An Energy-Efficient improved Grey Wolf Optimization Algorithm-Based Cluster Head and Shamir Secrets Sharing-Based WSNs with Secure Data Transfer

Authors

DOI:

https://doi.org/10.56294/sctconf2024946

Keywords:

Wireless Sensor Network (WSNs), Energy Efficient Cluster Head Improved Grey Wolf Optimization, Shamir Secret Sharing (SSS), Hybrid Harris Hawk and Salp Swarm (HHH-SS), Energy-efficient and Secure Routing (ESR) protocol, Light Weight Trust Sensing (LWTS)

Abstract

Introduction: due to its self-configurability, ease of maintenance, and scalability capabilities, WSNs (Wireless Sensor Networks) have intrigued plenty of interest in a variety of fields. To move data within the network, WSNs are set up with more nodes. The security of SNs (sensing nodes), which are vulnerable to malevolent attackers since they are network nodes, is a crucial element of an IoT (Internet of Things)-based WSN. This study's primary objective is to provide safe routing and mutual authentication with IoT-based WSNs.

Method: the basic GWO algorithm's imbalances between explorations and mining, lack of population heterogeneity, and early convergences are all issues that this paper addresses by selecting energy-efficient CHs (cluster Heads) using EECIGWO algorithm, an upgraded version of the GWO, is used. Mean distances within clusters, well-spaced residual energies, and equilibrium of CHs are all factors that influence the choices of CHs. The average intra-cluster distances, sink distances, residual energies, and CHs balances are some of the criteria used to choose CHs.

Results and Discussion: the proposed EECHIGWO-based clustering protocol's average throughput, dead node counts, energy consumption, and operation round counts have all been evaluated. Additionally, mutual authentication between the nodes is provided through SSS (Shamir Secret Sharing) mechanism. PDR (Packet Delivery Ratio) analysis is used to assess how well the EECHIGWO-IOT-WSNs are performing.

Conclusion: the suggested proposed approach is assessed against existing methods like HHH-SS (Hybrid Harris Hawk and Salp Swarm), ESR (Energy-efficient and Secure Routing) protocol, and LWTS (Light Weight Trust Sensing) approaches in terms of AEED (Average End-to-End Delay), network overheads, and PLR (Packet Loss Ratio)

References

1. Zhou W. Research on wireless sensor network access control and load balancing in the industrial digital twin scenario. Journal of Sensors, pp. 1-12. https://doi.org/10.1155/2022/3929958.

2. Gulati K, Boddu RSK, Kapila D, Bangare SL, Chandnani N, and Saravanan G. A review paper on wireless sensor network techniques in Internet of Things (IoT). Materials Today: Proceedings, 51, pp. 161-165. https://doi.org/10.1016/j.matpr.2021.05.067.

3. Lin JW, Chelliah PR, Hsu MC, and Hou JX. Efficient fault-tolerant routing in IoT wireless sensor networks based on bipartite-flow graph modeling. IEEE access, 7, pp. 14022-14034. https://doi.org/10.1007/s11277-022-09580-7.

4. Preeth SSL, Dhanalakshmi R, Kumar R, and Shakeel PM. An adaptive fuzzy rule based energy efficient clustering and immune-inspired routing protocol for WSN-assisted IoT system. Journal of Ambient Intelligence and Humanized Computing, pp. 1-13. https://doi.org/10.1007/s12652-018-1154-z.

5. Lyu C, Zhang X, Liu Z, and Chi CH. Selective authentication based geographic opportunistic routing in wireless sensor networks for Internet of Things against DoS attacks. IEEE Access, 7, pp. 31068-31082. https://doi.org/10.1109/ACCESS.2019.2902843.

6. Nayyar A, and Singh R. IEEMARP-a novel energy efficient multipath routing protocol based on ant Colony optimization (ACO) for dynamic sensor networks. Multimedia Tools and Applications, 79(47), pp. 35221-35252. https://doi.org/10.1007/s11042-019-7627-z.

7. Babaeer HA, and Al-Ahmadi SA. Efficient and secure data transmission and sinkhole detection in a multi-clustering wireless sensor network based on homomorphic encryption and watermarking. IEEE Access, 8, pp. 92098-92109. https://doi.org/10.1109/ACCESS.2020.2994587.

8. Biradar DN, and Vishanath TS. Secured Data Transmission and Malicious Node Detection in Wireless Sensor Network. International Journal of Engineering and Advanced Technology, 8(6), pp. 1062-1069.

9. Kang MS. Design of AES-based encryption chip for IoT security. The Journal of the Institute of Internet, Broadcasting and Communication, 21(1), pp. 1-6. https://doi.org/10.7236/JIIBC.2021.21.1.1.

10. Jang W, and Lee SY. Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment. International Journal of Distributed Sensor Networks, 16(3), pp. 1-17. https://doi.org/10.1177/1550147720914779.

11. Misra G, Kumar V, Agarwal A, and Agarwal K. Internet of things (iot)–a technological analysis and survey on vision, concepts, challenges, innovation directions, technologies, and applications (an upcoming or future generation computer communication system technology). American Journal of Electrical and Electronic Engineering, 4(1), pp. 23-32. https://pubs.sciepub.com/ajeee/4/1/4/index.html#:~:text=doi%3A%2010.12691/ajeee%2D4%2D1%2D4.

12. Liu L, Ma Z, and Meng W. Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. Future generation computer systems, 101, pp. 865-879. https://doi.org/10.1016/j.future.2019.07.021.

13. Rami Reddy M, Ravi Chandra ML, Venkatramana P, and Dilli R. Energy-efficient cluster head selection in wireless sensor networks using an improved grey wolf optimization algorithm. Computers, 12(2), pp. 1-17. https://doi.org/10.3390/computers12020035.

14. Das I, Shaw RN, and Das S. Analysis of energy consumption of energy models in wireless sensor networks. In Innovations in Electrical and Electronic Engineering: Proceedings of ICEEE 2020, pp. 755-764. https://doi.org/10.1007/978-981-15-4692-1_57.

15. Ali H, Tariq UU, Hussain M, Lu L, Panneerselvam J, and Zhai X. ARSH-FATI: A novel metaheuristic for cluster head selection in wireless sensor networks. IEEE Systems Journal, 15(2), pp. 2386-2397. https://doi.org/10.1109/JSYST.2020.2986811.

16. VenkataRao S, and Ananth V. A Hybrid Optimization Algorithm and Shamir Secret Sharing Based Secure Data Transmission for IoT based WSN. International Journal of Intelligent Engineering & Systems, 14(6), pp. 498-506. http://dx.doi.org/10.22266/ijies2023.1231.44.

17. Essanhaji A, and Errachid M. Lagrange multivariate polynomial interpolation: a random algorithmic approach. Journal of Applied Mathematics, pp. 1-8. https://doi.org/10.1155/2022/8227086.

18. Haseeb K, Almogren A, Islam N, Ud Din I, and Jan Z. An energy-efficient and secure routing protocol for intrusion avoidance in IoT-based WSN. Energies, 12(21), pp. 1-18. https://doi.org/10.3390/en12214174.

19. Srinivas M, and Amgoth T. EE‐hHHSS: Energy‐efficient wireless sensor network with mobile sink strategy using hybrid Harris hawk‐salp swarm optimization algorithm. International Journal of Communication Systems, 33(16), pp. e4569. https://doi.org/10.1002/dac.4569.

20. Rajendra Prasad M, and Krishna Reddy D. LWTSM-IoT: Light Weight Trust Sensing Mechanism for Internet of Things. International Journal of Intelligent Engineering & Systems, 14(1), pp. 82-92. https://inass.org/wp-content/uploads/2022/09/2023022809-2.pdf.

21. Paulraj D, Lavanya R, Jayasudha T, Niranjana MI, Daniya T, and Shadrach FD. Blockchain-based Wireless Sensor Network Security Through Authentication and Cluster Head Selection. In IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS), pp. 1-5. https://doi.org/10.1109/ICICACS57338.2023.10099593.

22. Vidhya N, Seethalakshmi V, Monisha R, Dhanasekar J, Gurunathan V, and Rajanandhini C. Coherent Data Transmission Using Multiplexing for a DWDM Communication System. In IEEE 2nd Mysore Sub Section International Conference (MysuruCon), pp. 1-4. https://doi.org/10.1109/MysuruCon55714.2022.9972482.

Downloads

Published

2024-01-01

How to Cite

1.
Yuvaraja M, Sureshkumar S, Joseph James S, Teresa VV. An Energy-Efficient improved Grey Wolf Optimization Algorithm-Based Cluster Head and Shamir Secrets Sharing-Based WSNs with Secure Data Transfer. Salud, Ciencia y Tecnología - Serie de Conferencias [Internet]. 2024 Jan. 1 [cited 2024 Nov. 21];3:946. Available from: https://conferencias.ageditor.ar/index.php/sctconf/article/view/835