Abstract
Rapid developments in radio technology and processors have led to the emergence of small sensor nodes that provide communication over Wireless Sensor Networks (WSNs). The crucial issues in these networks are energy consumption management and reliable data exchange. Due to the limited resources of sensor nodes, WSNs become a vulnerable target against many security attacks. Thus, energy-aware trust-based techniques have become a powerful tool for detecting nodes’ behavior and providing security solutions in WSN. Clustering-based routings are one of the most effective methods in increasing the WSN performance. In this paper, an Energy-Aware Trust algorithm based on the AODV protocol and Multi-path Routing approach (EATMR) is proposed to improve the security of WSNs. EATMR consists of two main phases: firstly, the nodes are clustered based on the Open-Source Development Model Algorithm (ODMA), and then in the second phase, clustering-based routing is applied. In this paper, the routing process follows the AODV protocol and multi-path routes approach with considering energy-aware trust. Here, the optimal and safe route is determined based on various parameters, namely energy, trust, hop-count, and distance. In this regard, we emphasize the evaluation of node trust using direct trust, indirect trust, and a multi-objective function. The simulation has been performed in MATLAB software in the presence of a Denial of Service (DoS) attack. The simulation results show that EATMR performs better than the state-of-the-art methods in terms of successfully detecting malicious nodes and enhancing network lifetime, energy consumption, and packet delivery ratio. As a conclusion, EATMR shows an average of 4.3 and 6.1% superiority over M-CSO and SQEER in different scenarios, respectively.
Similar content being viewed by others
Change history
14 July 2022
A Correction to this paper has been published: https://doi.org/10.1007/s11235-022-00933-y
References
Rezaeipanah, A., Nazari, H., & Ahmadi, G. (2019). A hybrid approach for prolonging lifetime of wireless sensor networks using genetic algorithm and online clustering. Journal of Computing Science and Engineering, 13(4), 163–174.
Sumathi, K., & Pandiaraja, P. (2020). Dynamic alternate buffer switching and congestion control in wireless multimedia sensor networks. Peer-to-Peer Networking and Applications, 13(6), 2001–2010.
Rostami, M., Berahmand, K., Nasiri, E., & Forouzandeh, S. (2021). Review of swarm intelligence-based feature selection methods. Engineering Applications of Artificial Intelligence, 100, 104210.
Ghobaei-Arani, M., & Shahidinejad, A. (2021). An efficient resource provisioning approach for analyzing cloud workloads: A metaheuristic-based clustering approach. The Journal of Supercomputing, 77(1), 711–750.
Berahmand, K., Nasiri, E., Rostami, M., & Forouzandeh, S. (2021). A modified DeepWalk method for link prediction in attributed social network. Computing, 103(10), 2227–2249.
Ghobaei-Arani, M. (2021). A workload clustering-based resource provisioning mechanism using Biogeography based optimization technique in the cloud-based systems. Soft Computing, 25(5), 3813–3830.
Rajpoot, P., & Dwivedi, P. (2020). Optimized and load balanced clustering for wireless sensor networks to increase the lifetime of WSN using MADM approaches. Wireless Networks, 26(1), 215–251.
Patel, T., & Kamboj, P. (2015). Opportunistic routing in wireless sensor networks: A review. In 2015 IEEE International Advance Computing Conference (IACC) (pp. 983–987). IEEE.
Shakarami, A., Ghobaei-Arani, M., Masdari, M., & Hosseinzadeh, M. (2020). A survey on the computation offloading approaches in mobile edge/cloud computing environment: A stochastic-based perspective. Journal of Grid Computing, 18(4), 639–671.
Rezaeipanah, A., Amiri, P., Nazari, H., Mojarad, M., & Parvin, H. (2021). An Energy-Aware Hybrid Approach for Wireless Sensor Networks Using Re-clustering-Based Multi-hop Routing. Wireless Personal Communications, 1–22.
Hajiee, M., Fartash, M., & Eraghi, N. O. (2021). An Energy-Aware Trust and Opportunity Based Routing Algorithm in Wireless Sensor Networks Using Multipath Routes Technique. Neural Processing Letters, 1–24.
Zahedi, A., & Parma, F. (2019). An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Networking and Applications, 12(1), 167–176.
Hajipour, H., Khormuji, H. B., & Rostami, H. (2016). ODMA: A novel swarm-evolutionary metaheuristic optimizer inspired by open-source development model and communities. Soft Computing, 20(2), 727–747.
Chakeres, I. D., & Belding-Royer, E. M. (2004). AODV routing protocol implementation design. In 24th International Conference on Distributed Computing Systems Workshops, 2004, March. Proceedings. (pp. 698–703). IEEE.
M Badr, M. M., Ibrahem, M. I., Mahmoud, M., Fouda, M. M., Alsolami, F., & Alasmary, W. (2021). Detection of False-Reading Attacks in Smart Grid Net-Metering System. IEEE Internet of Things Journal. In press.
Fang, W., Zhang, W., Chen, W., Pan, T., Ni, Y., & Yang, Y. (2020). Trust-based attack and defense in wireless sensor networks: a survey. Wireless Communications and Mobile Computing. https://doi.org/10.1155/2020/2643546
Gilbert, E. P. K., Kaliaperumal, B., Rajsingh, E. B., & Lydia, M. (2018). Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks. Computers & Electrical Engineering, 72, 894–909.
Ghugar, U., Pradhan, J., Bhoi, S. K., & Sahoo, R. R. (2019). LB-IDS: Securing wireless sensor network using protocol layer trust-based intrusion detection system. Journal of Computer Networks and Communications. https://doi.org/10.1155/2019/2054298
Zhao, J., Huang, J., & Xiong, N. (2019). An effective exponential-based trust and reputation evaluation system in wireless sensor networks. IEEE Access, 7, 33859–33869.
Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2020). QoS aware trust based routing algorithm for wireless sensor networks. Wireless Personal Communications, 110(4), 1637–1658.
Wu, X., Huang, J., Ling, J., & Shu, L. (2019). BLTM: Beta and LQI based trust model for wireless sensor networks. IEEE Access, 7, 43679–43690.
Anwar, R. W., Zainal, A., Outay, F., Yasar, A., & Iqbal, S. (2019). BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks. Future Generation Computer Systems, 96, 605–616.
Nie, S. (2019). A novel trust model of dynamic optimization based on entropy method in wireless sensor networks. Cluster Computing, 22(5), 11153–11162.
Jinhui, X., Yang, T., Feiyue, Y., Leina, P., Juan, X., & Yao, H. (2018). Intrusion detection system for hybrid DoS attacks using energy trust in wireless sensor networks. Procedia Computer Science, 131, 1188–1195.
Firoozi, F., Zadorozhny, V. I., & Li, F. Y. (2018). Subjective logic-based in-network data processing for trust management in collocated and distributed wireless sensor networks. IEEE Sensors Journal, 18(15), 6446–6460.
Janani, V. S., & Manikandan, M. S. K. (2018). Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks. EURASIP Journal on Wireless Communications and Networking, 2018(1), 1–27.
Sahoo, R. R., Ray, S., Sarkar, S., & Bhoi, S. K. (2018). Guard against trust management vulnerabilities in wireless sensor network. Arabian Journal for Science & Engineering (Springer Science & Business Media BV), 43(12), 7229–7251.
Patil, P. A., Deshpande, R. S., & Mane, P. B. (2020). Trust and opportunity based routing framework in wireless sensor network using hybrid optimization algorithm. Wireless Personal Communications, 115(1), 415–437.
Khan, T., Singh, K., Hasan, M. H., Ahmad, K., Reddy, G. T., Mohan, S., & Ahmadian, A. (2021). ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs. Future Generation Computer Systems, 125, 921–943.
Sun, B., & Li, D. (2017). A comprehensive trust-aware routing protocol with multi-attributes for WSNs. IEEE Access, 6, 4725–4741.
Wang, R., Zhang, Z., Zhang, Z., & Jia, Z. (2018). ETMRM: An energy-efficient trust management and routing mechanism for SDWSNs. Computer Networks, 139, 119–135.
Mehetre, D. C., Roslin, S. E., & Wagh, S. J. (2019). Detection and prevention of black hole and selective forwarding attack in clustered WSN with active trust. Cluster Computing, 22(1), 1313–1328.
Anchugam, C. V., & Thangadurai, K. (2015). Detection of black hole attack in mobile ad-hoc networks using ant colony optimization-simulation analysis. Indian Journal of Science and Technology, 8(13), 1–10.
Boukerche, A., & Sun, P. (2018). Connectivity and coverage based protocols for wireless sensor networks. Ad Hoc Networks, 80, 54–69.
Roslin, S. E. (2021). Data validation and integrity verification for trust based data aggregation protocol in WSN. Microprocessors and Microsystems, 80, 103354.
Chen, C. S., Lin, J. M., Lee, C. T., & Lu, C. D. (2014). The hybrid Taguchi-Genetic algorithm for mobile location. International Journal of Distributed Sensor Networks, 10(3), 489563.
Funding
The authors have not disclosed any funding.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The original online version of this article was revised: The third author’s family name has been corrected to read “Saeid Shahmoradi”.
Rights and permissions
About this article
Cite this article
Yin, H., Yang, H. & Shahmoradi, S. EATMR: an energy-aware trust algorithm based the AODV protocol and multi-path routing approach in wireless sensor networks. Telecommun Syst 81, 1–19 (2022). https://doi.org/10.1007/s11235-022-00915-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-022-00915-0