Secure-Energy Efficient Bio-Inspired Clustering and Deep Learning-Based Routing Using Blockchain for Edge Assisted WSN Environment

K. H. Vijayendra Prasad,Sasikumar Periyasamy

IEEE ACCESS(2023)

引用 0|浏览0
暂无评分
摘要
In recent days, the usage of data transmission has increased in Wireless Sensor Network (WSN) environments due to its dynamic nature. However, WSNs face many issues during data transmission, such as less energy efficiency, less security, and less network lifetime. Here, in this research it presents secure and energy-efficient clustering and routing techniques for an edge-assisted WSN environment to address these problems. The proposed work includes four major processes: Quad tree-based network construction, energy-efficient clustering, RL-based duty cycling, and secure multipath routing. This work constructs the network based on a quad-tree structure to increase network management performance and reduce complexity. After network construction, authentication of sensors is performed by considering ID and location using the Lightweight Encryption Algorithm (LEA), which provides high security by eliminating illegitimate sensor nodes. Then, this research model performs clustering using Tasmanian Devil Optimization (TDO), which selects optimal CH and performs clustering. In contrast, the CH selection and clustering are performed dynamically by considering time and event metrics, which increases communication efficiency and reduces energy depletion. To reduce energy consumption, This research model performs duty cycling using the Improved Twin Delayed Deep Deterministic Policy Gradient (ITD3) algorithm, increasing the network lifetime. Finally, A secure multipath routing is performed using a game theory-based Generative Adversarial Network (GTGAN). During routing, GTGAN ranks the selected multipath based on their hop counts. The highest-ranked paths are chosen for transmitting an emergency message, and medium-ranked paths are selected for non-emergency message transmission, which reduces data loss due to energy depletion. Here, all the transactions are stored on the blockchain for increased security. The NS-3.26 network simulator conducts the simulation of this research, and the performances are evaluated based on various performance metrics, proving that the proposed work achieves superior performance compared to existing works.
更多
查看译文
关键词
WSN,Quad tree-based network construction,clustering,multipath routing,scheduling
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要