{"title":"Enhanced CH selection and energy efficient routing algorithm for WSN","authors":"Aarti Sharma, Ankush Kansal","doi":"10.1007/s00542-024-05690-3","DOIUrl":null,"url":null,"abstract":"<p>These days, Wireless Sensor Networks (WSNs) have been broadly utilized in numerous areas such as battlefield surveillance, industrial process control, pipeline monitoring, defence and military affairs, and so forth. Various energy efficient works are conducted without addressing the secured data transmission process. It is very challenging task to transfer data efficiently and securely to the desired location. Various researches has been done in this field but there are few limitations like malicious nodes are not considered and very complex systems are used for authentication like encryption and key management. In this paper a secure energy efficient algorithm using improved LEACH in optimization with Fire Fly algorithm (FFA) and Artificial neural network (ANN) to overcome all above said issues has been proposed. Cluster head selection is done using a new threshold value taking into account residual energy, average energy and covering distance of the nodes as compared to existing LEACH which uses only a probability based random number for CH selection. Due to the presence of malicious nodes in the route network performance degrades and data drop rate increases so there is need of energy efficient along with secure routing protocol. To fulfil this requirement firefly algorithm is used to get optimized node properties as output then this data is passed to ANN to provide communicating and non-communicating nodes as a result and attacker node in the existing route. Based on this differentiation of nodes an optimized route is developed from source to destination by eliminating the malicious nodes from the route. Simulation results demonstrate that there is an improvement in various Qos parameters of network as compared to existing approaches.</p>","PeriodicalId":18544,"journal":{"name":"Microsystem Technologies","volume":"25 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Microsystem Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/s00542-024-05690-3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
These days, Wireless Sensor Networks (WSNs) have been broadly utilized in numerous areas such as battlefield surveillance, industrial process control, pipeline monitoring, defence and military affairs, and so forth. Various energy efficient works are conducted without addressing the secured data transmission process. It is very challenging task to transfer data efficiently and securely to the desired location. Various researches has been done in this field but there are few limitations like malicious nodes are not considered and very complex systems are used for authentication like encryption and key management. In this paper a secure energy efficient algorithm using improved LEACH in optimization with Fire Fly algorithm (FFA) and Artificial neural network (ANN) to overcome all above said issues has been proposed. Cluster head selection is done using a new threshold value taking into account residual energy, average energy and covering distance of the nodes as compared to existing LEACH which uses only a probability based random number for CH selection. Due to the presence of malicious nodes in the route network performance degrades and data drop rate increases so there is need of energy efficient along with secure routing protocol. To fulfil this requirement firefly algorithm is used to get optimized node properties as output then this data is passed to ANN to provide communicating and non-communicating nodes as a result and attacker node in the existing route. Based on this differentiation of nodes an optimized route is developed from source to destination by eliminating the malicious nodes from the route. Simulation results demonstrate that there is an improvement in various Qos parameters of network as compared to existing approaches.