Multi-Level Fuzzy Cluster Based Trust Estimation for Hierarchical Wireless Sensor Networks

##plugins.themes.academic_pro.article.main##

RAHUL DAS
Mona Dwivedi

Abstract

In Hierarchical Wireless Sensor Network (HWSN), the energy transmission of data packets belongs to the distance between source and destination, vulnerable to various malicious attacks. Thus clustering of HWSN reduces energy consumption, achieves scalability, and reduces network traffic. Therefore in this paper, a Multilevel Fuzzy Cluster Trust Estimation (MFCTE) logic model is used for clustering nodes and select trustworthy Cluster Head (CH) from clustered nodes. For this, the proposed method uses five attributes to become a trustbased CH. The following attributes given as input to fuzzy are Density of the other sensor nodes near to CH, Compaction of the surrounding nodes, Distance from the base station, Residual energy of the sensor nodes, and Packet integrity. MFCTE detects malicious nodes and ensures security in CH by automatically adjusting a load of direct trust, indirect trust, and parameters of update mechanism. The simulation results indicate that the proposed technique is energy efficient in terms of energy consumption, network lifetime for different network sizes, and better at defining malicious attacks.

##plugins.themes.academic_pro.article.details##

How to Cite
RAHUL DAS, & Mona Dwivedi. (2020). Multi-Level Fuzzy Cluster Based Trust Estimation for Hierarchical Wireless Sensor Networks. International Journal of Next-Generation Computing, 11(3), 263–280. https://doi.org/10.47164/ijngc.v11i3.183

References

  1. ANWAR, R. W., ZAINAL, A., OUTAY, F., YASAR, A., IQBAL, S. (2019). BTEM: Belief based
  2. trust evaluation mechanism for Wireless Sensor Networks. Future Generation Computer Systems, 96, 605-616.
  3. CHENG, X., LUO, Y., GUI, Q. (2018, October). Research on trust management model of wireless sensor networks. In 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) (pp. 1397-1400). IEEE.
  4. DAS, R., DASH, D., AND SARKAR, M. K. (2020). HTMS: Fuzzy Based Hierarchical Trust Management Scheme in WSN. Wireless Personal Communications, 1-34.
  5. Desai, S. S., Nene, M. J. (2019). Node-level trust evaluation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 14(8), 2139-2152.
  6. DHAKNE, A. R., CHATUR, P. N. (2015, November). Distributed trust based intrusion detec- tion approach in wireless sensor network. In 2015 Communication, Control and Intelligent Systems (CCIS) (pp. 96-101). IEEE.
  7. FANG, W., ZHANG, C., SHI, Z., ZHAO, Q., AND SHAN, L. (2016). BTRES: Beta-based Trust
  8. and Reputation Evaluation System for wireless sensor networks. Journal of Network and Computer Applications, 59, 88-94.
  9. GOMATHY, V., PADHY, N., SAMANTA, D., SIVARAM, M., JAIN, V., AND AMIRI, I. S.
  10. (2020). Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks. Journal of Ambient Intelligence and Humanized Computing, 1-7.
  11. HAN, G., JIANG, J., SHU, L., NIU, J., AND CHAO, H. C. (2014). Management and applications of trust in Wireless Sensor Networks: A survey. Journal of Computer and System Sciences, 80(3), 602-617.
  12. HE, J., AND XIONG, N. (2018). An effective information detection method for social big data.
  13. Multimedia Tools and Applications, vol.77, no. 9, pp.11277-11305.
  14. ISHMANOV, F., MALIK, A. S., KIM, S. W., AND BEGALOV, B. (2015). Trust manage-
  15. ment system in wireless sensor networks: design considerations and research challenges. Transactions on Emerging Telecommunications Technologies, 26(2), 107-130.
  16. JAINT, B., SINGH, V., TANWAR, L. K., INDU, S., PANDEY, N. (2018, October). An Effi-
  17. cient Weighted Trust Method for Malicious Node Detection in Clustered Wireless Sensor Networks. In 2018 2nd IEEE International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES) (pp. 1183-1187). IEEE.
  18. JIN, X., LIANG, J., TONG, W., LU, L., LI, Z. (2017). Multi-agent trust-based intrusion de- tection scheme for wireless sensor networks. Computers and Electrical Engineering, 59, 262-273.
  19. KARTHIK, N., ANANTHANARAYANA, V. S. (2017). A hybrid trust management scheme for wireless sensor networks. Wireless Personal Communications, 97(4), 5137-5170.
  20. KHAN, T., SINGH, K., ABDEL-BASSET, M., LONG, H. V., SINGH, S. P., MANJUL, M.
  21. (2019). A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks. IEEE Access, 7, 58221-58240.
  22. KULKARNI, S. B., YUVARAJU, B. N. (2017, January). Challenge evaluation algorithm to identify malicious node in MANET. In 2017 IEEE 7th International Advance Computing Conference (IACC) (pp. 297-302). IEEE.
  23. LABRAOUI, N. (2015, April). A reliable trust management scheme in wireless sensor networks. In 2015 12th International Symposium on Programming and Systems (ISPS) (pp. 1-6).
  24. IEEE. LIU, L., MA, Z., MENG, W. (2019). Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. Future Generation Computer Systems, 101, 865-879.
  25. LIU, X., LIU, Y., LIU, A., AND YANG, L. T. (2018). Defending ONOFF attacks using light probing messages in smart sensors for industrial communication systems. IEEE Transactions on Industrial Informatics, 14(9), 3801-3811.
  26. Ma, Z., Liu, L., Meng, W. (2020, November). DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks. In Australasian Conference on Information Security and Privacy (pp. 247-267). Springer, Cham.
  27. MANORANJINI, J., CHANDRASEKAR, A., JOTHI, S. (2019). Improved QoS and avoidance of black hole attacks in MANET using trust detection framework. Automatika, 60(3), 274-284.
  28. PRABHA, V. R., AND LATHA, P. (2017). Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks. Sdhan, 42(2), 143-151.
  29. PRABHA, V. R., AND LATHA, P. (2017). Fuzzy trust protocol for malicious node detection in wireless sensor networks. Wireless Personal Communications, 94(4), 2549-2559.
  30. QIN, D., YANG, S., JIA, S., ZHANG, Y., MA, J., DING, Q. (2017). Research on trust sensing
  31. based secure routing mechanism for wireless sensor network. IEEE Access, 5, 9599-9609.
  32. QIU, T., LIU, X., FENG, L., ZHOU, Y., AND ZHENG, K. (2016). An efficient tree-based
  33. self-organiz ing protocol for internet of things. Ieee Access, Vol.4, pp.3535-3546.
  34. RAJESH, A., RAJI, V., KUMAR, N. M. (2016). Subjective logic based trust model for geographic routing in mobile ad hoc networks. Tehniki vjesnik, 23(5), 1357-1364
  35. RAZZAQ, M., SHIN, S. (2019). Fuzzy-logic dijkstra-based energy-efficient algorithm for data transmission in WSNs. Sensors, 19(5), 1040.
  36. REHMAN, E., SHER, M., NAQVI, S. H. A., BADAR KHAN, K., ULLAH, K. (2017). Energy
  37. efficient secure trust based clustering algorithm for mobile wireless sensor network. Journal of Computer Networks and Communications, 2017.
  38. SINGH, O., SINGH, J., SINGH, R. (2018). Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET. Cluster Computing, 21(1), 51-63.
  39. TALBI, S., KOUDIL, M., BOUABDALLAH, A., AND BENATCHBA, K. (2017). Adaptive and
  40. dual data-communication trust scheme for clustered wireless sensor networks. Telecommu- nication Systems, 65(4), 605-619.
  41. WU, X., HUANG, J., LING, J., SHU, L. (2019). BLTM: beta and LQI based trust model for wireless sensor networks. IEEE Access, 7, 43679-43690.
  42. YANG, H., ZHANG, X., AND CHENG, F. (2020). A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks. Mobile Networks and Applications, 1-10.
  43. Zawaideh, F., and Salamah, M. (2019). An efficient weighted trustbased malicious node detec- tion scheme for wireless sensor networks. International Journal of Communication Systems, 32(3), e3878.
  44. Zawaideh, F., Salamah, M., and Al-Bahadili, H. (2017, December). A fair trust-based malicious node detection and isolation scheme for WSNs. In 2017 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes Systems (IT-DREPS) (pp. 1-6). IEEE.
  45. ZHANG, T., YAN, L., AND YANG, Y. (2018). Trust evaluation method for clustered wireless sensor networks based on cloud model. Wireless Networks, 24(3), 777-797.
  46. ZHAO, J., HUANG, J., XIONG, N. (2019). An effective exponential-based trust and reputation evaluation system in wireless sensor networks. IEEE Access, 7, 33859-33869..