Computer Science ›› 2021, Vol. 48 ›› Issue (11A): 452-455.doi: 10.11896/jsjkx.210900131

• Network & Communication • Previous Articles     Next Articles

Security Clustering Strategy Based on Particle Swarm Optimization Algorithm in Wireless Sensor Network

JIANG Jian-feng1,2, SUN Jin-xia2, YOU Lan-tao3   

  1. 1 Suzhou Industrial Park Institute of Services Outsourcing,Suzhou,Jiangsu 215123,China
    2 School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210000,China
    3 School of Computer Science and Technology,Soochow University,Suzhou,Jiangsu 215123,China
  • Online:2021-11-10 Published:2021-11-12
  • About author:JIANG Jian-feng,born in 1983,master,associate professor.His main research interests include network technology,Internet of things,virtualization and cloud computing technology.
  • Supported by:
    National Natural Science Foundation of China(61702351),Postdoctoral Research Fund of Jiangsu Province(2018K009B),High-end Training for Professional Leaders in Jiangsu Province(2020GRFX074) and Qinglan Engineering Project in Jiangsu Province(202010).

Abstract: In order to solve the problem of short network survival time and lack of effective secure transmission mechanism in wireless sensor networks,a secure clustering strategy for wireless sensor networks based on particle swarm optimization algorithm(SC_PSO) is proposed.This strategy combines the polynomial hybrid key distribution technology to encrypt the communication data of nodes between clusters,which ensures the security performance of data transmission.On the other hand,an optimized particle swarm algorithm is used to construct a fitness function based on the remaining energy of the node and the communication distance to select the optimal cluster head and the number of clusters.It can solve the problem of energy loss caused by the encryption algorithm,and it can ensure the performance of the sensor network while realizing data security communication.The network simulation test shows that this strategy can increase the network throughput by 120% and extend the life cycle of the sensor network by 30%~65% while ensuring the security of the sensor network.

Key words: Network Security, Polynomial Key, PSO, Wireless Sensor Network

CLC Number: 

  • TP393
[1]LIU F,WANG D D,YU B.Instant messaging system based on 3DES-RC4 hybrid encryption[J].Computer System Application,2020,29(8):80-89.
[2]MAO K J,SUN J S,YAN S H.Research on a WSNs Hierarchical Routing Protocol with Balanced Energy Consumption[J].Transducer and Microsystems Technologies,2020,39 (1):24-27,31.
[3]YANG J,LIU X L,XU Q.A new clustering routing protocol for heterogeneous wireless sensor networks[J].Transducer and Microsystems Technologies,2020,39(4):121-124,128.
[4]CUI Y N,WEI W,HU Y H.Improved LEACH routing based on particle swarm optimization algorithm in WSN[J].Journal of China Academy of Electronics,2019,14(11):1169-1173,1193.
[5]WANG X P,WU L B,MIAO F Y.Research on Multi-polynomial Key Distribution Scheme for Wireless Sensor Network[J].Journal of Chinese Computer Systems,2018,39(2):193-196.
[6]WEI Q F,YUAN Y Y,HU X D.WSN security model based on the hierarchical security role of backbone nodes[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science),2019,31(5):142-148.
[7]YUAN Y Y.Research on hierarchical security model of wireless
sensor network based on backbone trusted nodes[D].Chongqing:Chongqing University of Posts and Telecommunications,2018.
[8]JI A G,ZHAO J X.The improvement and simulation forLEACH clustering routing protocol[C]//Seventh International Conference on Electronics & Information Engineering.2017.
[9]QI H,LV L,CHEN H.LEACH optimization algorithm based on power control and number of clusters[J].Transducer and Microsystems Technologies,2018,37(10):137-139,146.
[10]FENG J,KONG J S,WANG G.A clustering single-hop routing protocol for wireless sensor networks based on energy replenishment[J].Computer Science,2020,47(S1):278-282.
[11]TAO Z Y,WANG H Z.Non-uniform hierarchical routing protocol for wireless sensor networks based on new clustering[J].Computer Science,2018,45(3):115-123.
[12]XIONG C B,DING H W,DONG Z F.A low-latency and low-power WSN clustering algorithm based on LEACH[J].ComputerScience,2020,47(1):258-264.
[13]SONG W W.Load balancing mechanism of data center based on particle swarm optimization[J].Nanjing University of Posts and Telecommunications(Natural Science),2019,39(5):81-88.
[14]YI M.A secure clustering algorithm for wireless sensor networks based on hybrid PSO[J].Journal of PLA University of Science and Technology (Natural Science Edition),2015(16):433-438.
[15]MA S Q,TANG H,LI Y.Data center network traffic scheduling strategy based on particle swarm optimization algorithm[J].Telecommunication Engineering,2021,61(7):865-871.
[1] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[2] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[3] DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284.
[4] LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593.
[5] FAN Xing-ze, YU Mei. Coverage Optimization of WSN Based on Improved Grey Wolf Optimizer [J]. Computer Science, 2022, 49(6A): 628-631.
[6] DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108.
[7] ZHOU Tian-qing, YUE Ya-li. Multi-Task and Multi-Step Computation Offloading in Ultra-dense IoT Networks [J]. Computer Science, 2022, 49(6): 12-18.
[8] ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351.
[9] CHEN Hai-biao, HUANG Sheng-yong, CAI Jie-rui. Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid [J]. Computer Science, 2021, 48(6A): 491-497.
[10] WANG Guo-wu, CHEN Yuan-yan. Improvement of DV-Hop Location Algorithm Based on Hop Correction and Genetic Simulated Annealing Algorithm [J]. Computer Science, 2021, 48(6A): 313-316.
[11] WANG Jin-heng, SHAN Zhi-long, TAN Han-song, WANG Yu-lin. Network Security Situation Assessment Based on Genetic Optimized PNN Neural Network [J]. Computer Science, 2021, 48(6): 338-342.
[12] ZHANG Kai, LIU Jing-ju. Attack Path Analysis Method Based on Absorbing Markov Chain [J]. Computer Science, 2021, 48(5): 294-300.
[13] GUO Rui, LU Tian-liang, DU Yan-hui. Source-location Privacy Protection Scheme Based on Target Decision in WSN [J]. Computer Science, 2021, 48(5): 334-340.
[14] LIU Quan-ming, LI Yin-nan, GUO Ting, LI Yan-wei. Intrusion Detection Method Based on Borderline-SMOTE and Double Attention [J]. Computer Science, 2021, 48(3): 327-332.
[15] WANG Yu-chen, QI Wen-hui, XU Li-zhen. Security Cooperation of UAV Swarm Based on Blockchain [J]. Computer Science, 2021, 48(11A): 528-532.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!