Abstract
Wireless Sensor Networks are generally employed for observing and monitoring specific environments. WSNs are made from a huge amount of low-cost sensor nodes separated and distributed in different environments for distributing data through sensor nodes. The collection of data by the various sensors were transmitted into the Base Station. An enhanced Trust-Based Adaptive Acknowledgment based Intrusion-Detection System was proposed from positive distributions in WSNs. A Kalman filter algorithm is used in Multi-objective Particle Swarm Optimization to predict trust nodes over the WSN. Simulations were carried out for non-malicious (0% malicious) networks, and various ranges of malicious nodes in the network were investigated. The outcomes show that the proposed MPSO achieves an improvement of 3.3% than PSO at 0% malicious nodes concerning the PDR. Similarly, at 30% malicious, the PDR of MPSO achieves better by 3.5% than PSO in WSN.
Similar content being viewed by others
Availability of Data and Material
Not applicable.
Code Availability
Not Applicable.
References
Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52(12), 2292–2330.
Omogbadegun, Z. O., & Ayo, C. K. (2007). Impact of mobile and wireless technology on healthcare delivery services. In 3G GSM & mobile computing: An emerging growth engine for national development, (pp. 164–171)
Viani, F., Oliveri, G., Donelli, M., Lizzi, L., Rocca, P., & Massa, A. (2010). WSN-based solutions for security and surveillance. In 2010 European Microwave Conference (EuMC), (pp. 1762–1765), IEEE.
Sun, F., Zhao, Z., Fang, Z., Du, L., Xu, Z., & Chen, D. (2014). A review of attacks and security protocols for wireless sensor networks. Journal of Networks, 9(5), 1103–1113.
Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing, 12(1), 98–110.
Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867–880.
Shafiei, H., Khonsari, A., Derakhshi, H., & Mousavi, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences, 80(3), 644–653.
Athmani, S., Boubiche, D. E., & Bilami, A. (2013). Hierarchical energy efficient intrusion detection system for blackhole attacks in WSNs. In 2013 World Congress on Computer and Information Technology (WCCIT), (pp. 1–5), IEEE.
Shi, Y., & Hou, Y. T. (2009). Optimal base station placement in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 5(4), 32.
Sun, B., Osborne, L., Xiao, Y., & Guizani, S. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications, 14(5), 56–63.
Chenguang, H., and Xuejun, S. (2008). An energy-efficient message-passing approach in MAC design for wireless sensor networks. In 4th IEEE international conference on circuits and systems for communications, 2008, (pp. 550–554) ICCSC 2008, IEEE.
Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.
Madhavi, S. (2008). An intrusion detection system in mobile ad hoc networks. In International conference on information security and assurance, 2008, (pp. 7–14). ISA 2008, IEEE.
Wang, G., & Guo, L. (2013). A novel hybrid bat algorithm with harmony search for global numerical optimization. Journal of Applied Mathematics, 2013, 1–22. https://doi.org/10.1155/2013/696491.
Reyes-Sierra, M., & Coello, C. (2006). Multi-Objective Particle Swarm Optimizers-A survey of the state-of-the-art. International Journal of Computational Intelligence Research, 2(3), 287–308.
Kennedy, J., Kennedy, J. F., Eberhart, R. C., & Shi, Y. (2001). Swarm intelligence. (pp. 1–10). Burlington: Morgan Kaufmann Publishers.
Kennedy, J. & Eberhart, R. C. (1995). Particle Swarm Optimization. In IEEE International Conference on Neural Networks (ICNN), (Vol. 4, pp. 1942–1948).
Selvi, V., & Umarani, D. R. (2010). Comparative analysis of ant colony and particle swarm optimization techniques. International Journal of Computer Applications, 5(4), 1–6.
Patil, D. D., & Dangewar, B. D. (2014). Multi-objective particle swarm optimization (MOPSO) based on Pareto dominance approach. International Journal of Computer Applications, 107(4), 13–15.
Cavazos, J., Moss, J. E. B. & O’Boyle, M. F. (2006). Hybrid optimizations: Which optimization algorithm to use. In International Conference on Compiler Construction, (pp. 124–138), Springer Berlin Heidelberg.
Sudhakar, S., & Pandian, S. C. (2016). Hybrid cluster-based geographical routing protocol to mitigate malicious nodes in mobile ad hoc network. International Journal of Ad Hoc and Ubiquitous Computing, 21(4), 224–236. https://doi.org/10.1504/IJAHUC.2016.076358
Yang Y., Zhang, T., Yi, W., Kong, L., Li, X., Wang, B. and Yang, X. (2016). Optimal deployment of multi static radar system using multi-objective particle swarm optimization, arXiv preprint http://arxiv.org/abs/1605.07495, pp. 1–12.
Gong, M., Cai, Q., Chen, X., & Ma, L. (2014). ‘Complex network clustering by multi-objective discrete particle swarm optimization based on decomposition. IEEE Transactions on Evolutionary Computation, 18(1), 82–97.
Toofani, A. (2012). Solving routing problem using Particle Swarm Optimization’. International Journal of Computer Applications, 52(18), 16–18.
Malik, R. F., Rahman, T. A., Ngah, R., Mohd, S. Z., & Hashim, H. (2012). The new multipoint relays selection in OLSR using Particle Swarm Optimization. Journal of Telecommunication Computing Electronics and Control, 10(2), 343–352.
Baburaj, E., & Vasudevan, V. (2008). An intelligent mesh-based multicast routing algorithm for MANETs using Particle Swarm Optimization. International Journal of Computer Science and Network Security, 8(5), 214–218.
Kumar, R. S., Kondapaneni, K., Dixit, V., Goswami, A., Thakur, L. S., & Tiwari, M. K. (2015). Multi-objective modeling of production and pollution routing problem with time window: A self-learning Particle Swarm Optimization approach. Computers & Industrial Engineering, 99, 29–40.
Norouzi, N., Tavakkoli-Moghaddam, R., Ghazanfari, M., Alinaghian, M., & Salamatbakhsh, A. (2012). A new multi-objective competitive open vehicle routing problem solved by particle swarm optimization. Journal of Networks and Spatial Economics, 12(4), 609–633.
Ali, H., Shahzad, W., & Khan, F. A. (2012). Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization. Elsevier Journal of Applied Soft Computing, 12(7), 1913–1928.
Otero, A., Gazca, L., Huerta, M. & Sagbay, G. (2015). A flooding routing algorithm for a wireless sensor network for seismic events. In IEEE International Conference on Computing Systems and Telematics (ICCSAT), (pp. 1–6).
Rajeshkumar, G., & Valluvan, K. R. (2016). An energy-aware trust-based intrusion detection system with adaptive acknowledgement for wireless sensor network. Wireless Personal Communications. https://doi.org/10.1007/s11277-016-3349-y,pp.1-15
Kunhare, N., Tiwari, R., & Dhar, J. (2020). Particle swarm optimization and feature selection for intrusion detection system. Indian Academy of Sciences, 45(109), 1–14.
Zhang, R. & Xiao, X. (2019). Intrusion detection in wireless sensor networks with an improved NSA based on space division. Journal of Sensors, Hindawi, pp. 1–20.
Gaoming Yang, XuYu., Lingwei, Xu., Xin, Yu., & Fang, X. (2019). An intrusion detection algorithm for sensor network based on normalized cut spectral clustering. PLUS ONE. https://doi.org/10.1371/journal.pone.0221920
Ganesh Kumar, K., & Sengan, S. (2020). Improved network traffic by attacking denial of service to protect resource using Z-test based 4-tier geomark traceback (Z4TGT). Wireless Personal Communications, 114, 3541–3575. https://doi.org/10.1007/s11277-020-07546-1
Narayanan, P., Sengan, S., & Marimuthu, B. P. et al. (2021). Novel collision detection and avoidance system for midvehicle using offset-based curvilinear motion. Wireless Pers Commun, 1–22.
Funding
Not Applicable.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Narayanasami, S., Butta, R., Govindaraj, R. et al. An Enhanced Trust-Based Kalman Filter Route Optimization Technique for Wireless Sensor Networks. Wireless Pers Commun 127, 1311–1329 (2022). https://doi.org/10.1007/s11277-021-08578-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08578-x