Skip to main content
Log in

An Enhanced Trust-Based Kalman Filter Route Optimization Technique for Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless Sensor Networks are generally employed for observing and monitoring specific environments. WSNs are made from a huge amount of low-cost sensor nodes separated and distributed in different environments for distributing data through sensor nodes. The collection of data by the various sensors were transmitted into the Base Station. An enhanced Trust-Based Adaptive Acknowledgment based Intrusion-Detection System was proposed from positive distributions in WSNs. A Kalman filter algorithm is used in Multi-objective Particle Swarm Optimization to predict trust nodes over the WSN. Simulations were carried out for non-malicious (0% malicious) networks, and various ranges of malicious nodes in the network were investigated. The outcomes show that the proposed MPSO achieves an improvement of 3.3% than PSO at 0% malicious nodes concerning the PDR. Similarly, at 30% malicious, the PDR of MPSO achieves better by 3.5% than PSO in WSN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Availability of Data and Material

Not applicable.

Code Availability

Not Applicable.

References

  1. Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52(12), 2292–2330.

    Article  Google Scholar 

  2. Omogbadegun, Z. O., & Ayo, C. K. (2007). Impact of mobile and wireless technology on healthcare delivery services. In 3G GSM & mobile computing: An emerging growth engine for national development, (pp. 164–171)

  3. Viani, F., Oliveri, G., Donelli, M., Lizzi, L., Rocca, P., & Massa, A. (2010). WSN-based solutions for security and surveillance. In 2010 European Microwave Conference (EuMC), (pp. 1762–1765), IEEE.

  4. Sun, F., Zhao, Z., Fang, Z., Du, L., Xu, Z., & Chen, D. (2014). A review of attacks and security protocols for wireless sensor networks. Journal of Networks, 9(5), 1103–1113.

    Article  Google Scholar 

  5. Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing, 12(1), 98–110.

    Article  Google Scholar 

  6. Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867–880.

    Article  Google Scholar 

  7. Shafiei, H., Khonsari, A., Derakhshi, H., & Mousavi, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences, 80(3), 644–653.

    Article  MATH  Google Scholar 

  8. Athmani, S., Boubiche, D. E., & Bilami, A. (2013). Hierarchical energy efficient intrusion detection system for blackhole attacks in WSNs. In 2013 World Congress on Computer and Information Technology (WCCIT), (pp. 1–5), IEEE.

  9. Shi, Y., & Hou, Y. T. (2009). Optimal base station placement in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 5(4), 32.

    Article  Google Scholar 

  10. Sun, B., Osborne, L., Xiao, Y., & Guizani, S. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications, 14(5), 56–63.

    Article  Google Scholar 

  11. Chenguang, H., and Xuejun, S. (2008). An energy-efficient message-passing approach in MAC design for wireless sensor networks. In 4th IEEE international conference on circuits and systems for communications, 2008, (pp. 550–554) ICCSC 2008, IEEE.

  12. Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.

    Article  Google Scholar 

  13. Madhavi, S. (2008). An intrusion detection system in mobile ad hoc networks. In International conference on information security and assurance, 2008, (pp. 7–14). ISA 2008, IEEE.

  14. Wang, G., & Guo, L. (2013). A novel hybrid bat algorithm with harmony search for global numerical optimization. Journal of Applied Mathematics, 2013, 1–22. https://doi.org/10.1155/2013/696491.

    Article  MathSciNet  MATH  Google Scholar 

  15. Reyes-Sierra, M., & Coello, C. (2006). Multi-Objective Particle Swarm Optimizers-A survey of the state-of-the-art. International Journal of Computational Intelligence Research, 2(3), 287–308.

    MathSciNet  Google Scholar 

  16. Kennedy, J., Kennedy, J. F., Eberhart, R. C., & Shi, Y. (2001). Swarm intelligence. (pp. 1–10). Burlington: Morgan Kaufmann Publishers.

    Google Scholar 

  17. Kennedy, J. & Eberhart, R. C. (1995). Particle Swarm Optimization. In IEEE International Conference on Neural Networks (ICNN), (Vol. 4, pp. 1942–1948).

  18. Selvi, V., & Umarani, D. R. (2010). Comparative analysis of ant colony and particle swarm optimization techniques. International Journal of Computer Applications, 5(4), 1–6.

    Article  Google Scholar 

  19. Patil, D. D., & Dangewar, B. D. (2014). Multi-objective particle swarm optimization (MOPSO) based on Pareto dominance approach. International Journal of Computer Applications, 107(4), 13–15.

    Article  Google Scholar 

  20. Cavazos, J., Moss, J. E. B. & O’Boyle, M. F. (2006). Hybrid optimizations: Which optimization algorithm to use. In International Conference on Compiler Construction, (pp. 124–138), Springer Berlin Heidelberg.

  21. Sudhakar, S., & Pandian, S. C. (2016). Hybrid cluster-based geographical routing protocol to mitigate malicious nodes in mobile ad hoc network. International Journal of Ad Hoc and Ubiquitous Computing, 21(4), 224–236. https://doi.org/10.1504/IJAHUC.2016.076358

    Article  Google Scholar 

  22. Yang Y., Zhang, T., Yi, W., Kong, L., Li, X., Wang, B. and Yang, X. (2016). Optimal deployment of multi static radar system using multi-objective particle swarm optimization, arXiv preprint http://arxiv.org/abs/1605.07495, pp. 1–12.

  23. Gong, M., Cai, Q., Chen, X., & Ma, L. (2014). ‘Complex network clustering by multi-objective discrete particle swarm optimization based on decomposition. IEEE Transactions on Evolutionary Computation, 18(1), 82–97.

    Article  Google Scholar 

  24. Toofani, A. (2012). Solving routing problem using Particle Swarm Optimization’. International Journal of Computer Applications, 52(18), 16–18.

    Article  Google Scholar 

  25. Malik, R. F., Rahman, T. A., Ngah, R., Mohd, S. Z., & Hashim, H. (2012). The new multipoint relays selection in OLSR using Particle Swarm Optimization. Journal of Telecommunication Computing Electronics and Control, 10(2), 343–352.

    Google Scholar 

  26. Baburaj, E., & Vasudevan, V. (2008). An intelligent mesh-based multicast routing algorithm for MANETs using Particle Swarm Optimization. International Journal of Computer Science and Network Security, 8(5), 214–218.

    Google Scholar 

  27. Kumar, R. S., Kondapaneni, K., Dixit, V., Goswami, A., Thakur, L. S., & Tiwari, M. K. (2015). Multi-objective modeling of production and pollution routing problem with time window: A self-learning Particle Swarm Optimization approach. Computers & Industrial Engineering, 99, 29–40.

    Article  Google Scholar 

  28. Norouzi, N., Tavakkoli-Moghaddam, R., Ghazanfari, M., Alinaghian, M., & Salamatbakhsh, A. (2012). A new multi-objective competitive open vehicle routing problem solved by particle swarm optimization. Journal of Networks and Spatial Economics, 12(4), 609–633.

    Article  MathSciNet  MATH  Google Scholar 

  29. Ali, H., Shahzad, W., & Khan, F. A. (2012). Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization. Elsevier Journal of Applied Soft Computing, 12(7), 1913–1928.

    Article  Google Scholar 

  30. Otero, A., Gazca, L., Huerta, M. & Sagbay, G. (2015). A flooding routing algorithm for a wireless sensor network for seismic events. In IEEE International Conference on Computing Systems and Telematics (ICCSAT), (pp. 1–6).

  31. Rajeshkumar, G., & Valluvan, K. R. (2016). An energy-aware trust-based intrusion detection system with adaptive acknowledgement for wireless sensor network. Wireless Personal Communications. https://doi.org/10.1007/s11277-016-3349-y,pp.1-15

    Article  Google Scholar 

  32. Kunhare, N., Tiwari, R., & Dhar, J. (2020). Particle swarm optimization and feature selection for intrusion detection system. Indian Academy of Sciences, 45(109), 1–14.

    Google Scholar 

  33. Zhang, R. & Xiao, X. (2019). Intrusion detection in wireless sensor networks with an improved NSA based on space division. Journal of Sensors, Hindawi, pp. 1–20.

  34. Gaoming Yang, XuYu., Lingwei, Xu., Xin, Yu., & Fang, X. (2019). An intrusion detection algorithm for sensor network based on normalized cut spectral clustering. PLUS ONE. https://doi.org/10.1371/journal.pone.0221920

    Article  Google Scholar 

  35. Ganesh Kumar, K., & Sengan, S. (2020). Improved network traffic by attacking denial of service to protect resource using Z-test based 4-tier geomark traceback (Z4TGT). Wireless Personal Communications, 114, 3541–3575. https://doi.org/10.1007/s11277-020-07546-1

    Article  Google Scholar 

  36. Narayanan, P., Sengan, S., & Marimuthu, B. P. et al. (2021). Novel collision detection and avoidance system for midvehicle using offset-based curvilinear motion. Wireless Pers Commun, 1–22.

Download references

Funding

Not Applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajeshkumar Govindaraj.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Narayanasami, S., Butta, R., Govindaraj, R. et al. An Enhanced Trust-Based Kalman Filter Route Optimization Technique for Wireless Sensor Networks. Wireless Pers Commun 127, 1311–1329 (2022). https://doi.org/10.1007/s11277-021-08578-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08578-x

Keywords

Navigation