Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Hareesha, D.a; * | Ahamed, Shaik Fayazb | Priyanka Brahmaiah, V.c | Kalpana, Dingarid | Arun, M.e | Satyanarayana, P.b
Affiliations: [a] Department of ECE, P. V. P. Siddhartha Institute of Technology, Vijayawada, Andhra Pradesh, India | [b] Department of ECE, V. R. Siddhartha Engineering College, Vijayawada, Andhra Pradesh, India | [c] Department of ECE, VNR Vignana Jyothi Institute of Engineering and Technology, Hyderabad, Telangana, India | [d] Department of Computer Science and Engineering, Vignana Bharathi Institute of Technology, Hayathnagar, Telangana, India | [e] Department of ECE, Panimalar Engineering College, Chennai, Tamil Nadu, India
Correspondence: [*] Corresponding author: D. Hareesha, Assistant Professor, Department of ECE, P. V. P. Siddhartha Institute of Technology, Vijayawada, Andhra Pradesh, India. E-mail: hareeshashyam@gmail.com.
Abstract: Several sensor nodes are used in Wireless Sensor Networks (WSNs). A multi-level clustering-based multi-trust model is introduced in WSN. The model’s main intent is to compute trust value for performing secure transmission. Initially, to verify vulnerability, the watchdog counter provides the required trust output. Further, this is intended to build a multi-level trust clustering process. Here, multi-trust is carried out by energy trust, communication trust, and data trust. Hence, multi-trust is compared with a threshold value. Once the trust value is generated, it is given for processing the cluster groups. Due to more multi-trusting, it creates multi-level clustering for security level enhancement. After the cluster group is formed, the major aspect of CH is optimally obtained with a Modified Exploration-based Pelican Optimization Algorithm (ME-POA). Finally, performance is carried out in multi-objective functions, where parameters are defined as distance, delay, energy, and multi-trust. Thus, with the determination of optimal results, the proposed multi-level clustering proves that it offers secure data transmission over WSN.
Keywords: Wireless sensor network, trusted cluster head selection, modified exploration-based pelican optimization algorithm, multi-level clustering, multi-trust computation, secure data transmission
DOI: 10.3233/IDT-220314
Journal: Intelligent Decision Technologies, vol. 17, no. 4, pp. 1417-1433, 2023
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl