Skip to main content

Advertisement

Log in

EATMR: an energy-aware trust algorithm based the AODV protocol and multi-path routing approach in wireless sensor networks

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

A Correction to this article was published on 14 July 2022

This article has been updated

Abstract

Rapid developments in radio technology and processors have led to the emergence of small sensor nodes that provide communication over Wireless Sensor Networks (WSNs). The crucial issues in these networks are energy consumption management and reliable data exchange. Due to the limited resources of sensor nodes, WSNs become a vulnerable target against many security attacks. Thus, energy-aware trust-based techniques have become a powerful tool for detecting nodes’ behavior and providing security solutions in WSN. Clustering-based routings are one of the most effective methods in increasing the WSN performance. In this paper, an Energy-Aware Trust algorithm based on the AODV protocol and Multi-path Routing approach (EATMR) is proposed to improve the security of WSNs. EATMR consists of two main phases: firstly, the nodes are clustered based on the Open-Source Development Model Algorithm (ODMA), and then in the second phase, clustering-based routing is applied. In this paper, the routing process follows the AODV protocol and multi-path routes approach with considering energy-aware trust. Here, the optimal and safe route is determined based on various parameters, namely energy, trust, hop-count, and distance. In this regard, we emphasize the evaluation of node trust using direct trust, indirect trust, and a multi-objective function. The simulation has been performed in MATLAB software in the presence of a Denial of Service (DoS) attack. The simulation results show that EATMR performs better than the state-of-the-art methods in terms of successfully detecting malicious nodes and enhancing network lifetime, energy consumption, and packet delivery ratio. As a conclusion, EATMR shows an average of 4.3 and 6.1% superiority over M-CSO and SQEER in different scenarios, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

Change history

References

  1. Rezaeipanah, A., Nazari, H., & Ahmadi, G. (2019). A hybrid approach for prolonging lifetime of wireless sensor networks using genetic algorithm and online clustering. Journal of Computing Science and Engineering, 13(4), 163–174.

    Article  Google Scholar 

  2. Sumathi, K., & Pandiaraja, P. (2020). Dynamic alternate buffer switching and congestion control in wireless multimedia sensor networks. Peer-to-Peer Networking and Applications, 13(6), 2001–2010.

    Article  Google Scholar 

  3. Rostami, M., Berahmand, K., Nasiri, E., & Forouzandeh, S. (2021). Review of swarm intelligence-based feature selection methods. Engineering Applications of Artificial Intelligence, 100, 104210.

    Article  Google Scholar 

  4. Ghobaei-Arani, M., & Shahidinejad, A. (2021). An efficient resource provisioning approach for analyzing cloud workloads: A metaheuristic-based clustering approach. The Journal of Supercomputing, 77(1), 711–750.

    Article  Google Scholar 

  5. Berahmand, K., Nasiri, E., Rostami, M., & Forouzandeh, S. (2021). A modified DeepWalk method for link prediction in attributed social network. Computing, 103(10), 2227–2249.

    Article  Google Scholar 

  6. Ghobaei-Arani, M. (2021). A workload clustering-based resource provisioning mechanism using Biogeography based optimization technique in the cloud-based systems. Soft Computing, 25(5), 3813–3830.

    Article  Google Scholar 

  7. Rajpoot, P., & Dwivedi, P. (2020). Optimized and load balanced clustering for wireless sensor networks to increase the lifetime of WSN using MADM approaches. Wireless Networks, 26(1), 215–251.

    Article  Google Scholar 

  8. Patel, T., & Kamboj, P. (2015). Opportunistic routing in wireless sensor networks: A review. In 2015 IEEE International Advance Computing Conference (IACC) (pp. 983–987). IEEE.

  9. Shakarami, A., Ghobaei-Arani, M., Masdari, M., & Hosseinzadeh, M. (2020). A survey on the computation offloading approaches in mobile edge/cloud computing environment: A stochastic-based perspective. Journal of Grid Computing, 18(4), 639–671.

    Article  Google Scholar 

  10. Rezaeipanah, A., Amiri, P., Nazari, H., Mojarad, M., & Parvin, H. (2021). An Energy-Aware Hybrid Approach for Wireless Sensor Networks Using Re-clustering-Based Multi-hop Routing. Wireless Personal Communications, 1–22.

  11. Hajiee, M., Fartash, M., & Eraghi, N. O. (2021). An Energy-Aware Trust and Opportunity Based Routing Algorithm in Wireless Sensor Networks Using Multipath Routes Technique. Neural Processing Letters, 1–24.

  12. Zahedi, A., & Parma, F. (2019). An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Networking and Applications, 12(1), 167–176.

    Article  Google Scholar 

  13. Hajipour, H., Khormuji, H. B., & Rostami, H. (2016). ODMA: A novel swarm-evolutionary metaheuristic optimizer inspired by open-source development model and communities. Soft Computing, 20(2), 727–747.

    Article  Google Scholar 

  14. Chakeres, I. D., & Belding-Royer, E. M. (2004). AODV routing protocol implementation design. In 24th International Conference on Distributed Computing Systems Workshops, 2004, March. Proceedings. (pp. 698–703). IEEE.

  15. M Badr, M. M., Ibrahem, M. I., Mahmoud, M., Fouda, M. M., Alsolami, F., & Alasmary, W. (2021). Detection of False-Reading Attacks in Smart Grid Net-Metering System. IEEE Internet of Things Journal. In press.

  16. Fang, W., Zhang, W., Chen, W., Pan, T., Ni, Y., & Yang, Y. (2020). Trust-based attack and defense in wireless sensor networks: a survey. Wireless Communications and Mobile Computing. https://doi.org/10.1155/2020/2643546

    Article  Google Scholar 

  17. Gilbert, E. P. K., Kaliaperumal, B., Rajsingh, E. B., & Lydia, M. (2018). Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks. Computers & Electrical Engineering, 72, 894–909.

    Article  Google Scholar 

  18. Ghugar, U., Pradhan, J., Bhoi, S. K., & Sahoo, R. R. (2019). LB-IDS: Securing wireless sensor network using protocol layer trust-based intrusion detection system. Journal of Computer Networks and Communications. https://doi.org/10.1155/2019/2054298

    Article  Google Scholar 

  19. Zhao, J., Huang, J., & Xiong, N. (2019). An effective exponential-based trust and reputation evaluation system in wireless sensor networks. IEEE Access, 7, 33859–33869.

    Article  Google Scholar 

  20. Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2020). QoS aware trust based routing algorithm for wireless sensor networks. Wireless Personal Communications, 110(4), 1637–1658.

    Article  Google Scholar 

  21. Wu, X., Huang, J., Ling, J., & Shu, L. (2019). BLTM: Beta and LQI based trust model for wireless sensor networks. IEEE Access, 7, 43679–43690.

    Article  Google Scholar 

  22. Anwar, R. W., Zainal, A., Outay, F., Yasar, A., & Iqbal, S. (2019). BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks. Future Generation Computer Systems, 96, 605–616.

    Article  Google Scholar 

  23. Nie, S. (2019). A novel trust model of dynamic optimization based on entropy method in wireless sensor networks. Cluster Computing, 22(5), 11153–11162.

    Article  Google Scholar 

  24. Jinhui, X., Yang, T., Feiyue, Y., Leina, P., Juan, X., & Yao, H. (2018). Intrusion detection system for hybrid DoS attacks using energy trust in wireless sensor networks. Procedia Computer Science, 131, 1188–1195.

    Article  Google Scholar 

  25. Firoozi, F., Zadorozhny, V. I., & Li, F. Y. (2018). Subjective logic-based in-network data processing for trust management in collocated and distributed wireless sensor networks. IEEE Sensors Journal, 18(15), 6446–6460.

    Article  Google Scholar 

  26. Janani, V. S., & Manikandan, M. S. K. (2018). Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks. EURASIP Journal on Wireless Communications and Networking, 2018(1), 1–27.

    Article  Google Scholar 

  27. Sahoo, R. R., Ray, S., Sarkar, S., & Bhoi, S. K. (2018). Guard against trust management vulnerabilities in wireless sensor network. Arabian Journal for Science & Engineering (Springer Science & Business Media BV), 43(12), 7229–7251.

    Google Scholar 

  28. Patil, P. A., Deshpande, R. S., & Mane, P. B. (2020). Trust and opportunity based routing framework in wireless sensor network using hybrid optimization algorithm. Wireless Personal Communications, 115(1), 415–437.

    Article  Google Scholar 

  29. Khan, T., Singh, K., Hasan, M. H., Ahmad, K., Reddy, G. T., Mohan, S., & Ahmadian, A. (2021). ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs. Future Generation Computer Systems, 125, 921–943.

    Article  Google Scholar 

  30. Sun, B., & Li, D. (2017). A comprehensive trust-aware routing protocol with multi-attributes for WSNs. IEEE Access, 6, 4725–4741.

    Article  Google Scholar 

  31. Wang, R., Zhang, Z., Zhang, Z., & Jia, Z. (2018). ETMRM: An energy-efficient trust management and routing mechanism for SDWSNs. Computer Networks, 139, 119–135.

    Article  Google Scholar 

  32. Mehetre, D. C., Roslin, S. E., & Wagh, S. J. (2019). Detection and prevention of black hole and selective forwarding attack in clustered WSN with active trust. Cluster Computing, 22(1), 1313–1328.

    Article  Google Scholar 

  33. Anchugam, C. V., & Thangadurai, K. (2015). Detection of black hole attack in mobile ad-hoc networks using ant colony optimization-simulation analysis. Indian Journal of Science and Technology, 8(13), 1–10.

    Google Scholar 

  34. Boukerche, A., & Sun, P. (2018). Connectivity and coverage based protocols for wireless sensor networks. Ad Hoc Networks, 80, 54–69.

    Article  Google Scholar 

  35. Roslin, S. E. (2021). Data validation and integrity verification for trust based data aggregation protocol in WSN. Microprocessors and Microsystems, 80, 103354.

    Article  Google Scholar 

  36. Chen, C. S., Lin, J. M., Lee, C. T., & Lu, C. D. (2014). The hybrid Taguchi-Genetic algorithm for mobile location. International Journal of Distributed Sensor Networks, 10(3), 489563.

    Article  Google Scholar 

Download references

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongmei Yang.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original online version of this article was revised: The third author’s family name has been corrected to read “Saeid Shahmoradi”.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yin, H., Yang, H. & Shahmoradi, S. EATMR: an energy-aware trust algorithm based the AODV protocol and multi-path routing approach in wireless sensor networks. Telecommun Syst 81, 1–19 (2022). https://doi.org/10.1007/s11235-022-00915-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-022-00915-0

Keywords

Navigation