Replica Node Detection using Metaheuristic Algorithms in Wireless Sensor Networks

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2022 by IJETT Journal
Volume-70 Issue-5
Year of Publication : 2022
Authors : R. Bhaskaran, K. Ramamoorthy, C. Fancy, T. Jayasankar
DOI :  10.14445/22315381/IJETT-V70I5P237

Citation 

MLA Style: Bhaskaran, R., et al. "Replica Node Detection using Metaheuristic Algorithms in Wireless Sensor Networks." International Journal of Engineering Trends and Technology, vol. 70, no. 5, May. 2022, pp. 339-345. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I5P237

APA Style:Bhaskaran, R., Ramamoorthy, K., Fancy, C., Jayasankar, T.(2022). Replica Node Detection using Metaheuristic Algorithms in Wireless Sensor Networks. International Journal of Engineering Trends and Technology, 70(5), 339-345. https://doi.org/10.14445/22315381/IJETT-V70I5P237

Abstract
Clustering is one of the essential techniques to prolong the network life span in wireless sensor networks (WSNs). It comprises the clustering of mote into clusters and selecting cluster heads (CHs) for all the clusters. The main challenge in WSNs is to choose the proper CH. However, separate clusters are usually chosen; overlaying clusters are significant for the device to discover its importance in a certain process of device localization time-synchronization and inter-cluster routing. Detection of the replicate node is a significant task in overlaying clusters. This article seeks to detect replicate nodes in overlaying clusters depending on two techniques, adaptive weighted clustering (AWC) algorithm and hybrid bat algorithm with differential equation (BA-DE). The first method utilizes RFID for distinctive identification of the device, and the secondary process identifies to replicate through finding the location through Triangulation and RSSI (received signal strength) technique. These techniques are executed, and effectiveness is contrasted with non-clustered and multicast methods: Line selected multicast, Randomized multicast, K-coverage WSN, and FTVBT. The hybrid bat algorithm with differential equation (BA-DE) shows lesser communication overhead and an improved rate of detection, lesser storage cost, energy consumption, packet loss, and delay under diverse aspects because of its deterministic method.

Keywords
Clustering, Routing, Adaptive weighted clustering, Multicast, Differential equation.

Reference
[1] R. S. Carbajo, and C. Mc Goldrick, Decentralized Peer-to-Peer Data Dissemination in Wireless Sensor Networks, Pervasive Mobile Comput. 40(1) (2017) 242– 66.
[2] I. Ez-zazi, M. Arioua, A. El Oualkadi, and P. Lorenz, On the Performance of Adaptive Coding Schemes for Energy-Efficient and Reliable Clustered Wireless Sensor Networks, Ad Hoc Network. 64(1) (2017) 99–111.
[3] Krishnan Muthumayil, Thangaiyan Jayasankar, Nagappan Krishnaraj, Mohamed Sikkandar, Prakash Nattanmai Balasubramanian and Chokkalingam Bharatiraja, Maximizing Throughput in Wireless Multimedia Sensor Network using Soft Computing Techniques, Intelligent Automation & Soft Computing. 27(3) (2021) 771-784. Doi:10.32604/iasc.2021.012462
[4] B. Parno, A. Perrig, and V. Gligor, Distributed Detection of Node Replication Attacks in Sensor Networks, In: IEEE International Conference on Security and Privacy. 1(1) (2005) 49–63.
[5] N. Alsaedi, F. Hashim, A. Sali, and FZ. Rokhan, Detecting Sybil Attacks in Clustered Wireless Sensor Networks Based on Energy Trust System (ETS), Comput Commun. 2017(110) (2017) 75–82.
[6] S. Ramesh, C. Yaashuwanth, K. Prathibanandhi, Adam Raja Basha and T. Jayasankar, An Optimized Deep Neural Network-Based Dos Attack Detection in Wireless Video Sensor Network, Journal of Ambient Intelligence and Humanized Computing (2021). https://doi.org/10.1007/s12652-020-02763-9.
[7] S. Mathur, A. Reznik, C. Ye, R. Mukherjee, A. Rahman, and Y. Shah, Exploiting the Physical Layer for Enhanced Security, IEEE J Wirel Commun. 17 (2010) 63–70.
[8] K. Cho, M. Jo, T. Kwon, H. H. Chen, and DH. Lee, Classification and Experimental Analysis for Clone Detection Approach in Wireless Sensor Networks, IEEE Syst J. 7(1) (2013) 26–35.
[9] Z. Jinchao, Research on the Key Pre-Distribution Scheme of Wireless Sensor Networks, In: International Conference on Intelligent Computation Technology and Automation. 1(1) (2012) 287–90.
[10] J. W. Ho, D. Liu, M. Wright, and S. K. Das, Distributed Detection of Replica Node Attacks with Group Deployment Knowledge in Wireless Sensor Networks, J Ad Hoc Network. 7(8) (2009) 1476–88.
[11] Z. Li, and G. Gong, Randomly Directed Exploration: An Efficient Node Clone Detection Protocol in Wireless Sensor Networks, IEEE Int Conf Mobile Ad-hoc Sens Syst. 12(1) (2009) 1030–5.
[12] B. Zhu, VGK. Addada, S. Setia, S. Jajodia, and S. Roy, Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. Comput Secur Appl. 2007 (2007) 257–66.
[13] M. Zhang, V. Khanapure, S. Chen, and X. Xiao, Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks. In proc. Int Conf Network Proto. (2009) 284–93.
[14] Z. Qin, C. Ma, L. Wang, J. Xu, and B. Lu, An Overlapping Clustering Approach for Routing in Wireless Sensor Networks, Int J Distrib Sens Network. 1 (2012) 1–13.
[15] M. Cunche, I Know Your MAC Address: Targeted Tracking of Individuals using Wi-Fi, In: International Symposium on Grey-Hat Hacking. (2013) 1–18.
[16] K. Suganthi, B. Vinayaga Sundaram, and J. Aarthi, Randomized Fault-Tolerant Virtual Backbone Tree to Improve the Lifetime of Wireless Sensor Networks. Comput Electric Eng. 48 (2015) 286–97.
[17] J. Jobin, SV. Krishnamurthy, and SK. Tripathi, A Scheme for the Assignment of Unique Addresses to Support Self-Organization in Wireless Sensor Networks. Int Conf Veh Technol. 6 (2004) 4578–4582.
[18] N. Jaiswal. An Overview of WSN and RFID Network Integration, In: International Conference on Electronics and Communication Systems. (2015) 497–502.
[19] R.ArunPrakash, W. R. Salem Jeyaseelan, T.Jayasankar, Detection, Prevention and Mitigation of Wormhole Attack in Wireless Ad HoNetwork by Coordinator, Appl. Math. Inf. Sci. 12(1) (2018) 233–237. Doi: http://dx.doi.org/10.18576/amis/120123
[20] G. Mao, and B. Fidan. Anderson BDO, Wireless Sensor Network Localization Techniques, Comput Network. 51(10) (2007) 2529–53.
[21] S. Geravand, and M. Ahmadi, Bloom Filter Applications in Network Security: A State-of-the-Art Survey, Comput Network. 57(18) (2013) 4047–4064.
[22] (2012). [Online]. Available: https://en.wikipedia.org/wiki/Bloom_filter
[23] Z. Qin, C. Ma, L. Wang, J. Xu, and B. Lu. An Overlapping Clustering Approach for Routing in Wireless Sensor Networks, Int J Distrib Sens Network. 1 (2012) 1-13.
[24] (2009). [Online]. Available: https://www.cryptopp.com/benchmarks.html.
[25] (2012). [Online]. Available: https://www.das-labor.org/wiki/AVR-Crypto-Lib/en.
[26] D.E. Knuth. The Art of Computer Programming, 3rd ed., Addison-Wesley, Newyork. (1997).
[27] (2012). [Online]. Available: http://www.isi.edu/nsnam/ns/.
[28] X. Wang, J. Wu, L. Guo, A k-coverage Algorithm in Three-Dimensional Wireless Sensor Networks, In: IEEE International Conference on Broadband Network and Multimedia Technology. (2010) 1089–93.