Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      1 Jan 2023, Volume 38 Issue 1   
    Article

    1. TRUST AWARE ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS
    R. Tamilaruvi1, D.Suresh2
    Journal of Data Acquisition and Processing, 2023, 38 (1): 2185-2200 . 

    Abstract

    The Wireless Sensor Networks (WSNs) have developed to the point that they may be used as a reliable instrument for monitoring the physical environment, thanks to the rapid and historic improvement in communication technology over the past two decades. Wireless Sensor Networks are employed in crucial monitoring and tracking applications since they are made up of resource-constrained sensors. Therefore, the trustworthiness and energy of the sensor node should be taken into account by routing protocols for such networks. The former scheme designed a Fault Tolerance based Energy Efficient Routing (FTEER) mechanism for WSN. However, since the unsecure environment, the sensor nodes are vulnerable to numerous forms of attacks. The suggested system created a Trust Aware Energy Efficient Routing (TAEER) mechanism to increase energy efficiency and security to address this issue. Initially, sensor nodes are deployed randomly. Then use neighbour discovery to locate the nodes that are closest. The network's nodes each carry out at least one neighbourhood. To improve the energy efficiency, clustering is performed based on the distance and Improved Convergence Factor based Whale Optimization Algorithm (ICFWOA) is utilized for Cluster Head selection (CH). For the purpose of choosing the CH, the node parameters together with the distance, the residual energy of something like the node and its neighbours, the node weight, as well as the node's reachability are examined. In order to progress the security, malevolent nodes are detected using improved fuzzy based trust management. Finally, schedule and transmit packets using Time Division Multiple Access (TDMA). The research findings show that, in terms of Packet Delivery Ratio (PDR), energy consumption, end-to-end delay, and Average Remaining Round, the suggested system outperforms the prior method.

    Keyword

    WSN, energy efficiency, node trust, improved fuzzy framework, Improved Convergence Factor based Whale Optimization Algorithm (ICFWOA) and Cluster Head selection (CH)


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved