Document Type : Reseach Article

Authors

Department of Computer Engineering, Arak Branch, Islamic Azad University, Arak, Iran

Abstract

The use of wireless sensor networks is becoming more and more important due to the COVID-19 pandemic and the living conditions of human beings today. The three main goals in designing this type of network are to reduce energy consumption, choose the shortest route and choose a reliable route for data transmission. In this paper, these three goals are considered in routing. Due to the fact that this type of network is exposed to many attacks, identifying malicious nodes and removing them creates security in this type of network. This paper presents an energy-aware and trusted-based routing method using learning automata and an evaluation function. Learning automata identifies trusted nodes (to send data) and malicious nodes using the corresponding evaluation function. The evaluation function considers the residual energy, the node's trust and the number of hops to the sink parameters. Thus, the data reaches its destination in a safe and reliable way. The evaluation results of the proposed method show an improvement in the performance of this method compared to other relevant methods.

Keywords

  • [1] Bhuiyan, M.Z.A., et al., “Dependable structural health monitoring using wireless sensor networks,” IEEE Transactions on Dependable and Secure Computing, Vol. 14(4), pp. 363-376, 2015.
  • [2] Alam, M.M., D.B. Arbia, and E.B. “Hamida, Wearable wireless sensor networks for emergency response in public safety networks,” in Wireless Public Safety Networks 2., Elsevier. pp. 63-94, 2016.
  • [3] Ojha, T., S. Misra, and N.S. Raghuwanshi,” Wireless sensor networks for agriculture: The state-of-the-art in practice and future challenges,” Computers and Electronics in Agriculture, Vol. 118: pp. 66-84, 2015.
  • [4] Gomes, R.D., et al., “Application of Wireless Sensor Networks Technology for Induction Motor Monitoring in Industrial Environments,” in Intelligent Environmental Sensing., Springer. 227-277, 2015.
  • [5] Kuorilehto, M., M. Hännikäinen, and T.D. Hämäläinen, “A survey of application distribution in wireless sensor networks”, EURASIP Journal on Wireless Communications and Networking, Vol. 2005(5), pp. 859712, 2005.
  • [6] Almudevar, A., A. Leibovici, and Horwitz. “Electronic motion monitoring in the assessment of non-cognitive symptoms of dementia,” 2005. INTERNATIONAL CONGRESS OF THE INTERNATIONAL PSYCHOGERIATRIC ASSOCIATION.
  • [7] Nurmi, P., et al.”A Framework for Distributed Activity Recognition in Ubiquitous Systems,” in IC-AI. 2005.
  • [8] Jafari, R., et al. “Wireless sensor networks for health monitoring,” In the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services. 2005. IEEE.
  • [9] Butun, I., S.D. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE communications surveys & tutorials, 16(1), pp. 266-282, 2013.
  • [10] Shaikh, R.A., et al. “LSec: lightweight security protocol for distributed wireless sensor network,” in IFIP International Conference on Personal Wireless Communications. 2006. Springer.
  • [11] Perrig, A., and et al., SPINS: “Security protocols for sensor networks. Wireless networks,", Vol. 8(5), pp. 521-534, 2002.
  • [12] Karlof, C. “Secure routing in sensor networks: Attacks and countermeasures,” in Proc. of 1st IEEE International Workshop on Sensor Network Protocols and Applications (SNPA2003). 2003.
  • [13] Boukerch, A., L. Xu, and K. El-Khatib, “Trust-based security for wireless ad hoc and sensor networks,” Computer Communications, Vol. 30(11-12), pp. 2413-2427, 2007.
  • [14] Lacuesta, R., et al., “A secure protocol for spontaneous wireless ad hoc networks creation,” IEEE transactions on parallel and distributed systems, Vol. 24(4), pp. 629-641, 2012.
  • [15] Liu, Y., C.-x. Liu, and Q.-A. Zeng, “Improved trust management based on the strength of ties for secure data aggregation in wireless sensor networks Telecommunication Systems,” Vol. 62(2), pp. 319-325, 2016.
  • [16] Anita, X., M.A. Bhagyaveni, and J.M.L.” Manickam, Collaborative lightweight trust management scheme for wireless sensor networks,” Wireless Personal Communications, Vol. 80(1), pp. 117-140, 2015.
  • [17] Rajeshkumar, G. and K. Valluvan, “An energy aware trust based intrusion detection system with adaptive acknowledgement for wireless sensor network,” Wireless Personal Communications, Vol. 94(4), pp. 1993-2007, 2017.
  • [18] Narendra, K.S. and M.A. Thathachar, “Learning automata-a survey,” IEEE Transactions on systems, man, and cybernetics, 1974(4), pp. 323-334.
  • [19] Ganeriwal, S., L.K. Balzano, and M.B. Srivastava, “Reputation-based framework for high integrity sensor networks,” ACM Transactions on Sensor Networks (TOSN), 4(3), pp. 15, 2008.
  • [20] Eissa, T., et al., “Trust-based routing mechanism in MANET: Design and implementation,” Mobile Networks and Applications, Vol. 18(5): p. 666-6, 2013.
  • [21] Song, J., et al. “Dynamic trust evaluation of wireless sensor networks based on multi-factor,” in 2015 IEEE Trustcom/BigDataSE/ISPA. 2015. IEEE.
  • [22] Ahmed, A., et al., “A trust aware routing protocol for energy constrained wireless sensor network,” Telecommunication Systems, Vol. 61(1), pp. 123-140, 2016.
  • [23] Ahmed, A., et al., “A secure routing protocol with trust and energy awareness for wireless sensor network,” Mobile Networks and Applications, Vol. 21(2), pp. 272-285, 2016.
  • [24] Ahmed, A., et al., “Energy-aware and secure routing with trust for disaster response wireless sensor network,” Peer-to-Peer Networking and Applications, Vol. 10(1), pp. 216-237, 2017.
  • [25] Marchang, N. and R. Datta, “Light-weight trust-based routing protocol for mobile ad hoc networks,” IET information security, Vol. 6(2), pp. 77-83, 2012.
  • [26] Channa, M.I. and K.M. Ahmed, “A Reliable Routing Scheme for Post-Disaster Ad Hoc Communication Networks,” JCM, Vol. 6(7), pp. 549-557, 2011.
  • [27] Fang, W., et al., “BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks,” Journal of Network and Computer Applications, Vol. 59, pp. 88-94, 2016.
  • [28] Li, Y. and L.E. Parker. “Intruder detection using a wireless sensor network with an intelligent mobile robot response,” in IEEE SoutheastCon 2008, 2008. IEEE.
  • [29] Jiang, J., et al., “An efficient distributed trust model for wireless sensor networks,” IEEE transactions on parallel and distributed systems, Vol. 26(5), pp. 1228-1237, 2014.
  • [30] Marzi, H. and M. Li, “An enhanced bio-inspired trust and reputation model for wireless sensor network,Procedia Computer Science, Vol. 19, pp. 1159-1166, 2013.
  • [31] Chowdhury, A.R., S. Tripathy, and S. Nandi. “Securing wireless sensor networks against spurious injections,” in 2007 2nd International Conference on Communication Systems Software and Middleware. 2007. IEEE.
  • [32] Junnarkar, A. and A. Bagwan. “Novel Quality of Service (QOS) Improvement Routing Protocol for MANET Using Ant Colony Optimization,” in 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). 2017. IEEE.
  • [33] Misra, S., et al.,” LAID: a learning automata‐based scheme for intrusion detection in wireless sensor networks,” Security and Communication Networks, 2(2), pp. 105-115, 2009.
  • [34] Das, S.K., P.S. Chatterjee, and M. Roy, “Detecting and Punishing the Selfish Node and Its Behavior in WSN,” International Journal of Computer & Organization Trends, Vol. 6(1), 2014.
  • [35] Prithi, S. and S. Sumathi, “LD2FA-PSO: A novel Learning Dynamic Deterministic Finite Automata with PSO algorithm for secured energy efficient routing in Wireless Sensor Network,” Ad Hoc Networks, 2020. 97: p. 102024.
  • [36] Zhan, G., W. Shi, and J. Deng, “Design and implementation of TARF: A trust-aware routing framework for WSNs,IEEE Transactions on dependable and secure computing, Vol. 9, pp. 184-197, 2011.
  • [37] Pirzada, A.A. and C. McDonald. “Trusted greedy perimeter stateless routing,” in 2007 15th IEEE International Conference on Networks. IEEE.
  • [38] Narendra, K.S. and M.A. Thathachar, ”Learning automata: an introduction,”, Courier corporation, 2012.
  • [39] Misra, S., P.V. Krishna, and K.I. Abraham, “A simple learning automata‐based solution for intrusion detection in wireless sensor networks,” Wireless Communications and Mobile Computing, Vol. 11(3), pp. 426-441, 2011.