Trust-based Routing Optimization using Learning Automata in Wireless Sensor Network

سال انتشار: 1400
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 237

فایل این مقاله در 12 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_MJEE-15-4_007

تاریخ نمایه سازی: 23 بهمن 1401

چکیده مقاله:

The use of wireless sensor networks is becoming more and more important due to the COVID-۱۹ pandemic and the living conditions of human beings today. The three main goals in designing this type of network are to reduce energy consumption, choose the shortest route and choose a reliable route for data transmission. In this paper, these three goals are considered in routing. Due to the fact that this type of network is exposed to many attacks, identifying malicious nodes and removing them creates security in this type of network. This paper presents an energy-aware and trusted-based routing method using learning automata and an evaluation function. Learning automata identifies trusted nodes (to send data) and malicious nodes using the corresponding evaluation function. The evaluation function considers the residual energy, the node's trust and the number of hops to the sink parameters. Thus, the data reaches its destination in a safe and reliable way. The evaluation results of the proposed method show an improvement in the performance of this method compared to other relevant methods.

نویسندگان

Maryam Hajiee

Department of Computer Engineering, Arak Branch, Islamic Azad University, Arak, Iran

Mehdi Fartash

Department of Computer Engineering, Arak Branch, Islamic Azad University, Arak, Iran

Nafiseh Osati Eraghi

Department of Computer Engineering, Arak Branch, Islamic Azad University, Arak, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Bhuiyan, M.Z.A., et al., “Dependable structural health monitoring using wireless ...
  • Alam, M.M., D.B. Arbia, and E.B. “Hamida, Wearable wireless sensor ...
  • Ojha, T., S. Misra, and N.S. Raghuwanshi,” Wireless sensor networks ...
  • Gomes, R.D., et al., “Application of Wireless Sensor Networks Technology ...
  • Kuorilehto, M., M. Hännikäinen, and T.D. Hämäläinen, “A survey of ...
  • Almudevar, A., A. Leibovici, and Horwitz. “Electronic motion monitoring in ...
  • Nurmi, P., et al.”A Framework for Distributed Activity Recognition in ...
  • Jafari, R., et al. “Wireless sensor networks for health monitoring,” ...
  • Butun, I., S.D. Morgera, and R. Sankar, “A survey of ...
  • Shaikh, R.A., et al. “LSec: lightweight security protocol for distributed ...
  • Perrig, A., and et al., SPINS: “Security protocols for sensor ...
  • Karlof, C. “Secure routing in sensor networks: Attacks and countermeasures,” ...
  • Boukerch, A., L. Xu, and K. El-Khatib, “Trust-based security for ...
  • Lacuesta, R., et al., “A secure protocol for spontaneous wireless ...
  • Liu, Y., C.-x. Liu, and Q.-A. Zeng, “Improved trust management ...
  • Anita, X., M.A. Bhagyaveni, and J.M.L.” Manickam, Collaborative lightweight trust ...
  • Rajeshkumar, G. and K. Valluvan, “An energy aware trust based ...
  • Narendra, K.S. and M.A. Thathachar, “Learning automata-a survey,” IEEE Transactions ...
  • Ganeriwal, S., L.K. Balzano, and M.B. Srivastava, “Reputation-based framework for ...
  • Eissa, T., et al., “Trust-based routing mechanism in MANET: Design ...
  • Song, J., et al. “Dynamic trust evaluation of wireless sensor ...
  • Ahmed, A., et al., “A trust aware routing protocol for ...
  • Ahmed, A., et al., “A secure routing protocol with trust ...
  • Ahmed, A., et al., “Energy-aware and secure routing with trust ...
  • Marchang, N. and R. Datta, “Light-weight trust-based routing protocol for ...
  • Channa, M.I. and K.M. Ahmed, “A Reliable Routing Scheme for ...
  • Fang, W., et al., “BTRES: Beta-based Trust and Reputation Evaluation ...
  • Li, Y. and L.E. Parker. “Intruder detection using a wireless ...
  • Jiang, J., et al., “An efficient distributed trust model for ...
  • Marzi, H. and M. Li, “An enhanced bio-inspired trust and ...
  • Chowdhury, A.R., S. Tripathy, and S. Nandi. “Securing wireless sensor ...
  • Junnarkar, A. and A. Bagwan. “Novel Quality of Service (QOS) ...
  • Misra, S., et al.,” LAID: a learning automata‐based scheme for ...
  • Das, S.K., P.S. Chatterjee, and M. Roy, “Detecting and Punishing ...
  • Prithi, S. and S. Sumathi, “LD۲FA-PSO: A novel Learning Dynamic ...
  • Zhan, G., W. Shi, and J. Deng, “Design and implementation ...
  • Pirzada, A.A. and C. McDonald. “Trusted greedy perimeter stateless routing,” ...
  • Narendra, K.S. and M.A. Thathachar, ”Learning automata: an introduction,”, Courier ...
  • Misra, S., P.V. Krishna, and K.I. Abraham, “A simple learning ...
  • نمایش کامل مراجع