Hybrid Elephant Herding Optimization Approach for Cluster Head Selection And Secure Data Transmission In Wsn Using Hybrid Approach Cryptography Techniques
DOI:
https://doi.org/10.56294/dm2024.366Keywords:
Wireless Sensor Network (WSNs), Hybrid – Elephant Herding Optimization (H-EHO), Hybrid Algorithm HSR 19, CryptographyAbstract
Introduction: The wireless nature of sensor networks makes safe transfer of data from one node to another a major challenge in communications. Sensing tasks connect these sensor nodes which have limitations of memories and energies. Cryptography techniques are utilised to handle critical issues of security in these networks. The performance of large-scale networks is enhanced in this case by optimisation algorithm mimicking natural behaviours.
Methods: This work uses H-EHO (Hybrid Elephant Herding Optimisation technique based on Individual strategies to enhance cluster head selections in WSNs (Wireless Sensor Networks) and thus extend networks’ lifetime. WSNs complete cluster head selection processes, and proposed optimisation approach which selects cluster heads based on tracking of sensor nodes for enhancements. The clan operators of optimisation algorithms are adjusted to handle random walk scale factors of elephants. Clusters of WSNs elect updated sensor nodes in principle. Hybrid algorithm HSR19, a novel security symmetric technique offers greater security during data transfers. It offers integrity, confidentiality, and authentication for cryptographic primary keys.
Results: The output of the simulation demonstrates the energy consumption, network longevity, end to end delay, and secure data transfer metrics. The results for choosing an effective and time-efficient cluster head selection process for WSNs are improved by contrasting the two approaches.
Conclusion: This comparison also shows the efficiency of communication devices in terms of calculation times for encoding, decoding and energies consumed for various file sizes
References
1. Ismaeel AA, Elshaarawy IA, Houssein EH, Ismail FH, Hassanien AE. Enhanced elephant herding optimization for global optimization. IEEE Access. 7, pp. 34738-52. https://doi.org/10.1109/ACCESS.2019.2904679
2. Alghamdi TA. Energy efficient protocol in wireless sensor network: optimized cluster head selection model. Telecommunication Systems. 74(3), pp. 331-45. https://doi.org/10.1007/s11235-020-00659-9
3. Mann PS, Singh S. Artificial bee colony metaheuristic for energy-efficient clustering and routing in wireless sensor networks. Soft Computing. 21, pp. 6699-712. https://doi.org/10.1007/s00500-016-2220-0
4. Liu Y, Wu Y. Employ DBSCAN and neighbor voting to screen selective forwarding attack under variable environment in event-driven wireless sensor networks, 9, pp. 77090-105. https://doi.org/10.1109/ACCESS.2021.3083105
5. Bhat S, Kapoor V. Secure and efficient data privacy, authentication and integrity schemes using hybrid cryptography. InInternational Conference on Advanced Computing Networking and Informatics: ICANI-2018, pp. 279-285. https://doi.org/10.1007/978-981-13-2673-8_30
6. Al-Hyari A, Al-Taharwa I, Al-Ahmad B, Alqadi Z. CASDC: a cryptographically secure data system based on two private key images. IEEE Access. 10, pp. 126304-14. https://doi.org/10.1109/ACCESS.2022.3226319
7. Thakor VA, Razzaque MA, Khandaker MR. Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities. IEEE Access. 9, pp. 28177-93. https://doi.org/10.1109/ACCESS.2021.3052867
8. Fu X, Fortino G, Pace P, Aloi G, Li W. Environment-fusion multipath routing protocol for wireless sensor networks. Information Fusion, 53, pp. 4-19. https://doi.org/10.1016/j.inffus.2019.06.001
9. Wang Y, Xue K, Qian C. Evolutionary diversity optimization with clustering-based selection for reinforcement learning. In International Conference on Learning Representations. https://doi.org/10.1016/j.inffus.2019.06.001
10. Lavanya N, Shankar T. Energy efficient cluster head selection using hybrid squirrel harmony search algorithm in WSN. International Journal of Advanced Computer Science and Applications, 10(12), pp. 1-11. https://doi.org/10.14569/ijacsa.2019.0101265
11. Govardanagiri R, Sanjeevulu V. Hybrid Grasshopper and Improved Bat Optimization Algorithms-based clustering scheme for maximizing lifetime of Wireless Sensor Networks (WSNs). International Journal of Intelligent Engineering & Systems. 15(3), pp. 536-546. https://doi.org/10.1007/s10586-024-04619-9
12. Bhandari R, Kirubanand VB. Enhanced encryption technique for secure iot data transmission. International Journal of Electrical and Computer Engineering. 9(5), pp. 3732. https://doi.org/10.11591/ijece.v9i5.pp3732-3738
13. Alekya Rani Y, Sreenivasa Reddy E. Stability-aware energy efficient clustering protocol in WSN using opposition-based elephant herding optimisation. Journal of Control and Decision. 9(2), pp. 202-17. https://doi.org/10.1080/23307706.2021.1941337
14. Rami Reddy M, Ravi Chandra ML, Venkatramana P, Dilli R. Energy-efficient cluster head selection in wireless sensor networks using an improved grey wolf optimization algorithm. Computers. 12(2), pp. 35. https://doi.org/10.3390/computers12020035
15. Veerapaulraj S, Karthikeyan M, Sasipriya S, Shanthi AS. An Optimized Novel Trust-Based Security Mechanism Using Elephant Herd Optimization. Computer Systems Science & Engineering. 44(3), pp. 2489-2500. https://doi.org/10.1109/ACCESS.2024.3374691
16. Niranjana G, Poongodai A, Soujanya KL. Biological inspired self‐organized secure autonomous routing protocol and secured data assured routing in WSN: Hybrid EHO and MBO approach. International Journal of Communication Systems. 35(4), pp. 5044. https://doi.org/10.1002/dac.5044
17. Arulmurugan A, Waris SF, Bhagyalakshmi N. Analysis of cluster head selection methods in WSN. In2021 6th International Conference on Inventive Computation Technologies (ICICT), pp. 114-119.https://doi.org/10.1109/ICICT50816.2021.9358532
18. Sinde R, Begum F, Njau K, Kaijage S. Refining network lifetime of wireless sensor network using energy-efficient clustering and DRL-based sleep scheduling, 20(5), pp. 1540. https://doi.org/10.3390/s20051540
19. Vimala D, Manikandan K. PIRAP: Intelligent Hybrid Approach for Secure Data Transmission in Wireless Sensor Networks. International Journal of Cooperative Information Systems, 32(01n02), pp. 2350002. https://doi.org/10.1142/S0218843023500028
20. Anita EM, Geetha R, Kannan E. A novel hybrid key management scheme for establishing secure communication in wireless sensor networks. Wireless Personal Communications. 82, pp. 1419-33. https://doi.org/10.1007/s11277-015-2290-9
21. Paulraj D, Lavanya R, Jayasudha T, Niranjana MI, Daniya T, Shadrach FD. Blockchain-based wireless sensor network security through authentication and cluster head selection. In2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS), pp. 1-5. https://doi.org/10.1109/ICICACS57338.2023.10099593
22. Vidhya N, Seethalakshmi V, Monisha R, Dhanasekar J, Gurunathan V, Rajanandhini C. Coherent Data Transmission Using Multiplexing for a DWDM Communication System. In2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon), pp. 1-4. IEEE. https://doi.org/10.1109/MysuruCon55714.2022.9972482
Published
Issue
Section
License
Copyright (c) 2024 M. Yuvaraja, D. Sumathi, M. Rajeshkumar, Mohamed Uvaze Ahamed Ayoobkhan (Author)
This work is licensed under a Creative Commons Attribution 4.0 International License.
The article is distributed under the Creative Commons Attribution 4.0 License. Unless otherwise stated, associated published material is distributed under the same licence.