Author : Syed Mohd Ali 1
Date of Publication :11th November 2020
Abstract: Heterogeneous Wireless Sensor Network users are increasing quickly in virtually every field of the infrastructure that needs for use efficiently. In WSNs, clustering is a useful technique to expand that network's lifetime and to protect each node in wireless networks. With several secure and reliable optimizations, or secure local optimization, many real-world optimization issues arise. Because of the untrustworthy architecture in a local and global environment, these nodes face communication skills issues such as small range and high throughput, which are likely to limit wireless communications in WSNs, making it difficult for WSNs to function properly. Another issue is the security and privacy factor where multiple sensors are unable to prevent unauthorized access and malicious attacks which lead to breaches of security. To address communication capacity issues and stable sensor systems (SS), we proposed a new framework called the Secured Communication and Trust-based Protocol Model (SC-TBPM) that takes into account reliability, protection and responsiveness. This model uses a Whale Swarm secured clustering Algorithm (WSSC) that mainly focuses on trustworthy nodes as cluster heads (CHs) by considering security parameters such as residual energy (ER), node density (DN), and average cluster distance (ADC).
Reference :