Intelligent Knowledge Exploration and Processing

Intelligent Knowledge Exploration and Processing

A novel approach to increase the lifetime and security of wireless sensor networks using a combination of particle swarm optimization algorithms and K-Mean combined with an intelligent intrusion detection system

Document Type : Original Article

Authors
1 Master's student, Department of Computer Engineering, Hamedan Branch, Islamic Azad University, Hamedan, Iran
2 Assistant Professor, Department of Computer Engineering, Hamedan Branch, Islamic Azad University, Hamedan, Iran
Abstract
In the last decade, wireless sensor networks have also faced problems and challenges with the various applications they have found. One of their main problems is the security and security of these networks. Recent advances in network connectivity and computing capabilities have expanded the applications of wireless sensor networks in various industries. Collecting data and transmitting it to a remote server, often located in isolated locations, is the primary goal of wireless sensor networks. Energy efficiency, storage and processing resource limitations, bandwidth, fault rate, scalability, and survivability in harsh conditions should be considered. Some network security methods can be used to deal with malaise, but these methods have a negative effect on the lifespan of the network sensors and cause the overall energy loss of the network. In this paper, an algorithm based on Particle Swarm Optimization (PSO) and Means-K is presented to optimize the location of nodes and improve the lifespan of wireless sensor networks. The main purpose of this algorithm is to increase energy efficiency and deal with potential packets in the network. To simulate the proposed method called IPSO, a comparison is made with the previous methods of EA-LEACH and PSOR, and the results of energy consumption versus packet are analyzed. The Intrusion Detection System (IDS) based on anomaly detection has been added to the protocol, which detects suspected intrusion nodes by analyzing the number of messages received by the nodes. In the security section of the protocol, the simulation results show that the proposed method has been able to detect the attack and neutralize the attack and perform more efficiently and increase the lifespan of the network.
Keywords