{"title":"利用改进的鹬鸟优化算法检测无线传感器网络中的恶意节点","authors":"B. Vijaya Nirmala, K. Selvaraj","doi":"10.1007/s11276-024-03806-1","DOIUrl":null,"url":null,"abstract":"<p>The most crucial thing about the Wireless Sensor Network (WSN) application is the validation of dangerous as well as remote sensing fields, which are expensive to perform by human insights. Further, these features may lead to the self-managed networking model, in which it faces numerous confronts in the network lifetime, fault tolerance, and energy consumption depending upon the non-renewable energy resources. The major advantages of the WSNs are regarded as the monitoring process as well as the nodes used in this network model are positioned commonly in harsh environments. Network management and its efficiency are considered as the most significant factor in network operation. Then, the faults in the WSN have been categorized in terms of persistence, behavior, and underlying causes according to the observation time. Due to its underlying causes in the WSN, the faults are categorized as incorrect computation fault, timing, omission, crash, and fail and stop. Consequently, due to the persistence, the faults are then categorized as a transient fault, intermittent, and permanent, and due to the behaviors, the fault is categorized as a soft and hard fault. As the recent conventional fault detection models failed to provide significant applications in WSN, this work suggests a new way of performing fault tolerance in WSN. In this research, a newly derived technique is implemented by using two functions like energy level checker and a routing manager for fault tolerance to detect malicious nodes in WSN. Here, the Energy level checker checks the residual energy for each communication. If the energy dissipation for a particular communication is less or higher than the threshold it does not send the packet, instead, it forwards the warning messages of the transmitted node that is further sent to the energy level checker. Next, the routing manager sends the path verification packets to the path, if acknowledgment is received, then, the packet is transmitted, and also Certificate Authority is issued to the trusted node based upon the amount of data packets transmitted and the amount of data packets that are successfully obtained. Finally, the prevention of fault nodes is done by selecting the trusted node using a new optimization algorithm known as the Modified Sandpiper Optimization Algorithm derived from the Sandpiper Optimization Algorithm. Another contribution of this WSN network for routing is the Cluster Head selection, which is carried out by solving the multi-objective function regarding constraints like trust, residual energy, distance, and delay. Moreover, the simulations have shown comparatively more success over others.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"3 1","pages":""},"PeriodicalIF":2.1000,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Malicious node detection in wireless sensor network using modified sandpiper optimization algorithm\",\"authors\":\"B. Vijaya Nirmala, K. Selvaraj\",\"doi\":\"10.1007/s11276-024-03806-1\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The most crucial thing about the Wireless Sensor Network (WSN) application is the validation of dangerous as well as remote sensing fields, which are expensive to perform by human insights. Further, these features may lead to the self-managed networking model, in which it faces numerous confronts in the network lifetime, fault tolerance, and energy consumption depending upon the non-renewable energy resources. The major advantages of the WSNs are regarded as the monitoring process as well as the nodes used in this network model are positioned commonly in harsh environments. Network management and its efficiency are considered as the most significant factor in network operation. Then, the faults in the WSN have been categorized in terms of persistence, behavior, and underlying causes according to the observation time. Due to its underlying causes in the WSN, the faults are categorized as incorrect computation fault, timing, omission, crash, and fail and stop. Consequently, due to the persistence, the faults are then categorized as a transient fault, intermittent, and permanent, and due to the behaviors, the fault is categorized as a soft and hard fault. As the recent conventional fault detection models failed to provide significant applications in WSN, this work suggests a new way of performing fault tolerance in WSN. In this research, a newly derived technique is implemented by using two functions like energy level checker and a routing manager for fault tolerance to detect malicious nodes in WSN. Here, the Energy level checker checks the residual energy for each communication. If the energy dissipation for a particular communication is less or higher than the threshold it does not send the packet, instead, it forwards the warning messages of the transmitted node that is further sent to the energy level checker. Next, the routing manager sends the path verification packets to the path, if acknowledgment is received, then, the packet is transmitted, and also Certificate Authority is issued to the trusted node based upon the amount of data packets transmitted and the amount of data packets that are successfully obtained. Finally, the prevention of fault nodes is done by selecting the trusted node using a new optimization algorithm known as the Modified Sandpiper Optimization Algorithm derived from the Sandpiper Optimization Algorithm. Another contribution of this WSN network for routing is the Cluster Head selection, which is carried out by solving the multi-objective function regarding constraints like trust, residual energy, distance, and delay. Moreover, the simulations have shown comparatively more success over others.</p>\",\"PeriodicalId\":23750,\"journal\":{\"name\":\"Wireless Networks\",\"volume\":\"3 1\",\"pages\":\"\"},\"PeriodicalIF\":2.1000,\"publicationDate\":\"2024-07-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Wireless Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s11276-024-03806-1\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Networks","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11276-024-03806-1","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Malicious node detection in wireless sensor network using modified sandpiper optimization algorithm
The most crucial thing about the Wireless Sensor Network (WSN) application is the validation of dangerous as well as remote sensing fields, which are expensive to perform by human insights. Further, these features may lead to the self-managed networking model, in which it faces numerous confronts in the network lifetime, fault tolerance, and energy consumption depending upon the non-renewable energy resources. The major advantages of the WSNs are regarded as the monitoring process as well as the nodes used in this network model are positioned commonly in harsh environments. Network management and its efficiency are considered as the most significant factor in network operation. Then, the faults in the WSN have been categorized in terms of persistence, behavior, and underlying causes according to the observation time. Due to its underlying causes in the WSN, the faults are categorized as incorrect computation fault, timing, omission, crash, and fail and stop. Consequently, due to the persistence, the faults are then categorized as a transient fault, intermittent, and permanent, and due to the behaviors, the fault is categorized as a soft and hard fault. As the recent conventional fault detection models failed to provide significant applications in WSN, this work suggests a new way of performing fault tolerance in WSN. In this research, a newly derived technique is implemented by using two functions like energy level checker and a routing manager for fault tolerance to detect malicious nodes in WSN. Here, the Energy level checker checks the residual energy for each communication. If the energy dissipation for a particular communication is less or higher than the threshold it does not send the packet, instead, it forwards the warning messages of the transmitted node that is further sent to the energy level checker. Next, the routing manager sends the path verification packets to the path, if acknowledgment is received, then, the packet is transmitted, and also Certificate Authority is issued to the trusted node based upon the amount of data packets transmitted and the amount of data packets that are successfully obtained. Finally, the prevention of fault nodes is done by selecting the trusted node using a new optimization algorithm known as the Modified Sandpiper Optimization Algorithm derived from the Sandpiper Optimization Algorithm. Another contribution of this WSN network for routing is the Cluster Head selection, which is carried out by solving the multi-objective function regarding constraints like trust, residual energy, distance, and delay. Moreover, the simulations have shown comparatively more success over others.
期刊介绍:
The wireless communication revolution is bringing fundamental changes to data networking, telecommunication, and is making integrated networks a reality. By freeing the user from the cord, personal communications networks, wireless LAN''s, mobile radio networks and cellular systems, harbor the promise of fully distributed mobile computing and communications, any time, anywhere.
Focusing on the networking and user aspects of the field, Wireless Networks provides a global forum for archival value contributions documenting these fast growing areas of interest. The journal publishes refereed articles dealing with research, experience and management issues of wireless networks. Its aim is to allow the reader to benefit from experience, problems and solutions described.