Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Enhanced Lion Swarm Optimization Algorithm With Centralized Authentication Approach for Secured Data Transmission Over WSN


Affiliations
1 Department of Computer Science, Periyar University, India
2 Department of Computer Science, Periyar University Constituent College of Arts and Science, India
     

   Subscribe/Renew Journal


Securing data accuracy in WSNs (Wireless Sensor Networks) is a major problem. Aggregation techniques for improving accuracy in data processing have been gaining attention of scholars, recently. Existing security systems using singular paths for transmission of data have delays in transmissions while being open to intrusions. Moreover, increased computational overheads and processing time increases the delay of data transmission in the given networks. To overcome these issues, this work proposes ELSOA-CA (Enhanced Lion Swarm Optimization Algorithm and Centralized Authentication) method. This method focuses on an optimal, faster and energy efficient data transmissions while ensuring accurate decisions on tomato crops. Multipath routing introduced in the proposed method ensures faster data transmissions by selecting optimal forwarder nodes which satisfy the constraints of delay and energy. Optimal forwarder node selection is done using ELOSA algorithm. Data transmissions are secured by centralized authentication involving third party nodes. Each and every node in a region gets registered with the authentication node where a node’s genuineness is checked the node is allowed into the forwarder node list, used for data routing. CA (Centralized Authentication) enhances the security level of data transmissions over WSN multi path routing. ELSOA-CA framework’s simulation results provide higher throughputs, reduced energy consumptions, improved network lifetimes PDRs (Packet Drop Ratios) and lesser delay times.

Keywords

Wireless Sensor Networks, Enhanced Lion Swarm Optimization Algorithm, Centralized Authentication Approach, Secured Data Transmission, Multipath Routing.
Subscription Login to verify subscription
User
Notifications
Font Size

  • Ghassan Samara and Mohammad Aljaidi, “Efficient Energy, Cost Reduction, and QoS based Routing Protocol for Wireless Sensor Networks”, Proceedings of International Conference on Electrical and Computer Engineering, pp. 496-504, 2019.
  • Ramin Yarinezhad, “Reducing Delay and Prolonging the Lifetime of Wireless Sensor Network using Efficient Routing Protocol based on Mobile Sink and Virtual Infrastructure”, Ad Hoc Networks, Vol. 84, pp. 42-55, 2019.
  • K. Srihari and G. Dhiman, “An IoT and Machine Learning‐based Routing Protocol for Reconfigurable Engineering Application”, IET Communications, Vol. 33, No. 2, pp. 1-18, 2021.
  • Y. Li and R. Shi, “An Intelligent Solar Energy-Harvesting System for Wireless Sensor Networks”, EURASIP Journal on Wireless Communications and Networking, Vol. 20, No, 1, pp. 1-12, 2015.
  • B. Zhang, R. Simon and H. Aydin, “Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks with Joint Voltage and Modulation Scaling”, IEEE Transactions on Industrial Informatics, Vol. 9, No. 1, pp. 514-526, 2013.
  • S. Peng, T. Wang and C.P. Low, “Energy Neutral Clustering for Energy Harvesting Wireless Sensors Networks”, Ad Hoc Networks, Vol. 28, pp. 1-16, 2015.
  • C. Liu, D. Fang, Y. Hu and H. Chen, “EasyGo: Low-Cost and Robust Geographic Opportunistic Sensing Routing in a Strip Topology Wireless Sensor Network”, Computer Networks, Vol. 143, pp. 191-205, 2018.
  • G. Han, Y. Dong and D. Wu, “Cross‐Layer Optimized Routing in Wireless Sensor Networks with Duty Cycle and Energy Harvesting”, Wireless Communications and Mobile Computing, Vol. 15, No. 16, pp. 1957-1981, 2015.
  • R.J.M. Vullers and H.J. Visser H J, “Energy Harvesting for Autonomous Wireless Sensor Networks”, IEEE Solid-State Circuits Magazine, Vol. 2, No. 2, pp. 29-38, 2020.
  • D. Wu, J. He, H. Wang and C. Wang, “A Hierarchical Packet Forwarding Mechanism for Energy Harvesting Wireless Sensor Networks”, IEEE Communications Magazine, Vol. 53, No. 8, pp. 92-98, 2015.
  • M. Maimour, “Maximally Radio-Disjoint Multipath Routing for Wireless Multimedia Sensor Networks”, Proceedings of ACM Workshop on Wireless Multimedia Networking and Performance Modeling, pp. 26-31, 2008.
  • T.D. Nguyen, J.Y. Khan and D.T. Ngo, “An Effective Energy-Harvesting-Aware Routing Algorithm for WSN-based IoT Applications”, Proceedings of IEEE International Conference on Communications, pp. 1-6, 2017.
  • J. Tang, A. Liu, J. Zhang and T. Wang, “A Trust-Based Secure Routing Scheme using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks”, Sensors, Vol. 18, No. 3, pp. 751-756, 2018.
  • N. Sirdeshpande and Vishwanath Udupi, “Fractional Lion Optimization for Cluster Head-Based Routing Protocol in Wireless Sensor Network”, Journal of the Franklin Institute, Vol. 354, No. 11, pp. 4457-4480, 2017.
  • Rajeev Arya and S.C. Sharma, “Energy Optimization of Energy Aware Routing Protocol and Bandwidth Assessment for Wireless Sensor Network”, International Journal of System Assurance Engineering and Management, Vol. 9, No. 3, pp. 612-619, 2018.
  • A.S. Nandhini and P. Vivekanandan, “A Survey on Energy Efficient Routing Protocols for Manet”, International Journal of Advances in Engineering and Technology, Vol. 6, No. 1, pp. 370-382, 2013.
  • Ying Guo and Mingyan Jiang, “Power System Optimization Based on Multi-agent Structure and Lion Swarm Optimization”, Journal of Physics: Conference Series, Vol. 1575, No. 1, pp. 1-13, 2020.
  • Yong Ping Zhang and Lin-Lin Qin, “A Node Authentication Protocol based on ECC in WSN”, Proceedings of International Conference on Computer Design and Applications, pp. 1-9, 2010.
  • Shashi Kant, Anurag Singh Tomar and Gaurav Kumar Tak, “Secure Medical Data Transmission by using ECC with Mutual Authentication in WSNs”, Procedia Computer Science, Vol. 70, pp. 455-461, 2015.
  • R. Amuthavalli and R.S. Bhuvaneshwaran, “Detection and Prevention of Sybil Attack in WSN Employing Random Password Comparison Method”, Journal of Theoretical and Applied Information Technology, Vol. 67, No. 1, pp. 236-246, 2014.
  • N. Chakchouk, “A Survey on Opportunistic Routing in Wireless Communication Networks”, IEEE Communications Surveys and Tutorials, Vol. 17, pp. 2214-2241, 2015.
  • G. Gowrishankar and P. Senthil Kumar, “A Trust based Protocol for Manets in IoT Environment”, International Journal of Advanced Science and Technology, Vol. 29, No. 7, pp. 2770-2775, 2020.
  • Maziar Yazdani and Fariborz Jolai, “Lion Optimization Algorithm (LOA): A Nature-Inspired Metaheuristic Algorithm”, Journal of Computational Design and Engineering, Vol. 3, No. 1, pp. 24-36, 2016.
  • N. Vukovic, Z. Miljkovic and Z. Babic, “The Ant Lion Optimization Algorithm for Integrated Process Planning and Scheduling”, Applied Mechanics and Materials, Vol. 834, pp. 187-192, 2016.
  • Eugene Shablygin and Mikhail Vysogorets, “Centralized Authentication System with Safe Private Data Storage and Method”, U.S. Patent No. 826, pp. 1-19, 2014.
  • Lu Yeming and V.W.S. Wong, “An Energy-Efficient Multipath Routing Protocol for Wireless Sensor Networks”, International Journal of Communication Systems, Vol. 20, No. 7, pp. 1-14, 2007.
  • Vimla Devi, Kavi Kumar Khedo and Vishwakalyan Bhoyroo, “A Flexible and Reliable Wireless Sensor Network Architecture for Precision Agriculture in a Tomato Greenhouse”, Proceedings of International Conference on Information Systems Design and Intelligent Applications, pp. 119-129, 2019.

Abstract Views: 228

PDF Views: 1




  • Enhanced Lion Swarm Optimization Algorithm With Centralized Authentication Approach for Secured Data Transmission Over WSN

Abstract Views: 228  |  PDF Views: 1

Authors

S. Silambarasan
Department of Computer Science, Periyar University, India
M. Savitha Devi
Department of Computer Science, Periyar University Constituent College of Arts and Science, India

Abstract


Securing data accuracy in WSNs (Wireless Sensor Networks) is a major problem. Aggregation techniques for improving accuracy in data processing have been gaining attention of scholars, recently. Existing security systems using singular paths for transmission of data have delays in transmissions while being open to intrusions. Moreover, increased computational overheads and processing time increases the delay of data transmission in the given networks. To overcome these issues, this work proposes ELSOA-CA (Enhanced Lion Swarm Optimization Algorithm and Centralized Authentication) method. This method focuses on an optimal, faster and energy efficient data transmissions while ensuring accurate decisions on tomato crops. Multipath routing introduced in the proposed method ensures faster data transmissions by selecting optimal forwarder nodes which satisfy the constraints of delay and energy. Optimal forwarder node selection is done using ELOSA algorithm. Data transmissions are secured by centralized authentication involving third party nodes. Each and every node in a region gets registered with the authentication node where a node’s genuineness is checked the node is allowed into the forwarder node list, used for data routing. CA (Centralized Authentication) enhances the security level of data transmissions over WSN multi path routing. ELSOA-CA framework’s simulation results provide higher throughputs, reduced energy consumptions, improved network lifetimes PDRs (Packet Drop Ratios) and lesser delay times.

Keywords


Wireless Sensor Networks, Enhanced Lion Swarm Optimization Algorithm, Centralized Authentication Approach, Secured Data Transmission, Multipath Routing.

References