An Fuzzy Trust Based Energy Aware Multipath Secure Data Collection in WSN

  • Authors

    • Y Chitti Babu
    • Ch Anuradha
    • P Sri Rama Chandra Murty
    2018-08-15
    https://doi.org/10.14419/ijet.v7i3.27.17975
  • Wireless Sensor Network (WSN), energy consumption, Directed Random Propagation (DRP) and Shuffled Frog Leaping Algorithm (SFLA).
  • A Wireless Sensor Network (WSN) is an array of radar nodules that energetically organize itself into a cable-less grid without utilizing any prevailing arrangement. One of the significant issues in WSNs is the drive’s intake, whereby the grid’s lifespan is reliant on this aspect. Security is another significant issues in cable-less radar grids, because of absence of wire/cable besides resource constraint’s nature. Reliance model shows a key role in fortifying the radar grids by recognizing the egotistical, malevolent and give-in nodules and separating them from message grid. Directed Random Propagation (DRP) operates two-hop vicinity data to enhance the circulation competence, leading to a reduced pack capture possibility. In this study, Shuffled Frog Leaping Algorithm (SFLA) is applied to augment ill-defined faith centered drive conscious multiple route locked data group in WSN.

     

     

  • References

    1. [1] Ramesh R & Varshney PK, “Data aggregation techniques in sensor networks: A surveyâ€, Electrical Engineering and Computer Science. Paper, Vol.22, (2006).

      [2] Amiri E, Keshavarz H, Heidari H, Mohamadi E & Moradzadeh H, “Intrusion detection systems in MANET: a reviewâ€, Procedia-Social and Behavioral Sciences, Vol.129, (2014), pp.453-459.

      [3] Keshavarz H, Noor RM & Mostajeran E, “Using routing table flag to improve performance of AODV routing protocol for VANETs environmentâ€, 9th International Conference on Computing and Information Technology (IC2IT2013), (2013), pp.73-82.

      [4] Chen Z, He M, Liang W & Chen K, “Trust-aware and low energy consumption security topology protocol of wireless sensor networkâ€, Journal of Sensors, (2015).

      [5] Anita X, Bhagyaveni MA & Manickam J, “Fuzzy-based trust prediction model for routing in WSNsâ€, The Scientific World Journal, (2014).

      [6] Chen K, “Unequal cluster-based routing protocol in wireless sensor networksâ€, Journal of Net- works, Vol.8, No.11, (2013), pp.2656–2662.

      [7] Binitha S & Sathya SS, “A survey of bio inspired optimization algorithmsâ€, International Journal of Soft Computing and Engineering, Vol.2, No.2, (2012), pp.137–151.

      [8] Yadav S & Yadav RS, “A review on energy efficient protocols in wireless sensor networksâ€, Wireless Networks, Vol.22, No.1, (2016), pp.335-350.

      [9] Zhong C, Mo Y, Zhao J, Lin C & Lu X, “Secure clustering and reliable multi-path route discovering in wireless sensor networksâ€, IEEE Sixth International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), (2014), pp.130-134.

      [10] Robinson YH, Julie EG, Balaji S & Ayyasamy A, “Energy Aware Clustering Scheme in Wireless Sensor Network Using Neuro-Fuzzy Approachâ€, Wireless Personal Communications, (2016), pp.1-19.

      [11] Haider T & Yusuf M, “A fuzzy approach to energy optimized routing for wireless sensor networksâ€, Int. Arab J. Inf. Technol., Vol.6, No.2, (2009), pp.179-185.

      [12] Prabaharan SB & Ponnusamy R, “Energy Aware Secure Dynamic Multipath Routing using ACO with Modified Local Selection using SAâ€, Energy, Vol.3, No.5, (2016).

      [13] Dongyao J, Shengxiong Z, Meng L & Huaihua Z, “Adaptive multi-path routing based on an improved leapfrog algorithmâ€, Information Sciences, Vol.367, (2016), pp.615-629.

      [14] Malarvizhi M & GopiSaminathan A, “Fuzzy Based Trust Computing Model For Wireless Sensor Networkâ€, International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE), Vol.22, No.2, (2016).

      [15] Amiri E, Keshavarz H, Alizadeh M, Zamani M & Khodadadi T, “Energy efficient routing in wireless sensor networks based on fuzzy ant colony optimizationâ€, International Journal of Distributed Sensor Networks, (2014).

      [16] Shu T, Krunz M & Liu S, “Secure data collection in wireless sensor networks using randomized dispersive routesâ€, IEEE transactions on mobile computing, Vol.9, No.7, (2010), pp.941-954.

      [17] Roy P & Chakrabarti A, “Implementation of genetic algorithm and modiï¬ed shuffled frog leaping algorithm for transmission loss minimum re-schedulingâ€, Annual IEEE India conference (INDICON), 2011, pp.1–4.

      [18] Anandamurugan S & Abirami T, “Antipredator adaptation shuffled frog leap algorithm to improve network life time in wireless sensor networkâ€, Wireless Personal Communications, (2016), pp.1-12.

      [19] Zhang X, Hu X, Cui G, Wang Y & Niu Y, “An improved shuffled frog leaping algorithm with cognitive behaviorâ€, Proc. 7th world congr. Intelligent Control and Automation, (2008).

      [20] Akhpanov, S. Sabitov, R. Shaykhadenov (2018). Criminal pre-trial proceedings in the Republic of Kazakhstan: Trend of the institutional transformations. Opción, Año 33. 107-125.

      [21] Z Iskakova, M Sarsembayev, Z Kakenova (2018). Can Central Asia be integrated as asean? Opción, Año 33. 152-169.

  • Downloads

  • How to Cite

    Chitti Babu, Y., Anuradha, C., & Sri Rama Chandra Murty, P. (2018). An Fuzzy Trust Based Energy Aware Multipath Secure Data Collection in WSN. International Journal of Engineering & Technology, 7(3.27), 371-375. https://doi.org/10.14419/ijet.v7i3.27.17975