Wireless Sensor Networks Security Enhancement Approach Based on Single Path Secure Routing Algorithm
DOI:
https://doi.org/10.13052/jcsm2245-1439.13512Keywords:
Wireless sensors, Network security, Single path secure routing, Key pre-distributionAbstract
To improve the security of wireless sensor networks, the experiment proposes a network security improvement method based on multi-objective ant colony optimization and single-path secure routing protocol. First, LEAP is used to improve the single-path secure routing algorithm to enhance the security of data during transmission; then, a multi-objective ant colony optimization algorithm is introduced to find the optimal network parameter path. The detection accuracy shows that when the time reaches 62.23 ms, the method proposed in the study has a maximum detection accuracy of 99.89%; at this time, the detection accuracy of the other three schemes is significantly less than 95.00%. When the system running time is 57.41 ms, the detection accuracy of wormhole attacks by this method begins to reach a stable state, and the detection accuracy has been infinitely close to 100% in the future. This method is applied to the Internet of Vehicles and the Enterprise Office Network respectively. When the number of intrusion nodes is 1,780 and 2,000 respectively, external intrusion can damage the key space and steal secrets. The above results show that the proposed method can not only improve network security and ensure energy efficiency, but also optimize network performance.
Downloads
References
Nwokoye C N H, Madhusudanan V. Epidemic models of malicious-code propagation and control in wireless sensor networks: an indepth review. Wireless Personal Communications, 2022, 125(2): 1827–1856.
Lin H Y. Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks. Connection Science, 2022, 34(1): 274–300.
Hasanvand M, Nooshyar M, Moharamkhani E, Selyari A. Machine Learning Methodology for Identifying Vehicles Using Image Processing/Artificial Intelligence and Applications. 2023, 1(3): 170–178.
Mokayed H, Quan T Z, Alkhaled L, Sivakumar V. Real-time human detection and counting system using deep learning computer vision techniques/Artificial Intelligence and Applications. 2023, 1(4): 221–229.
Saraswathi R V, Sree L P, Anuradha K. Dynamic group key management scheme for clustered wireless sensor networks. International Journal of Grid and Utility Computing, 2020, 11(6): 801–814.
Raja Basha A. Energy efficient aggregation technique-based realisable secure aware routing protocol for wireless sensor network. IET Wireless Sensor Systems, 2020, 10(4): 166–174.
Yuan E, Wang L. A key management scheme realising location privacy protection for heterogeneous wireless sensor networks. International Journal of Sensor Networks, 2020, 32(1): 34–41.
Kumar C P, Selvakumar R. Reliable and secure data communication in wireless sensor networks using optimal locally recoverable codes. Peer-to-Peer Networking and Applications, 2020, 13(3): 742–751.
Prakash G, Krishnamoorthy R, Kalaivaani P T. Resource key distribution and allocation based on sensor vehicle nodes for energy harvesting in vehicular ad hoc networks for transport application. The Journal of Supercomputing, 2020, 76(8): 5996–6009.
Ramesh S, Yaashuwanth C. Enhanced approach using trust based decision making for secured wireless streaming video sensor networks. Multimedia tools and applications, 2020, 79(15–16): 10157–10176.
Ahlawat P, Dave M. An attack resistant key predistribution scheme for wireless sensor networks. Journal of King Saud University-Computer and Information Sciences, 2021, 33(3): 268–280.
Xiong P, Su Q. Key distribution strategy of wireless sensor network based on multi-hash chain. Journal of Web Engineering, 2021, 20(3): 713–742.
Mitchell C J. How not to secure wireless sensor networks: a plethora of insecure polynomial-based key pre-distribution schemes. IET Information Security, 2021, 15(3): 223–230.
Rajasoundaran S, Prabu A V, Kumar G S, Malla P P, & Routray S. Secure opportunistic watchdog production in wireless sensor networks: a review. Wireless Personal Communications, 2021, 120(2): 1895–1919.
Krishnapriya M, Angeline Prasanna G, Anbarasu S. Rank-Based Energy-Efficient Key Management Routing for Wireless Sensor Network-Based Iot Medical Sensors. Wireless Personal Communications, 2023, 130(3): 2175–2196.
Wang Y, Liu Y, Feng W, Zeng S. Waste Haven Transfer and Poverty-Environment Trap: Evidence from EU. Green and Low-Carbon Economy, 2023, 1(1): 41–49.
Aryavalli S N G, Kumar G H. Futuristic Vigilance: Empowering Chipko Movement with Cyber-Savvy IoT to Safeguard Forests. Archives of Advanced Engineering Science, 2023, 1(8): 1–16.
Palani U, Amuthavalli G, Alamelumangai V. Secure and load-balanced routing protocol in wireless sensor network or disaster management. IET Information Security, 2020, 14(5): 513–520.
Wang J, Yue K, Duan L. Models and Techniques for Domain Relation Extraction: A Survey. Journal of Data Science and Intelligent Systems, 2023, 3(1): 16–25.
Liu W, Harn L, Weng J. Lightweight key establishment with the assistance of mutually connected sensors in wireless sensor networks (WSNs). IET Communications, 2022, 16(1): 58–66.
Dinesh Kumar P, Valarmathi K. Fuzzy based hybrid BAT and firefly algorithm for optimal path selection and security in wireless sensor network. Automatika, 2023, 64(2): 199–210.
Kittur L J, Pais A R. Combinatorial design based key pre-distribution scheme with high scalability and minimal storage for wireless sensor networks. Wireless Personal Communications, 2023, 128(2): 855–873.
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Journal of Cyber Security and Mobility
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.