You are currently viewing a new version of our website. To view the old version click .
Energies
  • Article
  • Open Access

19 May 2023

MHSEER: A Meta-Heuristic Secure and Energy-Efficient Routing Protocol for Wireless Sensor Network-Based Industrial IoT

,
,
,
,
and
1
Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura 140401, Punjab, India
2
Department of Computer Engineering and Application, GLA University, Mathura 281406, Uttar Pradesh, India
3
Department of Computer Science and Engineering, Amrita School of Computing, Chennai 601103, Amrita Vishwa Vidyapeetham, India
4
Dipartimento di Informatica, Universita degli Studi di Milano, 20133 Milano, Italy
This article belongs to the Special Issue Energy Efficiency in Wireless Networks

Abstract

Several industries use wireless sensor networks (WSN) for various tasks such as monitoring, data transmission, and data gathering. They find applications in the industrial internet of things (IIoT). WSNs are utilized to track and monitor changes in the environment. Since they include multiple small sensor nodes (SN), they are severely constrained, so resource management geared toward energy efficiency is crucial in this kind of network. Minimizing the power to interpret, transmit, and store data between various sensors poses important challenges. Experts have considered various ways to address these issues that unavoidably affect the network’s performance: reducing energy usage while maintaining system throughput remains the primary research issue. Another important concern relates to network security. Specifically, intrusion detection and avoidance are major concerns. In this work, we introduce the meta-heuristic-based secure and energy-efficient routing (MHSEER) protocol for WSN-IIoT. The protocol learns the forwarding decisions using the number of hops, connection integrity characteristics, and accumulated remaining energy. To make the method more secure, the protocol also employs counter-encryption mode (CEM) to encrypt the data. A meta-heuristics study designed to achieve reliable learning is used in the suggested protocol. The protocol consists of two stages. The first stage uses a heuristics method to improve the option for dependable data routing. Security based on a computationally simple and random CEM is accomplished in the second stage. The proposed MHSEER protocol has been compared to the secure trust routing protocol for low power (Sectrust-RPL), heuristic-based energy-efficient routing (HBEER), secure and energy-aware heuristic-based routing (SEHR), and secure energy-aware meta-heuristic routing (SEAMHR) in terms of packet drop ratio, throughput, network delay, energy usage, and faulty pathways. The proposed protocol increases throughput to 95.81% and decreases the packet drop ratio, packet delay, energy consumption, and faulty pathways to 5.12%, 0.10 ms, 0.0102 mJ, and 6.51%, respectively.

1. Introduction

The industrial internet of things (IIoT) paradigm relies heavily on wireless sensor networks (WSNs) [1], which are wireless networks without infrastructure facilities that are deployed using a wide variety of wireless sensors to assess operational, physical, or environmental conditions. In WSN, sensor nodes (SNs) with an inbuilt CPU manage the system and are connected among them and to the base station (BS) [2] (which in turn can be linked to the internet). The nodes perform sensing, data processing, and transmission, whereas data collection, analysis, and delivery to the end user for decision-making are the BS’s responsibilities [3]. Due to their versatility, WSNs have found application in several domains such as IoT, tracking and detection systems, conditions monitoring (relative humidity, temperature, and air density), patient evaluation, and agribusiness [4,5].
The key characteristic of WSN is that not only the storage capacity, memory, and CPU processor capabilities of the nodes are limited but their power consumption is considerably constrained [6,7]. Energy-efficient routing (EER) algorithms are therefore essential to reduce power consumption and extend the useful life of the network [8]. Furthermore, the network must be operated manually, which presents certain difficulties [9].
When designing protocols and hardware architectures, researchers should prioritize the effective utilization of the energy storage of SNs [10]. The approaches that have received the most attention include cluster formation and different data transmission communication methods. SNs are organized into a number of subsets, i.e., clusters, to reduce power usage for lengthy transmission [11]. Removing associated data that could reduce the total volume of data exchanged with the BS is the responsibility of a cluster head (CH) [2,12]. The CH transfers the combined information to the BS.
Since they are frequently placed in hazardous or distant locations and are therefore challenging to physically safeguard, sensor nodes are more susceptible to security attacks. They might also lack the ability to process information and the memory necessary to execute effective security regulations, which would make them more vulnerable to attacks. The probability of illegal access and compromised network security and integrity increases greatly as a result of such restrictions [13]. Most proposed solutions aim to increase resource efficiency and the timely distribution of data but neglect to address the reliability of sensor data, leaving a gap for hackers. For industrial operations, inaccurate or manipulated sensor data can have major repercussions, including malfunctioning equipment, delayed production, and safety risks. As a result, it is crucial to use secure protocols, encrypted data, and authentication methods to guarantee the integrity and validity of sensor data [14].

1.1. Objective

WSN-IIoT has the distinct benefit of enabling the continuous surveillance and oversight of industrial operations, which boosts productivity, safety, and effectiveness [15]. With the use of WSNs, preventative upkeep may be carried out on manufacturing equipment and processes, resulting in less downtime. WSNs can also aid in waste minimization and energy optimization, which can save money and assist the environment. WSN-IIoT may, in general, automate and revolutionize manufacturing operations by facilitating decision-making based on data. In order to balance the power usage and avoid unauthorized access, data manipulation, and exposure by malicious nodes on the network, an energy-efficient routing (EER) protocol solution should be created for IoT-based WSNs [16,17]. The purpose of this study is to propose a WSN routing technique that is secure and energy-efficient. The primary goals of the proposed MHSEER protocol are energy efficiency, stability, and reliability, in data transfer despite limited resources. To obtain the best possible data routing, some heuristics are utilized. To learn the routing decision, the MHSEER protocol uses integrated minimal resources, hop count, and connection integrity measures [18]. The suggested IIoT protocol has advantages such as improved security, decreased power consumption, and increased reliability. A secure routing protocol can shield critical data from cyberattacks and stop unauthorized users from connecting to the network. It helps IIoT devices use less energy, which extends their lifespans and minimizes their operating expenses, and by lowering the likelihood of network congestion and packet loss, the protocol can increase the reliability of IIoT systems. The MHSEER protocol is reliable thanks to encoding and the detection and segregation of hostile nodes; furthermore, it offers a method for dynamic routing [13]. The network monitoring between the BS and its surroundings and the energy-efficiency signals together provide effective load balancing and lessen the issue of network segregation. We will show that, compared to existing state-of-the-art solutions, the MHSEER protocol improves the performance of low-power SNs in terms of different performance metrics [19]. The suggested Protocol in IIoT also has several drawbacks, such as complexity and compatibility. A safe routing protocol’s implementation might be difficult and expensive because it calls for specialized knowledge and skills. Certain protocols might not work with some IIoT devices, which could restrict their operation or necessitate extra hardware modifications.

1.2. Contributions

The paper’s contributions are the following.
  • An architecture of WSN-IIoT has been developed for the MHSEER protocol that helps minimize the delay and energy consumption of the network with maximum stability [14].
  • To solve the above-mentioned issues, an MHSEER approach has been proposed, which enhances the choice for reliable data routing using a heuristic function and uses the encoding and decoding of data package based on counter encryption mode (CEM) [9].
  • The proposed protocol compares the different parameters of a routing protocol such as throughput, network delay, packet drop rate, faulty pathways, and energy usage with the above-mentioned existing approaches. MHSEER increases the throughput and decreases metrics such as the packet drop rate and energy usage.

1.3. Structure

The structure of this article is as follows: Section 2 outlines the state-of-the-art in energy-efficient routing protocols. Section 3 introduces the proposed architecture of WSN-IIoT for the secured and energy-efficiency protocol. A detailed discussion of the MHSEER protocol and the stages designed is presented in Section 4. Section 5 shows the experimental findings about MHSEER and compares them to the competing approaches. Finally, Section 6 summarizes the findings of the paper.

3. Proposed Architecture of WSN-IIoT for Energy Routing Protocol

The clustering process divides the network into various clusters in the WSN environment. Each cluster contains a CH node that transmits data collected from its SN network to the BS, as shown in Figure 1. In hierarchical protocols, choosing the CH node is a crucial decision that adds to the system overhead. The network will experience significant overhead if the CH node fails. The objective is to suggest an energy efficiency technique that minimizes system overhead and maximizes stability. The proposed protocol allows all nodes in a cluster to be CH nodes; however, the clusters are not required to contain a CH node [10]. The CH node is elected using a learned machine. In fact, consuming less energy, which is currently being spent on frequent selections of CH nodes, will hopefully lengthen network longevity. The nodes cooperate to send data to the BS; as a result, the nodes closest to the BS will use more resources than most of the other nodes. As a result, it is likely that the clusters near the BS change to a non-connected condition. As a result, the detected data are not sent to the BS. The clusters next to the BS have smaller sizes to address this issue. Hence, energy for transmitted data will be saved [11].
Figure 1. Framework of WSN in IIoT.
The proposed approach does not require the SNs to recognize the CH node. An SN uses its cluster-ID and some basic details about its distant neighbors in one hop to deliver data to the BS. The routing protocol employs a distributed and localized strategy to use a learning system to identify the best CH nodes for each cluster. Each node in this scenario can choose the optimum path for data transfer or act as a CH node [2].
An energy-efficient routing protocol is created. An algorithm is initialized right away to preserve the route to identify erroneous data proclamation from the nearby nodes and predicts link failure using its fitness function, as shown in Figure 2. As a result, the algorithm helps extend the node lifetime by reconstructing the path and optimizing the data drop ratio. Hence, the information is securely transmitted without being interrupted.
Figure 2. Architecture of WSN for energy-efficient routing protocol.
So, an algorithm is implemented to track the announcement of misleading data. The inclusion of the proposed approach in the routing protocol helps to detect fraudulent data announcements. The protocol also foresees energy-drained nodes early on and raises an alarm as a result. This alarm helps to start the maintenance of the route of the protocol that is elaborated in Figure 2 [14]. Some SNs are included in the homogeneous structure of the energy-efficient routing protocol, and each node is aware of its own position. The fitness function evaluates the node’s full energy; therefore, it has an early awareness of connection failure based on the energy of the node. As a result, the algorithm is initiated when the monitoring node issues an alarm in the event that a connection failure occurs within a few moments. An energy-efficient routing protocol is an effective, expandable, and adaptable routing protocol. In wireless architecture, the data can be transmitted to the source and destination nodes via a variety of routes. There are some basic functions such as route preservation, maximizing the lifespan of a network, and minimizing packet drops for secure data transmission [32].

4. Methodology

This section describes the phases of the proposed MHSEER protocol in detail. The protocol uses link stability metrics, hop counts, and accumulated residual energies to make routing decisions. To begin with, the suggested MHSEER protocol uses a meta-heuristic study built to produce reliable and wise learning [9]. The protocol is a metaheuristic technique that enhances reliable data routing. There are two primary stages to this project. The first stage of the proposed protocol enhances the choice for reliable data routing using a heuristic algorithm. The beam heuristic reduces the memory requirements of the nodes and provides efficient next-hop selection by utilizing a number of characteristics and link reliability [6]. In the second stage, a protocol that is secure, legitimate, and based on a computationally simple and random CEM is achieved [14]. The proposed protocol (Figure 3) simultaneously uses the encryption and decryption of data packets while utilizing less computational power from the nodes. Furthermore, alarm and traffic assessment techniques reduce the likelihood of link failure and uneven energy use in the network area [33].
Figure 3. Design of the proposed method.

4.1. Route Discovery

Suppose that the SNs are structured as graphs G, where G ( D , L ) represents the graph, L represents the optimal links between the two closely linked nodes n 1 and n 2 , and D is the density of the SNs. The MHSEER protocol uses the heuristic method in the first stage to estimate the relative weight for locating the best node as the next hop. The decision to route in the direction of the target node is guided by the heuristic function [34]. The source node validates its route entrance against the BS in a local database to start the discovery process. If it is discovered that the route meets the criteria for a number of hops to the BS (h), the degree of integrity of the link ( d l i ), and the accumulated energy ( e i ), the source node is selected as the next hop, and the packages are transferred directly to it [35]. Additionally, suppose that there is no viable route available that satisfies the routing criteria in the local database of the source node. In that case, each of the neighboring nodes must participate in the process of choosing the next hop. While accessing the affected links, the link integrity degree uses the hash function of cryptography to ascertain if the transmitted number of packets has been altered. Suppose node i endangers a probe packet with p bits and sends it to node j [36]. To identify its message code, M c , node i first delivers the probe packet p 1 to the hash function. Second, the received M c is added as p 1 + M c to the real probe packet and sent to node j. Node j recalculates M c of the probe packet received by p 1 after receiving it along with M c . One is used to denote the high threshold value, and zero is used to denote the low threshold value. The link’s high threshold value indicates that it is very trustworthy and has a low fault rate. Residual energy aggregation e i is estimated in two stages [9]. The residual level e l is first continuously watched by each node, and then the residual energy’s rate e r is calculated using Equation (1).
m e n c e n
where n is the neighbour, m e n is the maximal energy, and c e n is the neighbour’s energy consumption.
The node with the most accumulated residual energy is consequently assigned the highest precedence. Finally, the node examines the equivalent value that represents the hop count to the BS in its local table. The closer the node is to the BS, the less communication is required to transfer data, as indicated by a lower value. The heuristic function h f is then determined by adding all of the measured values of the accumulated residual energy, the integrity of the link, and the number of hops in a stack, as shown in the Equation (2).
h f = a ( e l + e r ) + b 1 h + c d l i
where a , b , and c are the weighting coefficients and provide the heuristic function with a meaningful effect. Following the computation of h f , every neighbor node communicates its knowledge to the SN to forecast the best course of action to take to reach the BS. The neighbor node with the highest h f indicates a superior rank for choosing the next hop. The proposed method uses the meta-heuristic protocol, which maximizes the suitable next-hop in a subset, to analyze the linked graph. In order to save memory and preserve the untrusted node while finding the next hop, the protocol creates node databases [37]. The beam meta-heuristics provide the method for choosing the best node as the next hop based on each node’s greatest value. If we assume that, using beam heuristics, h f 0 , h f 1 , , h f n , which have the highest weight value, then the weighted total S ( f n ) can be denoted as provided in the Equation (3)
S ( f n ) = h f i
where i = 0,1…,n.

4.2. Route Discovery Security

The proposed protocol concentrated on data protection for the selected beam based on heuristics routing in the second stage. To guarantee connectivity solutions with the least propagation delay, it also provides a route maintenance plan [6]. The proposed protocol uses a CEM that allows nodes to simultaneously encrypt data packets with randomization [38]. Three elements are required to start the CEM encoding method: a data package ( D i ), a private key (K), and counter bits (C). To create the distinctive pattern of the counter block B i shown in Equation (4), the node N i and counter bits are combined together and then sent through an encoding function E f using key K.
B i = E f ( K ( N i + C ) )
An encoder enables the encoding and decoding of the packet header, and a key generator is used to carry out the learning process. The network’s parameters were optimized through a number of experiments, enabling the system to encode and decode data packets and B i very quickly. The activation function used in this experiment is given by Equation (5).
f ( x ) = 1 1 + e x
where f(x) is the sigmoid function. The originating nodes n i and E f are used to create the new counter block B i + 1 for the data packets D i + 1 after being concatenated with N i and C. The ciphertext sequences c i , , c n 1 , c n nodes for n i , , n n 1 , n n are consequently obtained in the BS, indicating that the decoding function D f with the same key is used to obtain authentic data packets D i where i = 1,⋯, n applying Equation (6).
D i = [ D f ( K ( N i + B i ) ) ] c i

4.3. Route Maintenance

Some other routes are found with the help of route maintenance if the energy rates of the selected next-hop nodes drop to a particular threshold value [39]. As a result, data degradation and re-transmission are prevented. When an energy-inefficient node is found during the routing stage, it stops transmitting data and sends an error message to the origin node. The next subsequent hop is chosen to continue the data routing after the originating node uses the heuristic function to identify the node with the highest weight. The application of an energy threshold for the maintenance of the route significantly decreases the time of network and route intrusions [40]. Additionally, the quantity of packets received that the next-hops of the BS’s neighbors broadcast to them determines the congestion ratio. The proposed method is used to determine the traffic rate ( T f r ) among the neighboring hops (i) or the BS given by Equation (7).
T f r = b l P l B m
where b l , P l , and B m are the bandwidth of the link, the transmitted packets on the link, and the maximal bandwidth from i to the BS, respectively.

5. Results and Discussion

This section describes the experimental findings and configuration of the proposed method over the Sectrust-RPL [1], SEHR [6], HBEER [6], and SEAMHR [9] approaches. The various network techniques are validated, tested, and verified using the MATLAB simulator tool to assess the results of the experiments. In terms of throughput, packet delay, defective routes, and energy consumption, the results are significantly better than the previous research’s results. In addition, the performance of the linked methodologies and the proposed protocol is provided by taking into account variables such as end-to-end delay, fault pathways, throughput, packet drop ratio, and energy consumption. Table 2 displays the WSN parameter settings used in the simulation.
Table 2. Simulation parameters.
Table 3 represents the comparative analysis of the proposed approach with the state of art approaches, and Figure 4 shows the graphical representation of the same.
Table 3. Comparative analysis of proposed approach with state-of-art approaches.
Figure 4. Comparative analysis of state-of-art approaches in terms of different parameters.

5.1. Throughput Analysis

Table 4 depicts the analysis of the proposed throughput with the four existing methods. Figure 5 represents the throughput with respect to the different number of nodes. Additionally, by utilizing the CEM mechanism for information security, the proposed protocol lessens the possibility of rogue nodes impairing the operation of data transportation between the SNs and the BS. Furthermore, improving the delivery of packets and network access results from traffic monitoring between neighboring nodes and the BS, while the throughput is calculated by Equation (8).
T h r o u g h p u t = R e c i e v e d p a c k e t s T o t a l t i m e
Table 4. Comparative analysis of proposed throughput (%) with state-of-art approaches.
Figure 5. Throughput.
Figure 5 shows the 250 nodes with respect to the throughput. In the case of 50 nodes, the proposed approach acquires the maximum throughput, i.e., 95.8%, as compared to the other existing approaches; in the case of 100 nodes, the proposed approach acquires 96.2% throughput in comparison to the existing approaches; in the case of 250 nodes, the proposed approach acquires 93.25% as compared to the existing approaches.

5.2. Packet Drop Ratio Analysis

Table 5 shows the comparative analysis of the packet drop ratio of the four existing methods with the proposed approach. Figure 6 represents the packet drop rate with respect to the different numbers of nodes. In contrast to existing methods, the MHSEER protocol uses a beam heuristic approach to construct a residual energy-based weighted function, the number of hops to the BS, and the connection integrity criteria. Such an approach allows for the choice of the most reliable and energy-efficient nodes for packet transmission, and the packet drop ratio can be calculated by Equation (9).
P a c k e t d r o p r a t i o = R e c e i v e d p a c k e t s T o t a l p a c k e t s
Table 5. Comparative analysis of proposed packet drop ratio (%) with state-of-art approaches.
Figure 6. Packet drop ratio.
Figure 6 depicts the minimum packet drop ratio in the proposed approach. As shown, if there are 50 nodes, it is 4.8% as compared to the existing approaches. If there are 250 nodes, it is 30% for Sectrust-RPL; 21.27% for HBEER; 15% for SEHR; 9.54% for SEAMHR; and 8.24% for the proposed approach, which is the minimum that is required.

5.3. End-to-End Delay Analysis

Table 6 depicts the comparative analysis of the packet delay of the four existing methods with the proposed approach. Figure 7 represents the end-to-end delay with respect to the different number of nodes. The proposed protocol reduces the likelihood of path re-finding with the lowest number of re-transference, in contrast to existing solutions, by selecting the security-aware and reliable path for the routing. Such a routing technique eventually reduces congestion issues and effectively utilizes the bandwidth of wireless channels to send data packets with the least amount of network delay.
Table 6. Comparative analysis of proposed end-to-end delay (ms) with state-of-art approaches.
Figure 7. End-to-end delay.
Figure 7 depicts the minimum end-to-end delay in the proposed approach. In case there are 100 nodes, the proposed approach acquires 0.015 ms, i.e., minimum delay, as compared to the existing approaches. In the case of 250 nodes, it acquires 0.192 ms for Sectrust-RPL, 0.173 ms for HBEER, 0.141 ms for SEHR, and 0.121 ms for SEAMHR; 0.104 ms has been acquired for the proposed approach.

5.4. Energy Consumption Analysis

Table 7 compares the energy usage of the four existing methods with the proposed approach.
Table 7. Comparative analysis of proposed energy consumption (mJ) with state-of-art approaches.
Figure 8 represents the energy consumption with respect to the different numbers of nodes. The proposed method shows a minimal consumption of energy of 0.0102 mJ, while the existing Sectrust-RPL, HBEER, SEHR, and SEAMHR approaches show a consumption of 0.0326 mJ, 0.0252 mJ, 0.0190 mJ, and 0.0154 mJ, respectively. Because of the smart and risk-tolerant routing approach used by the proposed protocol, the routing pathways were stable for a considerable amount of time.
Figure 8. Energy consumption.

5.5. Faulty Routes Analysis

Table 8 shows the comparative analysis of the faulty pathways of the four existing methods with the proposed approach.
Table 8. Comparative analysis of proposed faulty routes (%) with state-of-art approaches.
Figure 9 represents faulty pathways as a function of the number of nodes. The proposed approach shows a minimal faulty pathway of 6.51%, while the existing approaches Sectrust-RPL, HBEER, SEHR, and SEAMHR show 17.07%, 13.31%, 10.46%, and 7.83%, respectively. This is a result of the improvement of the decision to route the heuristic function pathway in the proposed protocol. Furthermore, the heuristic function generates smart conclusions that take into account a variety of factors, such as connection integrity, that promote the consistency of the data.
Figure 9. Faulty routes.

5.6. Findings and Implications for the Research

The major objective of this study is to suggest a WSN routing technique that is secure and energy-efficient. The proposed MHSEER protocol’s primary goals are energy efficiency, stability, and reliable data transfer capability because of its scarce resources. The finding of the paper demonstrates that the throughput rate of the protocol is 95.81%, and the packet drop ratio, packet delay, energy consumption, and faulty pathways are 5.12%, 0.10 ms, 0.0102 mJ, and 6.51%, respectively. As a result, the suggested method reduces energy consumption, erroneous routes, and latency while also greatly extending the network lifetime.

6. Conclusions

To optimize the routing strategy with wise judgments against malicious nodes, this paper provides a safe EER protocol for WSNs. To achieve dependable communication for WSN, the proposed protocol focuses on important elements, including energy usage, secure data transfer, packet delay, and route maintenance. Using all parameters that have an impact on the energy effectiveness of the WSN protocol is recommended to obtain the highest results from energy-efficient routing protocols. To achieve efficient next-hop decisions and decrease the use of node memory, the heuristic function uses a variety of factors and network integrities. Using different parameters, performance evaluations with existing approaches are shown. The approach offers improved network performance metrics such as throughput and reduced packet drop ratios, energy consumption, end-to-end delays, and defective routes. The proposed protocol increases throughput to 95.81% and decreases the packet drop ratio, packet delay, energy consumption, and faulty pathways to 5.12%, 0.10 ms, 0.0102 mJ, and 6.51%, respectively, in comparison to the existing energy-efficient routing protocol. However, if the proposed approach can be implemented using realistic datasets, it can produce far better outcomes. In future work, the proposed energy-efficient protocol will be implemented using real-world datasets for better results.

Author Contributions

Conceptualization, H.B. and A.S.; methodology, S.R. and A.S.; validation, A.S., D.K.S. and H.B.; formal analysis, S.S., S.R., and H.B.; investigation, S.R. and G.G.; resources, S.R.; data curation, G.G., and A.S.; and writing—original draft preparation, A.S. and H.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research received external funding.

Data Availability Statement

Not applicable.

Acknowledgments

The work was partially supported by the MUSA (Multilayered Urban Sustainability Action) project, funded by the European Union—NextGenerationEU, under the National Recovery and Resilience Plan (NRRP) Mission 4 Component 2 Investment Line 1.5: strengthening of research structures and creation of R&D “innovation ecosystems”, set up of “territorial leaders in R&D” (CUP G43C22001370007, Code ECS00000037). The work was also partially supported by the SERICS project (PE00000014) under the NRRP MUR program funded by the EU—NextGenerationEU.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Airehrour, D.; Gutierrez, J.A.; Ray, S.K. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Gener. Comput. Syst. 2019, 93, 860–876. [Google Scholar] [CrossRef]
  2. Hamzah, A.; Shurman, M.; Al-Jarrah, O.; Taqieddin, E. Energy-efficient fuzzy-logic-based clustering technique for hierarchical routing protocols in wireless sensor networks. Sensors 2019, 19, 561. [Google Scholar] [CrossRef]
  3. Sharma, S.; Kaur, A. Survey on wireless sensor network, Its Applications and Issues. In Journal of Physics: Conference Series; IOP Publishing: Bristol, UK, 2021; Volume 1969, p. 012042. [Google Scholar]
  4. Behera, T.M.; Samal, U.C.; Mohapatra, S.K.; Khan, M.S.; Appasani, B.; Bizon, N.; Thounthong, P. Energy-Efficient Routing Protocols for Wireless Sensor Networks: Architectures, Strategies, and Performance. Electronics 2022, 11, 2282. [Google Scholar] [CrossRef]
  5. Hayajneh, A.A.; Bhuiyan, M.Z.A.; McAndrew, I. A novel security protocol for wireless sensor networks with cooperative communication. Computers 2020, 9, 4. [Google Scholar] [CrossRef]
  6. Haseeb, K.; Almustafa, K.M.; Jan, Z.; Saba, T.; Tariq, U. Secure and energy-aware heuristic routing protocol for wireless sensor network. IEEE Access 2020, 8, 163962–163974. [Google Scholar] [CrossRef]
  7. Kumar, A.; Sharma, I. Enhancing Cybersecurity Policies with Blockchain Technology: A Survey. In Proceedings of the 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), Greater Noida, India, 14–16 December 2022; pp. 1050–1054. [Google Scholar] [CrossRef]
  8. Kuhlani, H.; Wang, X.; Hawbani, A.; Busaileh, O. Heuristic data dissemination for mobile sink networks. Wirel. Netw. 2020, 26, 479–493. [Google Scholar] [CrossRef]
  9. Gurram, G.V.; Shariff, N.C.; Biradar, R.L. A Secure Energy Aware Meta-Heuristic Routing Protocol (SEAMHR) for sustainable IoT-Wireless Sensor Network (WSN). Theor. Comput. Sci. 2022, 930, 63–76. [Google Scholar] [CrossRef]
  10. Liu, Y.; Wu, Q.; Zhao, T.; Tie, Y.; Bai, F.; Jin, M. An improved energy-efficient routing protocol for wireless sensor networks. Sensors 2019, 19, 4579. [Google Scholar] [CrossRef]
  11. Qureshi, K.N.; Bashir, M.U.; Lloret, J.; Leon, A. Optimized cluster-based dynamic energy-aware routing protocol for wireless sensor networks in agriculture precision. J. Sens. 2020, 2020, 9040395. [Google Scholar] [CrossRef]
  12. Sharma, S.; Guleria, K. Pneumonia Detection from Chest X-ray Images using Transfer Learning. In Proceedings of the 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 13–14 October 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1–6. [Google Scholar]
  13. Akin, E.; Korkmaz, T. Comparison of routing algorithms with static and dynamic link cost in software defined networking (SDN). IEEE Access 2019, 7, 148629–148644. [Google Scholar] [CrossRef]
  14. Binu, G.; Shajimohan, B. A novel heuristic based energy efficient routing strategy in wireless sensor network. Peer- Netw. Appl. 2020, 13, 1853–1871. [Google Scholar] [CrossRef]
  15. Gowri, S.; Pappa, C.K.; Tamilvizhi, T.; Nelson, L.; Surendran, R. Intelligent Analysis on Frameworks for Mobile App Development. In Proceedings of the 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 23–25 January 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1506–1512. [Google Scholar]
  16. Seyfollahi, A.; Taami, T.; Ghaffari, A. Towards developing a machine learning-metaheuristic-enhanced energy-sensitive routing framework for the internet of things. Microprocess. Microsyst. 2023, 96, 104747. [Google Scholar] [CrossRef]
  17. Yun, W.K.; Yoo, S.J. Q-learning-based data-aggregation-aware energy-efficient routing protocol for wireless sensor networks. IEEE Access 2021, 9, 10737–10750. [Google Scholar] [CrossRef]
  18. Daanoune, I.; Baghdad, A.; Ballouk, A. An enhanced energy-efficient routing protocol for wireless sensor network. Int. J. Electr. Comput. Eng. (2088–8708) 2020, 10, 5462–5469. [Google Scholar] [CrossRef]
  19. Liao, R.F.; Wen, H.; Wu, J.; Pan, F.; Xu, A.; Jiang, Y.; Xie, F.; Cao, M. Deep-learning-based physical layer authentication for industrial wireless sensor networks. Sensors 2019, 19, 2440. [Google Scholar] [CrossRef]
  20. Narayan, V.; Daniel, A.; Chaturvedi, P. E-FEERP: Enhanced Fuzzy-based Energy Efficient Routing Protocol for Wireless Sensor Network. Wirel. Pers. Commun. 2023, 1–28. [Google Scholar] [CrossRef]
  21. Gemeda, K.A.; Gianini, G.; Libsie, M. The effect of node selfishness on the performance of WSN cluster-based routing algorithms. In Proceedings of the AFRICON 2015, Addis Ababa, Ethiopia, 14–17 September 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 1–5. [Google Scholar]
  22. Gemeda, K.A.; Gianini, G.; Libsie, M. Collaborative packets forwarding to extend lifetime of multi-authority wireless sensor networks. In Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), Palladam, India, 10–11 February 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 513–519. [Google Scholar]
  23. Manshaei, M.H.; Zhu, Q.; Alpcan, T.; Bacşar, T.; Hubaux, J.P. Game theory meets network security and privacy. ACM Comput. Surv. (CSUR) 2013, 45, 25. [Google Scholar] [CrossRef]
  24. Gianini, G.; Damiani, E.; Mayer, T.R.; Coquil, D.; Kosch, H.; Brunie, L. Many-player inspection games in networked environments. In Proceedings of the 2013 7th IEEE International Conference on Digital Ecosystems and Technologies (DEST), Menlo Park, CA, USA, 24–26 July 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 1–6. [Google Scholar]
  25. Lena Cota, G.; Mokhtar, S.B.; Lawall, J.; Muller, G.; Gianini, G.; Damiani, E.; Brunie, L. A framework for the design configuration of accountable selfish-resilient Peer-to-Peer systems. In Proceedings of the 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), Montreal, QC, Canada, 28 September–1 October 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 276–285. [Google Scholar]
  26. Lena Cota, G.; Mokhtar, S.B.; Gianini, G.; Damiani, E.; Lawall, J.; Muller, G.; Brunie, L. Analysing Selfishness Flooding with SEINE. In Proceedings of the 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, CO, USA, 26–29 June 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 603–614. [Google Scholar]
  27. Lena Cota, G.; Mokhtar, S.B.; Gianini, G.; Damiani, E.; Lawall, J.; Muller, G.; Brunie, L. RACOON++: A semi-automatic framework for the selfishness-aware design of cooperative systems. IEEE Trans. Dependable Secur. Comput. 2017, 16, 635–650. [Google Scholar] [CrossRef]
  28. Gianini, G.; Mio, C.; Fossi, L.G.; Egyed-Zsigmon, E. A Watermark Inspection Game for IoT Settings. In Proceedings of the 2019 IEEE World Congress on Services (SERVICES), Milan, Italy, 8–13 July 2019; IEEE: Piscataway, NJ, USA, 2019; Volume 2642, pp. 29–34. [Google Scholar]
  29. Gianini, G.; Viola, F.; Lena-Cota, G.; Lin, J. Hybrid Inspector-Inspectee-Agent Games in Mobile Cloud Computing. In Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Alicante, Spain, 16–20 November 2020; pp. 95–100. [Google Scholar]
  30. Gemeda, K.A.; Gianini, G.; Libsie, M. An evolutionary cluster-game approach for Wireless Sensor Networks in non-collaborative settings. Pervasive Mob. Comput. 2017, 42, 209–225. [Google Scholar] [CrossRef]
  31. El Alami, H.; Najid, A. ECH: An enhanced clustering hierarchy approach to maximize lifetime of wireless sensor networks. IEEE Access 2019, 7, 107142–107153. [Google Scholar] [CrossRef]
  32. Yin, Y.; Li, Y.; Gao, H.; Liang, T.; Pan, Q. FGC: GCN based federated learning approach for trust industrial service recommendation. IEEE Trans. Ind. Inform. 2022, 19, 3240–3250. [Google Scholar] [CrossRef]
  33. Gao, H.; Huang, W.; Liu, T.; Yin, Y.; Li, Y. Ppo2: Location privacy-oriented task offloading to edge computing using reinforcement learning for intelligent autonomous transport systems. IEEE Trans. Intell. Transp. Syst. 2022. [Google Scholar] [CrossRef]
  34. Babbar, H.; Rani, S. Software-defined networking framework securing internet of things. In Integration of WSN and IoT for Smart Cities; Springer: Cham, Switzerland, 2020; pp. 1–14. [Google Scholar]
  35. Babbar, H.; Rani, S.; Islam, S.M.; Iyer, S. QoS based Security Architecture for Software-Defined Wireless Sensor Networking. In Proceedings of the 2021 6th International Conference on Innovative Technology in Intelligent System and Industrial Applications (CITISIA), Sydney, Australia, 24–26 November 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–5. [Google Scholar]
  36. Khalaf, O.I.; Abdulsahib, G.M. Energy efficient routing and reliable data transmission protocol in WSN. Int. J. Adv. Soft Comput. Appl. 2020, 12, 45–53. [Google Scholar]
  37. Lilhore, U.K.; Khalaf, O.I.; Simaiya, S.; Tavera Romero, C.A.; Abdulsahib, G.M.; Kumar, D. A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks. Int. J. Distrib. Sens. Netw. 2022, 18, 15501329221117118. [Google Scholar] [CrossRef]
  38. Elsmany, E.F.A.; Omar, M.A.; Wan, T.C.; Altahir, A.A. EESRA: Energy efficient scalable routing algorithm for wireless sensor networks. IEEE Access 2019, 7, 96974–96983. [Google Scholar] [CrossRef]
  39. Maheshwari, P.; Sharma, A.K.; Verma, K. Energy efficient cluster based routing protocol for WSN using butterfly optimization algorithm and ant colony optimization. Ad. Hoc. Netw. 2021, 110, 102317. [Google Scholar] [CrossRef]
  40. Xu, C.; Xiong, Z.; Zhao, G.; Yu, S. An energy-efficient region source routing protocol for lifetime maximization in WSN. IEEE Access 2019, 7, 135277–135289. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.