Wireless Sensor Networks Security Enhancement Approach Based on Single Path Secure Routing Algorithm

Authors

  • Xiaoyan Luo Academic Affairs Office, Hunan University of Arts and Science, Changde, 415000, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.13512

Keywords:

Wireless sensors, Network security, Single path secure routing, Key pre-distribution

Abstract

To improve the security of wireless sensor networks, the experiment proposes a network security improvement method based on multi-objective ant colony optimization and single-path secure routing protocol. First, LEAP is used to improve the single-path secure routing algorithm to enhance the security of data during transmission; then, a multi-objective ant colony optimization algorithm is introduced to find the optimal network parameter path. The detection accuracy shows that when the time reaches 62.23 ms, the method proposed in the study has a maximum detection accuracy of 99.89%; at this time, the detection accuracy of the other three schemes is significantly less than 95.00%. When the system running time is 57.41 ms, the detection accuracy of wormhole attacks by this method begins to reach a stable state, and the detection accuracy has been infinitely close to 100% in the future. This method is applied to the Internet of Vehicles and the Enterprise Office Network respectively. When the number of intrusion nodes is 1,780 and 2,000 respectively, external intrusion can damage the key space and steal secrets. The above results show that the proposed method can not only improve network security and ensure energy efficiency, but also optimize network performance.

Downloads

Download data is not yet available.

Author Biography

Xiaoyan Luo, Academic Affairs Office, Hunan University of Arts and Science, Changde, 415000, China

Xiaoyan Luo received her Bachelor’s degree from Hunan Normal University majoring in Computer Science and Technology (2005), her Master’s degree from Hunan University majoring in Computer Application Technology (2010), and her Doctoral degree from the Philippines Christian University majoring in Curriculum and Instruction (2023). At present, she holds the position of Deputy Director in the Academic Affairs Office of Hunan University of Arts and Sciences and is engaged in teaching courses such as “University Computer Fundamentals” and “C Language Programming”. She has presided over several provincial and ministerial level projects and published articles in several well-known journals, and her research areas include image processing, information security and curriculum pedagogy.

References

Nwokoye C N H, Madhusudanan V. Epidemic models of malicious-code propagation and control in wireless sensor networks: an indepth review. Wireless Personal Communications, 2022, 125(2): 1827–1856.

Lin H Y. Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks. Connection Science, 2022, 34(1): 274–300.

Hasanvand M, Nooshyar M, Moharamkhani E, Selyari A. Machine Learning Methodology for Identifying Vehicles Using Image Processing/Artificial Intelligence and Applications. 2023, 1(3): 170–178.

Mokayed H, Quan T Z, Alkhaled L, Sivakumar V. Real-time human detection and counting system using deep learning computer vision techniques/Artificial Intelligence and Applications. 2023, 1(4): 221–229.

Saraswathi R V, Sree L P, Anuradha K. Dynamic group key management scheme for clustered wireless sensor networks. International Journal of Grid and Utility Computing, 2020, 11(6): 801–814.

Raja Basha A. Energy efficient aggregation technique-based realisable secure aware routing protocol for wireless sensor network. IET Wireless Sensor Systems, 2020, 10(4): 166–174.

Yuan E, Wang L. A key management scheme realising location privacy protection for heterogeneous wireless sensor networks. International Journal of Sensor Networks, 2020, 32(1): 34–41.

Kumar C P, Selvakumar R. Reliable and secure data communication in wireless sensor networks using optimal locally recoverable codes. Peer-to-Peer Networking and Applications, 2020, 13(3): 742–751.

Prakash G, Krishnamoorthy R, Kalaivaani P T. Resource key distribution and allocation based on sensor vehicle nodes for energy harvesting in vehicular ad hoc networks for transport application. The Journal of Supercomputing, 2020, 76(8): 5996–6009.

Ramesh S, Yaashuwanth C. Enhanced approach using trust based decision making for secured wireless streaming video sensor networks. Multimedia tools and applications, 2020, 79(15–16): 10157–10176.

Ahlawat P, Dave M. An attack resistant key predistribution scheme for wireless sensor networks. Journal of King Saud University-Computer and Information Sciences, 2021, 33(3): 268–280.

Xiong P, Su Q. Key distribution strategy of wireless sensor network based on multi-hash chain. Journal of Web Engineering, 2021, 20(3): 713–742.

Mitchell C J. How not to secure wireless sensor networks: a plethora of insecure polynomial-based key pre-distribution schemes. IET Information Security, 2021, 15(3): 223–230.

Rajasoundaran S, Prabu A V, Kumar G S, Malla P P, & Routray S. Secure opportunistic watchdog production in wireless sensor networks: a review. Wireless Personal Communications, 2021, 120(2): 1895–1919.

Krishnapriya M, Angeline Prasanna G, Anbarasu S. Rank-Based Energy-Efficient Key Management Routing for Wireless Sensor Network-Based Iot Medical Sensors. Wireless Personal Communications, 2023, 130(3): 2175–2196.

Wang Y, Liu Y, Feng W, Zeng S. Waste Haven Transfer and Poverty-Environment Trap: Evidence from EU. Green and Low-Carbon Economy, 2023, 1(1): 41–49.

Aryavalli S N G, Kumar G H. Futuristic Vigilance: Empowering Chipko Movement with Cyber-Savvy IoT to Safeguard Forests. Archives of Advanced Engineering Science, 2023, 1(8): 1–16.

Palani U, Amuthavalli G, Alamelumangai V. Secure and load-balanced routing protocol in wireless sensor network or disaster management. IET Information Security, 2020, 14(5): 513–520.

Wang J, Yue K, Duan L. Models and Techniques for Domain Relation Extraction: A Survey. Journal of Data Science and Intelligent Systems, 2023, 3(1): 16–25.

Liu W, Harn L, Weng J. Lightweight key establishment with the assistance of mutually connected sensors in wireless sensor networks (WSNs). IET Communications, 2022, 16(1): 58–66.

Dinesh Kumar P, Valarmathi K. Fuzzy based hybrid BAT and firefly algorithm for optimal path selection and security in wireless sensor network. Automatika, 2023, 64(2): 199–210.

Kittur L J, Pais A R. Combinatorial design based key pre-distribution scheme with high scalability and minimal storage for wireless sensor networks. Wireless Personal Communications, 2023, 128(2): 855–873.

Downloads

Published

2024-09-03

How to Cite

1.
Luo X. Wireless Sensor Networks Security Enhancement Approach Based on Single Path Secure Routing Algorithm. JCSANDM [Internet]. 2024 Sep. 3 [cited 2024 Nov. 17];13(05):1085-104. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/24629

Issue

Section

Articles