A novel multi-level clustering mechanism using heuristic approach for secure data transmission in WSN sector with various trust computation

Author:

Hareesha D.1,Ahamed Shaik Fayaz2,Priyanka Brahmaiah V.3,Kalpana Dingari4,Arun M.5,Satyanarayana P.2

Affiliation:

1. Department of ECE, P. V. P. Siddhartha Institute of Technology, Vijayawada, Andhra Pradesh, India

2. Department of ECE, V. R. Siddhartha Engineering College, Vijayawada, Andhra Pradesh, India

3. Department of ECE, VNR Vignana Jyothi Institute of Engineering and Technology, Hyderabad, Telangana, India

4. Department of Computer Science and Engineering, Vignana Bharathi Institute of Technology, Hayathnagar, Telangana, India

5. Department of ECE, Panimalar Engineering College, Chennai, Tamil Nadu, India

Abstract

Several sensor nodes are used in Wireless Sensor Networks (WSNs). A multi-level clustering-based multi-trust model is introduced in WSN. The model’s main intent is to compute trust value for performing secure transmission. Initially, to verify vulnerability, the watchdog counter provides the required trust output. Further, this is intended to build a multi-level trust clustering process. Here, multi-trust is carried out by energy trust, communication trust, and data trust. Hence, multi-trust is compared with a threshold value. Once the trust value is generated, it is given for processing the cluster groups. Due to more multi-trusting, it creates multi-level clustering for security level enhancement. After the cluster group is formed, the major aspect of CH is optimally obtained with a Modified Exploration-based Pelican Optimization Algorithm (ME-POA). Finally, performance is carried out in multi-objective functions, where parameters are defined as distance, delay, energy, and multi-trust. Thus, with the determination of optimal results, the proposed multi-level clustering proves that it offers secure data transmission over WSN.

Publisher

IOS Press

Subject

Artificial Intelligence,Computer Vision and Pattern Recognition,Human-Computer Interaction,Software

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Enhancement of Network Security in MANET using Adaptive Coronavirus Herd Immunity Optimizer (ACHIO) Algorithm for IoT Applications;2024 3rd International Conference on Applied Artificial Intelligence and Computing (ICAAIC);2024-06-05

2. Cardiovascular Disease Prediction Through Machine Learning Algorithms;2024 3rd International Conference on Applied Artificial Intelligence and Computing (ICAAIC);2024-06-05

3. Impact of Propagation Environment on the Performance of Direction Oriented Forwarding through Minimum Number of Edge Nodes (DOF-MEN) Routing Protocol In Ad Hoc Networks;International Journal of Electrical and Electronics Research;2024-05-30

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3