0
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Aquila Optimized Fuzzy Deep Belief Network for Secure Data Transmission in WSN

, , &

REFERENCES

  • S. S. Mercy, J. M. Mathana, and J. S. Jasmine, “An energy-efficient optimal multi-dimensional location, key and trust management based secure routing protocol for wireless sensor network,” KSII Trans. Internet Inf. Syst., Vol. 15, no. 10, pp. 3834–57, 2021.
  • Y. Han, H. Hu, and Y. Guo, “Energy-aware and trust-based secure routing protocol for wireless sensor networks using adaptive genetic algorithm,” IEEE. Access., Vol. 10, pp. 11538–50, 2022. DOI: 10.1109/ACCESS.2022.3144015
  • S. Gnana Sophia, K. K. Thanammal, and S. S. Sujatha, “Secure storage of lung brain multi-modal medical images using DNA homomorphic encryption,” Int. J. Curr. Bio-Med. Eng., Vol. 01, no. 01, pp. 16–22, 2023.
  • B. Zhou, Q. Zhang, Q. Shi, Q. Yang, P. Yang, and Y. Yu, “Measuring web service security in the era of Internet of Things,” Comput. Electr. Eng., Vol. 66, pp. 305–15, 2018. DOI: 10.1016/j.compeleceng.2017.06.020
  • V. A. Memos, K. E. Psannis, Y. Ishibashi, B. G. Kim, and B. B. Gupta, “An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework,” Future Gener. Comput. Syst., Vol. 83, pp. 619–28, 2018. DOI: 10.1016/j.future.2017.04.039
  • J. R. F. Raj, K. Vijayalakshmi, S. K. Priya, and A. Appathurai, “Brain tumor segmentation based on kernel fuzzy c-means and penguin search optimization algorithm,” Signal. Image. Video. Process., Vol. 18, no. 2, pp. 1793–802, 2024. DOI: 10.1007/s11760-023-02849-9
  • Y. Nishikawa, et al. “Design of stable wireless sensor network for slope monitoring,” in 2018 IEEE Topical Conference on Wireless Sensors and Sensor Networks (WiSNet) IEEE, 2018, pp. 8–11.
  • P. S. Khot, and U. L. Naik, “Cellular automata-based optimised routing for secure data transmission in wireless sensor networks,” J. Exp. Theor. Artif. Intell., Vol. 34, no. 3, pp. 431–49, 2022. DOI: 10.1080/0952813X.2021.1882002
  • M. Khabiri, and A. Ghaffari, “Energy-aware clustering-based routing in wireless sensor networks using cuckoo optimization algorithm,” Wireless Pers. Commun., Vol. 98, no. 3, pp. 2473–95, 2018. DOI: 10.1007/s11277-017-4983-8
  • C. Lyu, X. Zhang, Z. Liu, and C. H. Chi, “Selective authentication based geographic opportunistic routing in wireless sensor networks for Internet of Things against DoS attacks,” IEEE. Access., Vol. 7, pp. 31068–82, 2019. DOI: 10.1109/ACCESS.2019.2902843
  • O. AlFarraj, A. AlZubi, and A. Tolba, “Trust-based neighbor selection using activation function for secure routing in wireless sensor networks,” J. Ambient Intell. Hum. Comput., 1–11, 2018.
  • P. Movva, and P. T. Rao, “Novel two-fold data aggregation and MAC scheduling to support energy efficient routing in wireless sensor network,” IEEE. Access., Vol. 7, pp. 1260–74, 2018. DOI: 10.1109/ACCESS.2018.2888484
  • M. Pavani, and P. T. Rao, “Adaptive PSO with optimised firefly algorithms for secure cluster-based routing in wireless sensor networks,” IET Wireless Sens. Syst., Vol. 9, no. 5, pp. 274–83, 2019. DOI: 10.1049/iet-wss.2018.5227
  • S. Dahiya, and P. K. Singh, “Optimized mobile sink-based grid coverage-aware sensor deployment and link quality-based routing in wireless sensor networks,” AEU Int. J. Electron. Commun., Vol. 89, pp. 191–6, 2018. DOI: 10.1016/j.aeue.2018.03.031
  • S. Prithi, and S. Sumathi, “Automata based hybrid PSO–GWO algorithm for secured energy efficient optimal routing in wireless sensor network,” Wireless Pers. Commun., Vol. 117, no. 2, pp. 545–59, 2021. DOI: 10.1007/s11277-020-07882-2
  • M. Amanullakhan, M. Usha, and S. Ramesh, “Intrusion detection architecture (IDA) in IOT based security system,” Int. J. Comput. Eng. Opt., Vol. 01, no. 01, pp. 33–42, 2023.
  • S. Tedeschi, J. Mehnen, N. Tapoglou, and R. Roy, “Secure IoT devices for the maintenance of machine tools,” Procedia CIRP, Vol. 59, pp. 150–5, 2017. DOI: 10.1016/j.procir.2016.10.002
  • D. Kalaiarasan, and A. Ahilan, “Quaternion keyed least square approximation for image encryption,” J. Intell. Fuzzy Syst., Vol. 43, no. 4, pp. 5221–36, 2022. DOI: 10.3233/JIFS-213600
  • W. Fang, W. Zhang, W. Chen, J. Liu, Y. Ni, and Y. Yang, “MSCR: Multidimensional secure clustered routing scheme in hierarchical wireless sensor networks,” EURASIP J. Wireless Commun. Netw., Vol. 2021, no. 1, pp. 1–20, 2021. DOI: 10.1186/s13638-020-01861-8
  • V. Kumar, N. Jayapandian, and P. Balasubramanie, “RETRACTED ARTICLE: Improving routing data security in wireless sensor network using clustering range indicators essentials in SMDSRNGs method,” Wireless Pers. Commun., Vol. 127, pp. 45, 2021.
  • A. R. Rajeswari, K. Kulothungan, S. Ganapathy, and A. Kannan, “Trusted energy aware cluster-based routing using fuzzy logic for WSN in IoT,” J. Intell. Fuzzy Syst., Vol. 40, no. 5, pp. 9197–211, 2021. DOI: 10.3233/JIFS-201633
  • S. Prithi, and S. Sumathi, “LD2FA-PSO: A novel learning dynamic deterministic finite automata with PSO algorithm for secured energy efficient routing in wireless sensor network,” Ad. Hoc. Netw., Vol. 97, pp. 102024, 2020. DOI: 10.1016/j.adhoc.2019.102024
  • W. Fang, W. Zhang, W. Yang, Z. Li, W. Gao, and Y. Yang, “Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks,” Digital Commun. Netw., Vol. 7, no. 4, pp. 470–8, 2021. DOI: 10.1016/j.dcan.2021.03.005
  • D. L. Reddy, C. G. Puttamadappa, and H. N. G. Suresh, “Hybrid optimization algorithm for security aware cluster head selection process to aid hierarchical routing in wireless sensor network,” IET Commun., Vol. 15, no. 12, pp. 1561–75, 2021. DOI: 10.1049/cmu2.12169
  • M. Naghibi, and H. Barati, “SHSDA: Secure hybrid structure data aggregation method in wireless sensor networks,” J. Ambient Intell. Hum. Comput., Vol. 12, no. 12, pp. 10769–88, 2021. DOI: 10.1007/s12652-020-02751-z
  • T. Khan, and K. Singh, “TASRP: A trust aware secure routing protocol for wireless sensor networks,” Int. J. Innovative Comput. Appl., Vol. 12, no. 2-3, pp. 108–22, 2021. DOI: 10.1504/IJICA.2021.113750
  • P. Saveetha, Y. H. Robinson, V. Shanmuganathan, S. Kadry, and Y. Nam, “Hybrid energy-based secured clustering technique for wireless sensor networks,” J. Internet Technol., Vol. 23, no. 1, pp. 21–31, 2022. DOI: 10.53106/160792642022012301003
  • V. Shankar, and S. A. Sirdeshpande. “Swarm optimization based secured data routing in wireless sensor network.”
  • M. A. Majid. “Energy-efficient adaptive clustering and routing protocol for expanding the life cycle of the IoT-based wireless sensor network,” in 2022 6th International Conference on Computing Methodologies and Communication (ICCMC), IEEE, 2022, pp. 328–36.
  • Y. H. Robinson, R. S. Krishnan, K. L. Narayanan, A. Sangeetha, I. Sakthidevi, and J. R. F. Raj. “Secured energy proficient and clustering methodology for wireless sensor networks,” in 2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), IEEE, 2022, pp. 1225–9.
  • H. El Alami, and A. Najid. “A new fuzzy clustering algorithm to enhance lifetime of wireless sensor networks,” in Proceedings of the Third International Afro-European Conference for Industrial Advancement—AECIA 2016. Springer International Publishing, 2018, pp. 68–76.
  • J. S. Lee, and C. L. Teng, “An enhanced hierarchical clustering approach for mobile sensor networks using fuzzy inference systems,” IEEE Internet Things J., Vol. 4, no. 4, pp. 1095–103, 2017. DOI: 10.1109/JIOT.2017.2711248
  • E. I. Nezha, and N. Abdellah, “Energy-aware clustering and efficient cluster head selection,” Int. J. Smart Sens. Intell. Syst., Vol. 14, no. 1, pp. 1–15, 2021.
  • M. Selvi, R. Logambigai, S. Ganapathy, L. Sai Ramesh, H. K. Nehemiah, and A. Kannan. “Fuzzy temporal approach for energy efficient routing in WSN,” in Proceedings of International Conference on Informatics and Analytics, ACM, Vol. 5, 2016, pp. 117.
  • K. Thangaramya, K. Kulothungan, R. Logambigai, M. Selvi, S. Ganapathy, and A. Kannan, “Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT,” Comput. Networks, Vol. 151, pp. 211–23, 2019. DOI: 10.1016/j.comnet.2019.01.024
  • K. Selvakumar, L. Sairamesh, and A. Kannan, “An intelligent energy aware secured algorithm for routing in wireless sensor networks,” Wireless Pers. Commun., Vol. 96, no. 3, pp. 4781–98, 2017. DOI: 10.1007/s11277-017-4417-7
  • R. Dass, et al., “A cluster-based energy-efficient secure optimal path-routing protocol for wireless body-area sensor networks,” Sensors, Vol. 23, no. 14, pp. 6274, 2023. DOI: 10.3390/s23146274
  • S. Viswanathan, and A. Kannan, “Elliptic key cryptography with beta gamma functions for secure routing in wireless sensor networks,” Wireless Netw., Vol. 25, no. 8, pp. 4903–14, 2019. DOI: 10.1007/s11276-019-02073-9

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.