ABSTRACT
This paper analyzes the trust problem in computer wireless sensor networks, WSNs. This study presents a reliable routing method in WSNs. Trust is an essential question although endeavors to prevent attacks on the networks have been made, the problem has not been satisfactorily resolved. The novelties of this paper are its improvement of the FETRP protocol in WSNs while considering recent advancements in related technologies like the Internet of Things (IoT) and its applicability in micro and macro-scale systems. Some malicious nodes deceive systems with incompatible behaviors, but this protocol detects them. This paper introduces fuzzy energy and a reliable routing protocol, FETRP, to solve problems. The protocol is upon fuzzy cluster development and has been designed to manage reliable routing of information transmission.
Disclosure statement
No potential conflict of interest was reported by the author(s).
Data availability statement
Data were derived from public domain resources.
Nomenclature
AES | = | Advanced encryption standard |
AODV | = | Ad hoc On-Demand Distance Vector technology |
b | = | Bits |
BTRES | = | Beta-based trust and a reputation evaluation system |
D0 | = | Direct evaluation |
ECC | = | Elliptical curve cryptography |
FETRP | = | Family-based efficient trust routing protocol |
FV | = | Flow volume |
ID0 | = | Indirect evaluation |
IDS | = | Intrusion Detection System |
IoT | = | Internet of things |
IRSA | = | Improved Rivest Shamir Adleman |
ISEC | = | Intelligent and secure edge-enabled computing |
K and n | = | Two neighboring sensors |
KH-AES | = | Krill Herd- advanced encryption standard |
LAN | = | Local area network |
OPNET | = | Optimized network engineering tools |
PD | = | Path nodes’ delay |
PE | = | Packets of route energy |
PT | = | Packets of route trust |
RHT | = | Recommended high-trust value |
RS | = | Route selection |
s | = | Seconds |
TN | = | Trust node |
WSN | = | Wireless sensor networks |