Abstract
Wireless sensor network (WSN) is used to collect and monitor the data from various environments, such as temperature, pressure, humidity and speed. After that, the collected data is transferred to the base station using sink nodes. While transferring this information, the nodes are attacked by malicious attacks that lead to black hole problem, which can also affects the efficiency, packet delivery ratio and throughput in the network. The previous works does not provide the sufficient result to overcome the above problem. Therefore, in this manuscript, a trusted distributed routing scheme for WSN Using Block chain and Jelly Fish Search Optimizer algorithm (JSOA) based Deep Generative Adversarial Neural Network (DGANN) method is proposed to overcome the above problem. Here, the Block chain routing protocol is used to detect, store and transfer the packets from source to destination in trusted distribution or efficient manner. The network is used to improve the security and efficiency of the DGANN method. The weight parameters of the DGANN are optimized by JSOA. The objective function is to maximize the efficiency of the network by minimizing the black hole problem and to increase the packet delivery ratio and the throughput by reducing the delay and attackers. The simulation process is carried out in MATLAB. From the simulation, the proposed approach attains better performance of higher average packet delivery ratio 25.13%, higher network lifetime 34.56%, higher throughput 27.6%, higher energy efficiency 37.44%, lower delay 18.6%, lower drop 13.56%, lower packet overhead 23.6% when compared with the existing approaches, like multidimensional scaling-map (MDS-MAP), trust aware routing protocol through multiple attributes (TRPM), dynamic rate aware classified key distributional secure routing (DRCKDS) algorithm for routing on WSNs respectively.








Similar content being viewed by others
Data Availability
Data sharing is not apply to this article because no new data were created in this study.
References
AlFarraj, O., AlZubi, A., & Tolba, A. (2018). Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. Journal of Ambient Intelligence AND Humanized Computing. https://doi.org/10.1007/s12652-018-0885-1
Yang, T., Xiangyang, X., Peng, L., Tonghui, L., & Leina, P. (2018). A secure routing of wireless sensor networks based on trust evaluation model. Procedia Computer Science, 131, 1156–1163.
Kumar, A., Varadarajan, V., Kumar, A., Dadheech, P., Choudhary, S., Kumar, V., et al. (2021). Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm. Microprocessors and Microsystems, 80, 103352.
Mythili, V., Suresh, A., Devasagayam, M., & Dhanasekaran, R. (2019). SEAT-DSR: Spatial and energy aware trusted dynamic distance source routing algorithm for secure data communications in wireless sensor networks. Cognitive Systems Research, 58, 143–155.
Revanesh, M., & Sridhar, V. (2021). A trusted distributed routing scheme for wireless sensor networks using blockchain and meta‐heuristics‐based deep learning technique. Transactions on Emerging Telecommunications Technologies. https://doi.org/10.1002/ett.4259
Jhaveri, R., Patel, N., Zhong, Y., & Sangaiah, A. (2018). Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT. IEEE Access, 6, 20085–20103.
Hung, L., Leu, F., Tsai, K., & Ko, C. (2020). Energy-efficient cooperative routing scheme for heterogeneous wireless sensor networks. IEEE Access, 8, 56321–56332.
Faheem, M., Butt, R., Raza, B., Alquhayz, H., Ashraf, M., Raza, S., & Ngadi, M. (2020). FFRP: Dynamic firefly mating optimization inspired energy efficient routing protocol for internet of underwater wireless sensor networks. IEEE Access, 8, 39587–39604.
Sajwan, M., Gosain, D., & Sharma, A. (2018). Hybrid energy-efficient multi-path routing for wireless sensor networks. Computers & Electrical Engineering, 67, 96–113.
Qadir, J., Ullah, U., Sainz-De-Abajo, B., Zapirain, B., Marques, G., & de la Torre Diez, I. (2020). Energy-aware and reliability-based localization-free cooperative acoustic wireless sensor networks. IEEE Access, 8, 121366–121384.
Samudrala, H. K., Qadeer, S., Azeemuddin, S., & Khan, Z. (2018, December). Parallel and pipelined VLSI implementation of the new radix-2 DIT FFT algorithm. In 2018 IEEE international symposium on smart electronic systems (iSES)(formerly iNiS) (pp. 21–26). IEEE.
Mythili, S., Thiyagarajah, K., Rajesh, P., & Shajin, F. H. (2020). Ideal position and size selection of unified power flow controllers (UPFCs) to upgrade the dynamic stability of systems: An antlion optimiser and invasive weed optimisation algorithm. HKIE Transactions, 27(1), 25–37.
Rajesh, P., & Shajin, F. (2020). A multi-objective hybrid algorithm for planning electrical distribution system. European Journal of Electrical Engineering, 22(4–5), 224–509.
Shajin, F. H., Rajesh, P. (2020). Trusted secure geographic routing protocol: Outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol. International Journal of Pervasive Computing and Communications. https://doi.org/10.1108/IJPCC-09-2020-0136
Thota, M. K., Shajin, F. H., & Rajesh, P. (2020). Survey on software defect prediction techniques. International Journal of Applied Science and Engineering, 17(4), 331–344.
Iwendi, C., Uddin, M., Ansere, J., Nkurunziza, P., Anajemba, J., & Bashir, A. (2018). On detection of Sybil attack in large-scale VANETs using spider-monkey technique. IEEE Access, 6, 47258–47267.
Liu, X., Xiong, N., Zhang, N., Liu, A., Shen, H., & Huang, C. (2018). A trust with abstract information verified routing scheme for cyber-physical network. IEEE Access, 6, 3882–3898.
Amjad, M., Afzal, M., Umer, T., & Kim, B. (2017). QoS-aware and heterogeneously clustered routing protocol for wireless sensor networks. IEEE Access, 5, 10250–10262.
Tilwari, V., Maheswar, R., Jayarajan, P., Sundararajan, T., Hindia, M., Dimyati, K., et al. (2020). MCLMR: A multicriteria based multipath routing in the mobile ad hoc networks. Wireless Personal Communications, 112(4), 2461–2483.
Bhoi, S., Sahu, P., Singh, M., Khilar, P., Sahoo, R., & Swain, R. (2020). Local traffic aware unicast routing scheme for connected car system. IEEE Transactions On Intelligent Transportation Systems, 21(6), 2360–2375.
Chicarino, V., Albuquerque, C., Jesus, E., & Rocha, A. (2020). On the detection of selfish mining and stalker attacks in blockchain networks. Annals Of Telecommunications, 75(3–4), 143–152.
Kerrache, C., Lakas, A., Lagraa, N., & Barka, E. (2018). UAV-assisted technique for the detection of malicious and selfish nodes in VANETs. Vehicular Communications, 11, 1–11.
Li, J. (2018). Data transmission scheme considering node failure for blockchain. Wireless Personal Communications, 103(1), 179–194.
Yang, H., Wang, M., Yu, Z., Zhao, X., & Li, A. (2020). GANcon: Protein contact map prediction with deep generative adversarial network. IEEE Access, 8, 80899–80907.
Chou, J., & Truong, D. (2021). A novel metaheuristic optimizer inspired by behavior of jellyfish in ocean. Applied Mathematics And Computation, 389, 125535.
Beheshtiasl, A., & Ghaffari, A. (2019). Secure and trust-aware routing scheme in wireless sensor networks. Wireless Personal Communications, 107(4), 1799–1814.
Sun, B., & Li, D. (2018). A comprehensive trust-aware routing protocol with multi-attributes for WSNs. IEEE Access, 6, 4725–4741.
Sathya, S., & Umadevi, K. (2020). An optimized distributed secure routing protocol using dynamic rate aware classified key for improving network security in wireless sensor network. Journal of Ambient Intelligence And Humanized Computing, 12(7), 7165–7171.
Chithaluru, P., Tiwari, R., & Kumar, K. (2019). AREOR–Adaptive ranking based energy efficient opportunistic routing scheme in wireless sensor network. Computer Networks, 162, 106863.
Raghav, R., Thirugnansambandam, K., & Anguraj, D. (2020). Beeware routing scheme for detecting network layer attacks in wireless sensor networks. Wireless Personal Communications, 112(4), 2439–2459.
Revanesh, M., & Sridhar, V. (2021). A trusted distributed routing scheme for wireless sensor networks using blockchain and meta-heuristics-based deep learning technique. Transactions on Emerging Telecommunications Technologies, 32(9), e4259.
Abd El-Moghith, I. A., & Darwish, S. M. (2021). Towards designing a trusted routing scheme in wireless sensor networks: A new deep blockchain approach. IEEE Access, 9, 103822–103834.
Adil, M., Khan, R., Ali, J., Roh, B. H., Ta, Q. T. H., & Almaiah, M. A. (2020). An energy proficient load balancing routing scheme for wireless sensor networks to maximize their lifespan in an operational environment. IEEE Access, 8, 163209–163224.
Funding
This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Authors declare that they have no conflict of interest.
Ethical Approval
This article does not have any studies with human participants performed by any authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Raja, L., Periasamy, P.S. A Trusted Distributed Routing Scheme for Wireless Sensor Networks Using Block Chain and Jelly Fish Search Optimizer Based Deep Generative Adversarial Neural Network (Deep-GANN) Technique. Wireless Pers Commun 126, 1101–1128 (2022). https://doi.org/10.1007/s11277-022-09784-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-09784-x