Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      1 Jan 2023, Volume 38 Issue 1   
    Article

    1. OTSAR: AN OPTIMAL TRUSTED SECURITY AWARE ROUTING TECHNIQUE FOR WWIRELESS SENSOR NETWORK USING EFFICIENT CLUSTERING APPROACH
    Vasanthamma G1, Dr.R.Balakrishna2
    Journal of Data Acquisition and Processing, 2023, 38 (1): 5542-5563 . 

    Abstract

    Secure routing is essential in wireless sensor networks (WSNs) because these networks are frequentlypositioned in antagonisticsurroundings where security threats such as node compromise, tampering, and eavesdropping can occur. Secure routing is necessary to protect the WSN against malicious attacks that can compromise the discretion, honesty, and accessibility of the data transmitted in the nets. Thus, the need for secure routing is crucial to ensure the reliable and secure operation of WSNs in numerousrequests such as military investigation, healthcare monitoring, and environmental monitoring, among others.In this study, we propose a technique called Optimal Trusted Security Aware Routing (OTSAR) for Wireless Sensor Networks (WSN) that ensures secure data transfer between nodes through intermediate nodes. To achieve this, we first introduce the Laplacian Grey Wolf Optimization (LGWO) algorithm for load-balanced clustering based on node information such as location and mobility. Next, we use the Improved Kernel Ridge Regression (IKRR) algorithm to calculate the trust degree of each node in the cluster and select the cluster head (CH). The routing is then performed through highly trusted intermediate CHs to ensure secure data transmission and defend against internal attacks. We appraise the presentation of the proposed OTSAR technique finished various imitation scenarios and compare the results with existing state-of-the-art routing schemes to demonstrate its effectiveness.

    Keyword

    trust degree, secure routing, energy efficiency, clustering, cluster head


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved