Optimizing Data Survivability in Unattended Wireless Sensor Networks: A Machine Learning Approach to Cluster Head Selection and Hybrid Homomorphic Encryption

Haritha K Sivaraman, Rangaiah L

Abstract


The research relies on machine learning-based Cluster Head (CH) selection and optimised Attribute-Based Encryption (ABE) with Homomorphic Encryption to improve data survivability in Unattended Wireless Sensor Networks (UWSNs). Integrating blockchain technology would enable tamper-proof data storage and provenance. The suggested method uses machine learning techniques like Deep Q-Networks (DQNs) or other models for intelligent and adaptive CH selection in UWSNs. Dynamically selecting CHs takes into account energy efficiency, network coverage, communication dependability, and node characteristics. The second part protects data using optimised Attribute-Based Encryption (ABE) and Homomorphic Encryption. ABE offers fine-grained attribute-based access control to restrict data access to authorised entities. Secure processing of encrypted data using homomorphic encryption protects privacy and integrity. These encryption algorithms are optimised to balance security and computational performance for efficient data processing and transmission while guaranteeing data privacy and integrity. Blockchain technology is suggested for tamper-proof data storage and provenance. To optimise the suggested solution's performance, the study uses the Seagull Optimisation Algorithm (SOA) and the Whale Optimisation Algorithm (WOA). These algorithms fine-tune system parameters, optimise CH selection, and boost UWSN performance. This holistic strategy uses machine learning-based CH selection, optimised ABE with Homomorphic Encryption, and blockchain technology for tamperproof data storage and provenance to improve UWSN data survival. Optimisation algorithms boost the solution's efficacy and efficiency, protecting UWSN data, latency, and energy usage.

References


X. Fu, P. Pace, G. Aloi, W. Li, and G. Fortino, “Toward robust and energy-efficient clustering wireless sensor networks: A double-stage scale-free topology evolution model,” Computer Networks, vol. 200, p. 108521, 2021.

X. Fu, P. Pace, G. Aloi, W. Li, and G. Fortino, “Toward robust and energy-efficient clustering wireless sensor networks: A double-stage scale-free topology evolution model,” Computer Networks, vol. 200, p. 108521, 2021.

[1] Q. Liu et al., “Cluster-based flow control in hybrid software-defined wireless sensor networks,” Computer Networks, vol. 187, p. 107788, 2021.

S. P. Singh and S. C. Sharma, “A PSO based improved localization algorithm for wireless sensor network,” Wireless Personal Communications, vol. 98, pp. 487–503, 2018.

B. Bhushan and G. Sahoo, “Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks,” Wireless Personal Communications, vol. 98, pp. 2037–2077, 2018.

S. Arjunan and S. Pothula, “A survey on unequal clustering protocols in wireless sensor networks,” Journal of King Saud University-Computer and Information Sciences, vol. 31, no. 3, pp. 304–317, 2019.

M. Elappila, S. Chinara, and D. R. Parhi, “Survivable path routing in WSN for IoT applications,” Pervasive and Mobile Computing, vol. 43, pp. 49–63, 2018.

V. Vashishth, A. Chhabra, A. Khanna, D. K. Sharma, and J. Singh, “An energy efficient routing protocol for wireless Internet-of-Things sensor networks,” 2018, doi: arXiv:1808.01039

A. M. Sadri, S. Hasan, S. V. Ukkusuri, and M. Cebrian, “Exploring network properties of social media interactions and activities during Hurricane Sandy,” Transportation research interdisciplinary perspectives, vol. 6, p. 100143, 2020.

J. C. Knight and K. J. Sullivan, “On the definition of survivability,” 2000.

D. Chen, S. Garg, and K. S. Trivedi, “Network survivability performance evaluation: A quantitative approach with applications in wireless ad-hoc networks,” Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, pp. 61–68, Sep. 2002.

P. Zhang, H. Yao, and Y. Liu, “Virtual network embedding based on computing, network, and storage resource constraints,” IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3298–3304, 2017.

S. Ezdiani, I. S. Acharyya, S. Sivakumar, and A. Al-Anbuky, “Wireless sensor network softwarization: Towards WSN adaptive QoS,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1517–1527, 2017.

S. Guha and S. Khuller, “Approximation algorithms for connected dominating sets,” Algorithmica, vol. 20, pp. 374–387, 1998.

K. Islam, S. G. Akl, and H. Meijer, “Maximizing the lifetime of wireless sensor networks through domatic partition,” 2009 IEEE 34th Conference on Local Computer Networks, pp. 436–442, Oct. 2009.

Z. Yang and K. L. Yeung, “SDN candidate selection in hybrid IP/SDN networks for single link failure protection,” IEEE/ACM Transactions on Networking, vol. 28, no. 1, pp. 312–321, 2020.

S. Li, “Efficient multi-path protocol for wireless sensor networks,” International journal of wireless & mobile networks (IJWMN), 2010.

J. S. Raj and A. Basar, “QoS optimization of energy efficient routing in IoT wireless sensor networks,” Journal of ISMAC, vol. 1, no. 01, pp. 12–23, 2019.

S. Jannu and P. K. Jana, “A grid based clustering and routing algorithm for solving hot spot problem in wireless sensor networks,” Wireless Networks, vol. 22, pp. 1901– 916, 2016.

S. Smys and R. Bestak, “Introduction to the Special Issue on Inventive Network Structures for Next Generation Wireless Personal Systems,” Wireless Personal Communications, vol. 90, pp. 421–422, 2016.

Q. Fan, J. Chen, L. J. Deborah, and M. Luo, “A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain,” Journal of Systems Architecture, vol. 117, p. 102112, 2021.

S. Smys, “Energy-aware security routing protocol for WSN in big-data applications,” Journal of ISMAC, vol. 1, no. 01, pp. 38–55, 2019.

M. F. Çorapsız, “Lifetime maximization of wireless sensor networks while ensuring intruder detection,” Soft Computing, vol. 28, no. 5, pp. 4197–4215, 2024.

D. Sivaganesan, “Efficient Routing Protocol with Collision Avoidance in Vehicular Networks,” Journal of Ubiquitous Computing and Communication Technologies (UCCT), vol. 1, no. 02, pp. 76–86, 2019.

P. Wu, “Research on Performance Improvement of Wireless Sensor Networks Based on OPM Algorithm,” Open Access Library Journal, vol. 11, no. 7, pp. 1–12, 2024.


Full Text: PDF

Refbacks

  • There are currently no refbacks.


 

Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN 2089-3272

Creative Commons Licence

This work is licensed under a Creative Commons Attribution 4.0 International License.

web analytics
View IJEEI Stats