cluster of the network and has been used in the secured routing algorithm. The proposed secure routing algorithm uses the temporal reasoning tasks of explanation-based learning and prediction as well as spatial constraints for making efficient routing decisions through the application of trust and key management techniques for performing effective authentication of nodes and thereby isolating the malicious nodes from communication through outlier detection. By applying these two proposed algorithms for communication in the proposed work, it is proved through experiments that the proposed secure routing algorithm and the outlier detection algorithm are able to perform secured and reliable routing through genuine cluster head nodes more effectively. Moreover, these two algorithms provide improved quality of service with respect to the reliability of communication, packet delivery ratio, reduction in end-to-end delay and reduced energy consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Allen JF (1983) Maintaining knowledge about temporal intervals. Commun ACM 26(11):832–843

    Article  MATH  Google Scholar 

  • Alshammari H, Ghorbel O, Aseeri M, Abid M (2018) Non-negative matrix factorization (NMF) for outlier detection in wireless sensor networks, pp 506–511

  • Anwar RW, Zainal A, Outay F, Yasar A, Iqbal S (2019) BTEM: belief based trust evaluation mechanism for wireless sensor networks. Future Gener Comput Syst 96:605–616

    Article  Google Scholar 

  • Ayadi A, Ghorbel O, Obeidad AFM, Abid M (2017) Outlier detection approaches for wireless sensor networks: a survey. Comput Netw 129(1):319–333

    Article  Google Scholar 

  • Bao F, Chen IR, Chang M, Cho JH (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Serv Manag 9(2):169–183

    Article  Google Scholar 

  • Dang H, Wu H (2010) Clustering and cluster-based routing protocol for delay-tolerant mobile networks. IEEE Trans Wirel Commun 9(6):1874–1881

    Article  Google Scholar 

  • Das A, Islam MM (2012) Secured trust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Trans Dependable Secure Comput 9(2):261–274

    Article  Google Scholar 

  • Dean TL, McDermott DV (1987) Temporal database management. Artif Intell 32(1):1–55

    Article  Google Scholar 

  • Deng H, Yang Y, Jin G, Xu R, Shi W (2010) Building a trust-aware dynamic routing solution for wireless sensor networks. In: Proceedings of the IEEE GLOBECOM workshop, pp 153–157

  • Donald DM, Sanchez S, Madria S, Ercal F (2015) A survey of methods for finding outliers in wireless sensor networks. J Netw Syst Manag 23(1):163–182

    Article  Google Scholar 

  • Duan J, Qin Y, Zhang S, Zheng T, Zhang H (2011) Issues of trust management for mobile wireless sensor networks. In: 7th international conference on wireless communications, networking and mobile computing, pp 1–4

  • Fawzy A, Mokhtar HMO, Hegazy O (2013) Outliers detection and classification in wireless sensor networks. Egypt Inform J 14:157–164

    Article  Google Scholar 

  • Ganeriwal S, Balzano LK, Srivastava MB (2008) Reputation based framework for high integrity sensor networks. ACM Trans Sens Netw 4(3):66–77

    Article  Google Scholar 

  • Gilbert EPK, Kaliaperumal B, Rajsingh EB, Lydia M (2018) Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks. Comput Electr Eng 72:894–909

    Article  Google Scholar 

  • Hamdane B, Boussada R, Elhdhili ME, El Fatmi SG (2017) Hierarchical identity based cryptography for security and trust in named data networking. In: 2017 IEEE 26th international conference on enabling technologies: infrastructure for collaborative enterprises, pp 226–231

  • Han J, Kamber M, Pei J (2011) Data mining: concepts and techniques. The Morgan Kaufmann series in data management systems, 3rd edn. Morgan Kaufmann Publishers, Burlington

    Google Scholar 

  • Hodge V, Austin J (2003) A survey of outlier detection methodologies. Artif Intell Rev 22:85–126

    Article  MATH  Google Scholar 

  • Izadi D, Abawajy J, Ghanavati S (2015) An alternative clustering scheme in WSN. IEEE Sens J 15(7):4148–4155

    Article  Google Scholar 

  • Jabeen F, Fernandes AAA (2012) An algorithmic strategy for in network distributed spatial analysis in wireless sensor networks. J Parallel Distrib Comput 72:1628–1653

    Article  Google Scholar 

  • Jaisankar N, Ganapathy S, Yogesh P, Kannan A, Anand K (2012) An intelligent agent-based intrusion detection system using fuzzy rough set based outlier detection. Soft Comput Tech Vis Sci 395:147–153

    Article  Google Scholar 

  • Kerrache CA, Calafate CT, Cano J-C, Lagraa N, Manzoni P (2016) Trust management for vehicular networks: an adversary-oriented overview. IEEE Access 4:9293–9307

    Article  Google Scholar 

  • Kim J, Jang KY, Choo H, Kim W (2007) Energy efficient LEACH with TCP for wireless sensor networks. In: Computational science and its applications–ICCSA 2007, pp 275–285

  • Kosko B (1986) Fuzzy cognitive maps. Int J Man Mach Stud 24(1):65–75

    Article  MATH  Google Scholar 

  • Lee S-B, Choi Y-H (2006) A secure alternate path routing in sensor networks. Comput Commun 30(1):153–165

    Article  Google Scholar 

  • Li S, Zhao S, Wang X, Zhang K, Li L (2014) Adaptive and secure load-balancing routing protocol for service-oriented wireless sensor networks. IEEE Syst J 8(3):858–867

    Article  Google Scholar 

  • Lin H, Wang L, Kong R (2015) Energy efficient clustering protocol for large-scale sensor networks. IEEE Sens J 15(12):7150–7160

    Article  Google Scholar 

  • Liu Y, Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensics Secur 11(9):2013–2027

    Article  Google Scholar 

  • Logambigai R, Kannan A (2016) Fuzzy logic based unequal clustering for wireless sensor networks. Wirel Netw 22:945–957

    Article  Google Scholar 

  • Logambigai R, Ganapathy S, Kannan A (2018) Energy–efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Comput Electr Eng 68:62–75

    Article  Google Scholar 

  • Mahmoud MEM, Lin X, Shen X (2015) Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Trans Parallel Distrib Syst 26(4):1140–1153

    Article  Google Scholar 

  • Mazinani A, Mazinani SM, Mirzaie M (2019) FMCR-CT: an energy-efficient fuzzy multi cluster based routing with a constant threshold in wireless sensor network. Alex Eng J 58:127–141

    Article  Google Scholar 

  • Miglani A, Bhatia T, Goel S (2015) Trust-based energy efficient routing in LEACH for wireless sensor networks. In: Proceedings of 2015 global conference on communication technologies, pp 361–365

  • Moonesignhe HDK, Tan P-N (2006) Outlier detection using random walks. In: IEEE international conference on tools with artificial intelligence (ICTAI'06), pp 532–539

  • Muthurajkumar S, Ganapathy S, Vijayalakshmi M, Kannan A (2017) An intelligent secured and energy efficient routing algorithm for MANETs. Wirel Pers Commun 96(2):1753–1769

    Article  Google Scholar 

  • Russell S, Norvig P (1994) Artificial intelligence: a modern approach. Prentice Hall, Englewood

    MATH  Google Scholar 

  • Saeed N, Al-Naffouri TY, Alouini M-S (2019) Outlier detection and optimal anchor placement for 3-D underwater optical wireless sensor network localization. IEEE Trans Commun 67(1):611–622

    Article  Google Scholar 

  • Santhosh Kumar SVN, Palanichamy Y (2018) Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wirel Netw 24(4):1343–1360

    Article  Google Scholar 

  • Sethukkarasi R, Ganapathy S, Yogesh P, Kannan A (2014) An intelligent neuro fuzzy temporal knowledge representation model for mining temporal patterns. Int J Fuzzy Syst 26(3):1167–1178

    MATH  Google Scholar 

  • Shahid N, Naqvi IH, Qaisar SB (2012) Quarter-sphere SVM: attribute and spatio-temporal correlations based outlier & event detection in wireless sensor networks. In: 2012 IEEE wireless communications and networking conference: mobile and wireless networks, pp 2048–2053

  • Shaikh RA, Jameel H, d’Auriol BJ, Lee H, Lee S, Song YJ (2009) Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans Parallel Distrib Syst 20(11):1698–1712

    Article  Google Scholar 

  • Shamim Hossain M, You X, Xiao W, Song JLE (2019) QoS-oriented multimedia transmission using multipath routing. Future Gener Comput Syst 99:226–234

    Article  Google Scholar 

  • Shiva Murthy G, D’Souza RJ, Varaprasad G (2012) Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks. IEEE Trans Sens J 12(10):2941–2949

    Article  Google Scholar 

  • Sree Rathna Lakshmi NVS, Babu S, Bhalaji N (2017) Analysis of clustered QoS routing protocol for distributed wireless sensor network. Comput Electr Eng 64:173–181

    Article  Google Scholar 

  • Stallings W (2005) Cryptography and network security principles and practices, 4th edn. Prentice Hall, Englewood

    Google Scholar 

  • Sun G, Li Y, Hongfang Yu, Vasilakos AV, Xiaojiang D, Guizani M (2019) Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks. Future Gener Comput Syst 91:347–360

    Article  Google Scholar 

  • Thangaramya K, Kulothungan K, Logambigai R, Selvi M, Ganapathy S, Kannan A (2019) Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. Comput Netw 151:211–223

    Article  Google Scholar 

  • Weichao W, Fei D, Qijian X (2009) An improvement of LEACH routing protocol based on trust for wireless sensor networks, 2009. In: 5th conference on wireless communications and mobile computing, pp 1–4

  • Younis O, Fahmy S (2004) HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Trans Mob Comput 3(4):366–379

    Article  Google Scholar 

  • Zadeh LA (1965) Fuzzy sets. Inf Control 8(3):338–353

    Article  MATH  Google Scholar 

Download references

Acknowledgements

We wish to thank Dr.S.V.N. Santhosh kumar and Dr.M.Selvi Assistant Professors from VIT, Vellore, Tamil Nadu, India, who has supported us along the way. We are grateful to our family members and friends who have provided us through moral and emotional support in our life.

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. V. N. Santhosh Kumar.

Ethics declarations

Conflict of interest

All authors state that there is no conflict of interest.

Human and animal rights

Humans/Animals are not involved in this work. We used our own data.

Additional information

Communicated by V. Loia.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thangaramya, K., Kulothungan, K., Indira Gandhi, S. et al. Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Comput 24, 16483–16497 (2020). https://doi.org/10.1007/s00500-020-04955-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-020-04955-z

Keywords

Navigation