AHSWN Home • Issue Contents • Forthcoming Papers

WSHO: Energy and Trust Aware Protocol Using Whale Spotted Hyena Optimization Algorithm in IoT Integrated WSN
Balaso Jagdale, Shounak Sugave and Yogesh Kulkarni

Wireless Sensor Network (WSN) achieved great attention in different domains due to the easy maintenance, scalability characteristics, and self-configuration. It is arranged with small-sized sensors that are interacted with the Internet of Things (IoT) to observe and records physical environmental conditions. Due to the dynamic nature and less resources of sensor nodes, searching for the optimal and secure routing path results in a challenging task. Establishing a secure communication path between the source and the destination node is more significant in the network scenario to accomplish the process of data routing. Accordingly, the failure of nodes along with the routing path result in path failure and it results in data loss. Therefore, an effective data routing mechanism is developed in this research to ensure the communication process to be more effective by employing the proposed Whale Spotted Hyena Optimization (WSHO) algorithm. The proposed WSHO is derived by the incorporation of the Whale Optimization Algorithm (WOA) and Spotted Hyena Optimizer (SHO), respectively. Accordingly, the process of data routing is accomplished by considering factors, like energy dissipation, distance, trust, and delay. The data security process is employed to secure the communicated data through the privacy preservation model with different security factors. Moreover, the proposed method achieved higher performance in terms of energy and trust 0.4432J, and 0.5124, respectively.

Keywords: Data routing, wireless sensor network (WSN), data security, trust model, Whale Optimization Algorithm (WOA)

Full Text (IP)