|
|
Bimonthly Since 1986 |
ISSN 1004-9037
|
|
|
|
|
Publication Details |
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
|
|
|
|
|
|
|
|
|
|
Abstract
Secure routing is essential in wireless sensor networks (WSNs) because these networks are frequentlypositioned in antagonisticsurroundings where security threats such as node compromise, tampering, and eavesdropping can occur. Secure routing is necessary to protect the WSN against malicious attacks that can compromise the discretion, honesty, and accessibility of the data transmitted in the nets. Thus, the need for secure routing is crucial to ensure the reliable and secure operation of WSNs in numerousrequests such as military investigation, healthcare monitoring, and environmental monitoring, among others.In this study, we propose a technique called Optimal Trusted Security Aware Routing (OTSAR) for Wireless Sensor Networks (WSN) that ensures secure data transfer between nodes through intermediate nodes. To achieve this, we first introduce the Laplacian Grey Wolf Optimization (LGWO) algorithm for load-balanced clustering based on node information such as location and mobility. Next, we use the Improved Kernel Ridge Regression (IKRR) algorithm to calculate the trust degree of each node in the cluster and select the cluster head (CH). The routing is then performed through highly trusted intermediate CHs to ensure secure data transmission and defend against internal attacks. We appraise the presentation of the proposed OTSAR technique finished various imitation scenarios and compare the results with existing state-of-the-art routing schemes to demonstrate its effectiveness.
Keyword
trust degree, secure routing, energy efficiency, clustering, cluster head
PDF Download (click here)
|
|
|
|
|