Skip to main content

Advertisement

Log in

Cuddle death algorithm using ABC for detecting unhealthy nodes in wireless sensor networks

  • Research Paper
  • Published:
Evolutionary Intelligence Aims and scope Submit manuscript

Abstract

Wireless sensor networks consist of some sensor nodes that have a minimum operational capability, with less memory capacity for storing data and limited energy source. The deployment of these nodes or sensors takes place randomly in a dynamic or static environment. This type of placement of nodes in a hostile environment can be charge by the malicious nodes in a wireless sensor network (WSN). This vulnerability in nodes makes the wireless sensor network unstable and leads to many types of demerits like limited battery lifetime, less computing, and limited memory space. To avoid these attacks and to reduce the impact created by the malicious nodes, we suggest a simple and effective way of detecting and removing unhealthy nodes in the environment. We proposed a simple scheme by using the Artificial Bee Colony algorithm which is known as the cuddle death design. The theme of a scheme is to find the unhealthy or malicious cluster head nodes in the network and removing that particular node without creating any harm to the other nodes in the environment. It also helps to improve the energy efficiency, packet delivery ratio with maximum throughput in WSN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Manimurugan S et al (2020) Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system. Microprocess Microsyst 79:103261

    Article  Google Scholar 

  2. Zhang X, Xiaohui Lu, Zhang X (2020) Mobile wireless sensor network lifetime maximization by using evolutionary computing methods. Ad Hoc Netw 101:102094

    Article  Google Scholar 

  3. Garg S et al (2020) En-ABC: an ensemble artificial bee colony based anomaly detection scheme for cloud environment. J Parallel Distrib Comput 135:219–233

    Article  Google Scholar 

  4. Pang C, Xu G, Zhang Y (2020) A new energy efficient management approach for wireless sensor networks in target tracking. Defence Technol. https://doi.org/10.1016/j.dt.2020.05.022

    Article  Google Scholar 

  5. Dwivedi S, Vardhan M, Tripathi S (2020) An effect of chaos grasshopper optimization algorithm for protection of network infrastructure. Comput Netw 176:107251

    Article  Google Scholar 

  6. Singh M, Mehta G, Vaid C, Oberoi P (2012) Detection of malicious node in wireless sensor network based on data mining. In: 2012 International Conference on Computing Sciences, IEEE, pp 291–294

  7. Guimaraes DA, Sakai LJ, Alberti AM, De Souza RAA (2016) Increasing the lifetime of mobile wsns via dynamic optimization of sensor node communication activity. Sensors 16(9):1536

    Article  Google Scholar 

  8. Rambabu B, Reddy AV, Janakiraman S (2019) Hybrid Artificial Bee Colony and Monarchy Butterfly Optimization Algorithm (HABC-MBOA)-based cluster head selection for WSNs. J King Saud Univ Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2019.12.006

    Article  Google Scholar 

  9. Le Nguyen P, Nguyen K, Vu H, Ji Y (2019) TELPAC: A time and energy efficient protocol for locating and patching coverage holes in WSNs. J Netw Comput Appl 147:102439

    Article  Google Scholar 

  10. Suma N, Purusothaman T (2014) Secure authentication based multipath routing protocol for WSNs. J Theor Appl Inf Technol 59:222–231

    Google Scholar 

  11. Guo H, Gao Y, Xu T, Zhang X, Ye J (2019) A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks. Ad Hoc Netw 95:101965

    Article  Google Scholar 

  12. Subhaponmani S, Balakrishnan C (2014) SDRP and SSO mechanism for impersonation attack in wireless sensor networks. Int J Adv Res Comput Sci Technol

  13. Thiruppathy Kesavan V, Radhakrishnan S (2015) Secure clustering and routing for heterogeneous mobile wireless sensor networks with dynamic key management. J Exp Theor Artif Intell 28:971–988

    Article  Google Scholar 

  14. Kumar M, Verma S, Lata K (2015) Secure data aggregation in wireless sensor networks using homomorphic encryption. Int J Electron 102(4):690–702

    Article  Google Scholar 

  15. Sharmila S, Umamaheswari G (2013) Node ID based detection of Sybil attack in mobile wireless sensor network. Int J Electron 100(10):1441–1454

    Article  Google Scholar 

  16. Verma VK, Singh S, Pathak NP (2016) Impact of malicious servers over trust and reputation models in wireless sensor networks. Int J Electron 103(3):530–540

    Article  Google Scholar 

  17. Hamedheidari S, Rafeh R (2013) A novel agent-based approach to detect sinkhole attacks in wireless sensor networks. Comput Secur 37:1–14

    Article  Google Scholar 

  18. Hashim HA, Ayinde BO, Abido MA (2016) Optimal placement of relay nodes in wireless sensor network using artificial bee colony algorithm. Journal of Network and Computer Applications 64:239–248

    Article  Google Scholar 

  19. Yousefi S et al (2020) An energy-efficient artificial bee colony-based clustering in the internet of things. Comput Electr Eng 86:106733

    Article  Google Scholar 

  20. Wang H, Wang W, Xiao S, Cui Z, Xu M, Zhou X (2020) Improving Artificial Bee Colony algorithm using a new neighborhood selection mechanism. Inf Sci 527:227–240

    Article  MathSciNet  Google Scholar 

  21. Saad E, Elhosseini MA, Haikal AY (2019) Culture-based artificial bee colony with heritage mechanism for optimization of wireless sensors network. Appl Soft Comput 79:59–73

    Article  Google Scholar 

  22. Liang G, Yu H (2018) Network selection algorithm for heterogeneous wireless networks based on service characteristics and user preferences. EURASIP J Wirel Commun Netw 2018(1):241

    Article  Google Scholar 

  23. Yadav AS, Khushboo K, Singh VK, Kushwaha DS (2020) Increasing efficiency of sensor nodes by clustering in section based hybrid routing protocol with artificial bee colony. Procedia Comput Sci 171:887–896

    Article  Google Scholar 

  24. Mitra R, Khan T (2012) Secure and reliable data transmission in wireless sensor network: a survey. Int J Comput Eng Res 2(3):748–754

    Google Scholar 

  25. Raghav RS, Thirugnansambandam K, Anguraj DK (2020) Beeware routing scheme for detecting network layer attacks in wireless sensor networks. Wirel Pers Commun 112:2439–2459

    Article  Google Scholar 

  26. Idrees AK, Deschinkel K, Salomon M, Couturier R (2016) Perimeter based coverage optimization to improve lifetime in wireless sensor networks. Eng Optim 48:1951–1972

    Article  Google Scholar 

  27. Singh AK, Purohit N, Varma S (2014) Analysis of lifetime of wireless sensor network with base station moving on different paths. Int J Electron 101(5):605–620

    Article  Google Scholar 

  28. Wu G, Chen X, Yao L, Lee Y, Yim K (2014) An efficient wormhole attack detection method in wireless sensor networks. Comput Sci Inf Syst 11(3):1127–1141

    Article  Google Scholar 

  29. Ould Amara S, Beghdad R, Oussalah M (2013) Securing wireless sensor networks: a survey. EDPACS 47(2):6–29

    Article  Google Scholar 

  30. Saleem K, Derhab A, Orgun MA, Al-Muhtadi J, Rodrigues JJ, Khalil MS, Ali Ahmed A (2016) Cost-effective encryption-based autonomous routing protocol for efficient and secure wireless sensor networks. Sensors 16(4):460

    Article  Google Scholar 

  31. Gupta B (2014) On secure communication in a sensor network. Commun Stat Theory Methods 43(21):4642–4649

    Article  MathSciNet  Google Scholar 

  32. Ibrahim A, Rahman MM, Roy MC (2015) Detecting sinkhole attacks in wireless sensor network using hop count. Int J Comput Netw Inf Secur 7(3):50

    Google Scholar 

  33. Khandare PV, Kulkarni NP (2014) Pe2a: public encryption with two ack approach to mitigate wormhole attack in WSN. IJRET Int J Res Eng Technol 3(1):102–107

    Article  Google Scholar 

  34. Nidharshini T, Janani V (2012) Detection of duplicate nodes in wireless sensor networks using sequential probability ratio testing. Int J Adv Res Comput Commun Eng 1(10):794–798

    Google Scholar 

  35. Okdem S, Karaboga D, Ozturk C (2011) An application of wireless sensor network routing based on artificial bee colony algorithm. In 2011 IEEE congress of evolutionary computation (CEC). IEEE, pp 326–330

  36. Ren Q, Yao G (2020) An energy-efficient cluster head selection scheme for energy-harvesting wireless sensor networks. Sensors 20(1):187

    Article  Google Scholar 

  37. Benmessahel I, Xie K, Chellal M, Semong T (2019) A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization. Evol Intel 12(2):131–146

    Article  Google Scholar 

  38. Yue Y, Li J, Fan H, Qin Q (2016) Optimization-based artificial bee colony algorithm for data collection in large-scale mobile wireless sensor networks. J Sens. https://doi.org/10.1155/2016/7057490

    Article  Google Scholar 

  39. John J, Rodrigues P (2019) A survey of energy-aware cluster head selection techniques in wireless sensor network. Evol Intell. https://doi.org/10.1007/s12065-019-00308-4

    Article  Google Scholar 

  40. Liang H, Yang S, Li L, Gao J (2019) Research on routing optimization of WSNs based on improved LEACH protocol. EURASIP J Wirel Commun Netw 2019(1):194

    Article  Google Scholar 

  41. Ma J, Zhao Y (2020) An improved artificial bee colony algorithm with multiple search strategy. In: International conference on green, pervasive, and cloud computing. Springer, Cham, pp 92–100

  42. Mahaleh MBNB, Mirroshandel SA (2020) Real-time application of swarm and evolutionary algorithms for line follower automated guided vehicles: a comprehensive study. Evol Intell. https://doi.org/10.1007/s12065-020-00496-4

    Article  Google Scholar 

  43. Kusyk J, Uyar MU, Sahin CS (2018) Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networks. Evol Intel 10(3–4):95–117

    Article  Google Scholar 

  44. Sharma K, Gupta PC, Sharma N (2020) Limaçon inspired artificial bee colony algorithm for numerical optimization. Evol Intell. https://doi.org/10.1007/s12065-020-00430-8

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kalaipriyan Thirugnanasambandam.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Raghav, R.S., Prabu, U., Rajeswari, M. et al. Cuddle death algorithm using ABC for detecting unhealthy nodes in wireless sensor networks. Evol. Intel. 15, 1605–1617 (2022). https://doi.org/10.1007/s12065-021-00570-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12065-021-00570-5

Keywords

Navigation