scispace - formally typeset
Search or ask a question
Author

M. Selvi

Other affiliations: Anna University
Bio: M. Selvi is an academic researcher from VIT University. The author has contributed to research in topics: Wireless sensor network & Intrusion detection system. The author has an hindex of 9, co-authored 22 publications receiving 342 citations. Previous affiliations of M. Selvi include Anna University.

Papers
More filters
Journal ArticleDOI
TL;DR: From the experiments conducted in this research work using the proposed model, it is proved that the proposed routing algorithm provided better network performance in terms of the metrics namely energy utilization, packet delivery ratio, delay and network lifetime.

243 citations

Journal ArticleDOI
TL;DR: A novel feature selection algorithm, which selects an optimal number of features from the data set and an intelligent fuzzy temporal decision tree algorithm integrated with convolution neural networks to detect the intruders effectively are proposed.
Abstract: Intrusion detection systems assume a noteworthy job in the provision of security in wireless Sensor networks. The existing intrusion detection systems focus only on the detection of the known types of attacks. However, it neglects to recognise the new types of attacks, which are introduced by malicious users leading to vulnerability and information loss in the network. In order to address this challenge, a new intrusion detection system, which detects the known and unknown types of attacks using an intelligent decision tree classification algorithm, has been proposed. For this purpose, a novel feature selection algorithm named dynamic recursive feature selection algorithm, which selects an optimal number of features from the data set is proposed. In addition, an intelligent fuzzy temporal decision tree algorithm is also proposed by extending the decision tree algorithm and integrated with convolution neural networks to detect the intruders effectively. The experimental analysis carried out using KDD cup data set and network trace data set demonstrates the effectiveness of this proposed approach. It proved that the false positive rate, energy consumption, and delay are reduced in the proposed work. In addition, the proposed system increases the network performance through increased packet delivery ratio.

92 citations

Journal ArticleDOI
TL;DR: From the experiments conducted, it is proved that the proposed trust based routing algorithm achieves significant performance improvement over the existing schemes in terms of security, energy efficiency and packet delivery ratio.
Abstract: Security is an important phenomena for energy conservation in wireless sensor networks (WSN). Moreover, the management of trust in the WSN is a challenging task since trust is used when collaboration is critical to achieve reliable communication. In a military application using WSN, it is often necessary to communicate secret information such as military operation urgently. However, the existing routing algorithms do not consider security in the routing process. Moreover, since security is an important aspect in WSN, it is necessary to consider the security aspects in routing algorithms. Different approaches for providing security are trust management, intrusion detection, firewalls and key management are considered in the literature. Among them, trust management can provide enhanced security when it is compared with other security methods. Therefore, a new secure routing algorithm called energy aware trust based secure routing algorithm is proposed in this paper where the trust score evaluation is used to detect the malicious users effectively in WSN and spatio-temporal constraints are used with decision tree algorithm for selecting the best route. From the experiments conducted, it is proved that the proposed trust based routing algorithm achieves significant performance improvement over the existing schemes in terms of security, energy efficiency and packet delivery ratio.

83 citations

Journal ArticleDOI
TL;DR: A new delay constrained energy efficient routing technique is proposed for performing effective routing in WSNs and increases the throughput, energy efficiency, link quality and scalability, and reduces the delay and energy consumption.
Abstract: In wireless sensor networks (WSN), the nodes are used to collect and gather the data from different environments. Hence, the network consumes more energy which is the main and challenging issue in WSNs. Since the sensor is operating under battery, recharging is impossible and hence the lifetime of each sensor is an important issue. Therefore, it is necessary to introduce new and efficient techniques to extend the network lifetime. In this paper, a new delay constrained energy efficient routing technique is proposed for performing effective routing in WSNs. This approach introduces a delay constraint based reliable routing approach which reduces the energy consumption by constructing efficient clusters without increasing the end-to-end delay. Moreover, the proposed technique called the rule based clustering for routing model provides better performance in terms of network lifetime than the other existing techniques since they consume more energy during the formation of clusters and finding the shortest path. Moreover, additional overhead on the cluster head selection is tackled also using rules in this proposed model in an efficient manner by building balanced clusters. The main advantage of the proposed approach is that it extends the lifetime of the network and increases the throughput, energy efficiency, link quality and scalability. The experimental verification of this technique has been carried out using MATLAB simulations and proved that this model increases the packet delivery rate, network performance and reduces the delay and energy consumption.

44 citations

Journal ArticleDOI
01 Nov 2020
TL;DR: It is proved through experiments that the proposed secure routing algorithm and the outlier detection algorithm are able to perform secured and reliable routing through genuine cluster head nodes more effectively and provide improved quality of service with respect to the reliability of communication, packet delivery ratio, reduction in end-to-end delay and reduced energy consumption.
Abstract: In wireless sensor networks (WSNs), energy optimization and the provision of security are the major design challenges. Since the wireless sensor devices are energy constrained, the issue of high energy consumption by the malicious nodes must be addressed well in order to enhance the network performance by making increased network lifetime, reduced energy consumption and delay. In the past, many researchers worked in the provision of new techniques for providing improved security to WSN in order to enhance the reliability in the routing process. However, most of the existing routing techniques are not able to achieve the required security through the use of intelligent techniques for safeguarding the sensor nodes from malicious attacks. In order to address these problems, a new fuzzy temporal clustering-based secured communication model with trust analysis and outlier detection has been developed in this research work. For this purpose, a new fuzzy temporal rule-based cluster-based routing algorithm with trust modelling and outlier detection for monitoring the nodes participating in the communication has been proposed. In addition, a fuzzy temporal rule- and distance-based outlier detection algorithm is also proposed in this paper for distinguishing the malicious nodes from other nodes within each cluster of the network and has been used in the secured routing algorithm. The proposed secure routing algorithm uses the temporal reasoning tasks of explanation-based learning and prediction as well as spatial constraints for making efficient routing decisions through the application of trust and key management techniques for performing effective authentication of nodes and thereby isolating the malicious nodes from communication through outlier detection. By applying these two proposed algorithms for communication in the proposed work, it is proved through experiments that the proposed secure routing algorithm and the outlier detection algorithm are able to perform secured and reliable routing through genuine cluster head nodes more effectively. Moreover, these two algorithms provide improved quality of service with respect to the reliability of communication, packet delivery ratio, reduction in end-to-end delay and reduced energy consumption.

40 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The main outcomes of the review introductory article contributed to the better understanding of current technological progress in IoT application areas as well as the environmental implications linked with the increased application of IoT products.

297 citations

Journal ArticleDOI
TL;DR: From the experiments conducted in this research work using the proposed model, it is proved that the proposed routing algorithm provided better network performance in terms of the metrics namely energy utilization, packet delivery ratio, delay and network lifetime.

243 citations

Journal ArticleDOI
TL;DR: The proposed work makes use of a hybrid metaheuristic algorithm, namely, Whale Optimization Algorithm with Simulated Annealing with WOA, and is compared with several state‐of‐the‐art optimization algorithms like Artificial Bee Colony algorithm, Genetic Algorithm, Adaptive Gravitational Search algorithm, WOA.
Abstract: © 2020 John Wiley & Sons, Ltd. Recently Internet of Things (IoT) is being used in several fields like smart city, agriculture, weather forecasting, smart grids, waste management, etc. Even though IoT has huge potential in several applications, there are some areas for improvement. In the current work, we have concentrated on minimizing the energy consumption of sensors in the IoT network that will lead to an increase in the network lifetime. In this work, to optimize the energy consumption, most appropriate Cluster Head (CH) is chosen in the IoT network. The proposed work makes use of a hybrid metaheuristic algorithm, namely, Whale Optimization Algorithm (WOA) with Simulated Annealing (SA). To select the optimal CH in the clusters of IoT network, several performance metrics such as the number of alive nodes, load, temperature, residual energy, cost function have been used. The proposed approach is then compared with several state-of-the-art optimization algorithms like Artificial Bee Colony algorithm, Genetic Algorithm, Adaptive Gravitational Search algorithm, WOA. The results prove the superiority of the proposed hybrid approach over existing approaches.

135 citations

Journal ArticleDOI
TL;DR: An improved cuckoo search-based energy balanced node clustering protocol which uses a novel objective function for uniform distribution of cluster heads is proposed which shows significant improvement over the state-of-art protocols.

128 citations

Journal ArticleDOI
TL;DR: A new hybrid algorithm is proposed that hybridizes the concept of dragon fly and firefly algorithm algorithms, termed fire fly replaced position update in dragonfly, to develop a new clustering model with optimal cluster head selection by considering four major criteria like energy, delay, distance, and security.
Abstract: Energy efficiency has become a primary issue in wireless sensor networks (WSN). The sensor networks are powered by battery and thus they turn out to be dead after a particular interval. Hence, enhancing the data dissipation in energy efficient manner remains to be more challenging for increasing the life span of sensor devices. It has been already proved that the clustering method could improve or enhance the life span of WSNs. In the clustering model, the selection of cluster head (CH) in each cluster regards as the capable method for energy efficient routing, which minimizes the transmission delay in WSN. However, the main problem dealt with the selection of optimal CH that makes the network service prompt. Till now, more research works have been processing on solving this issue by considering different constraints. Under this scenario, this paper attempts to develop a new clustering model with optimal cluster head selection by considering four major criteria like energy, delay, distance, and security. Further, for selecting the optimal CHs, this paper proposes a new hybrid algorithm that hybridizes the concept of dragon fly and firefly algorithm algorithms, termed fire fly replaced position update in dragonfly. Finally, the performance of the proposed work is carried out by comparing with other conventional models in terms of number of alive nodes, network energy, delay and risk probability.

105 citations