Journal of Machine and Computing


Hybrid Interval Type-2 Fuzzy AHP and COPRAS-G-based trusted neighbour node Discovery in Wireless Sensor Networks



Journal of Machine and Computing

Received On : 15 November 2022

Revised On : 10 March 2023

Accepted On : 18 April 2023

Published On : 05 July 2023

Volume 03, Issue 03

Pages : 251-263


Abstract


In Wireless Sensor Networks (WSNs), reliable and rapid neighbour node discovery is considered as the crucial operation which frequently needs to be executed over the entire lifecycle. Several neighbour node discovery mechanisms are proposed for reducing the latency or extending the sensor nodes’ lifetime. But majority of the existing neighbour node discovery mechanisms failed in addressing the critical issues of real WSNs related to energy consumptions, constraints of latency, uncertainty of node behaviors, and communication collisions. In this paper, Hybrid Interval Type-2 Fuzzy Analytical Hierarchical Process (AHP) and Complex Proportional Assessment using Grey Theory (COPRAS-G)-based trusted neighbour node discovery scheme (FAHPCG) is proposed for better data dissemination process. In specific, Interval Type 2 Fuzzy AHP is applied for determining the weight of the evaluation criteria considered for neighbour node discovery, and then Grey COPRAS method is adopted for prioritizing the sensor nodes of the routing path established between the source and destination. It adopted the merits of fuzzy theory for handling the uncertainty and vagueness involved in the change in the behavior of sensor nodes during the process of neighbour discovery. It is proposed with the capability of exploring maximized number of factors that aids in exploring the possible dimensions of sensor nodes packet forwarding potential during the process of neighbour node discovery. The simulation results of the proposed FAHPCG scheme confirmed an improved neighbour node discovery rate of 23.18% and prolonged the sensor nodes lifetime to the maximum of 7.12 times better than the baseline approaches used for investigation.


Keywords


Wireless Sensor Networks (WSNs), Neighbor Node Discovery, Fuzzy Theory, Analytical Hierarchical Process (AHP), Complex Proportional Assessment (COPRAS), Grey Theory.


  1. Zhang, P., Wang, S., Guo, K., & Wang, J. (2018). A secure data collection scheme based on compressive sensing in wireless sensor networks. Ad Hoc Networks, 70, 73-84.
  2. Merad Boudia, O. R., Senouci, S. M., & Feham, M. (2018). Secure and efficient verification for data aggregation in wireless sensor networks. International Journal of Network Management, 28(1), e2000.
  3. Wang, J., & Chen, Y. (2018). Research and improvement of wireless sensor network secure data aggregation protocol based on SMART. International Journal of Wireless Information Networks, 25(3), 232-240.
  4. Janakiraman, S., & Jayasingh, B. B. (2019). A hyper-exponential factor-based Semi-Markov prediction mechanism for selfish rendezvous nodes in MANETs. Wireless Personal Communications, 108(3), 1493-1511.
  5. Tolba, A. (2017). Organizing multipath routing in cloud computing environments. International Journal of Advanced Computer Science and Applications, 8(1).
  6. Stoleru, R., Wu, H., & Chenji, H. (2012). Secure neighbor discovery and wormhole localization in sensor ad hoc networks. Ad Hoc Networks, 10(7), 1179-1190.
  7. Janakiraman, S., Priya, M. D., & Jebamalar, A. C. (2021). Integrated context-based mitigation framework for enforcing security against rendezvous point attack in MANETs. Wireless Personal Communications, 119(3), 2147-2163.
  8. Kumar, G., Rai, M. K., & Saha, R. (2017). Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in wireless sensor networks. Journal of Network and Computer Applications, 99, 10-16.
  9. Malik, S. K., Dave, M., Dhurandher, S. K., Woungang, I., & Barolli, L. (2017). An ant-based QoS-aware routing protocol for heterogeneous wireless sensor networks. Soft computing, 21(21), 6225-6236.
  10. Sengathir, J., & Manoharan, R. (2016). Exponential reliability factor based mitigation mechanism for selfish nodes in MANETs. Journal of Engineering Research, 4, 1-22.
  11. Ahmed, A. M., Kong, X., Liu, L., Xia, F., Abolfazli, S., Sanaei, Z., & Tolba, A. (2017). BoDMaS: bio-inspired selfishness detection and mitigation in data management for ad-hoc social networks. Ad Hoc Networks, 55, 119-131.
  12. Usman, A. B., & Gutierrez, J. (2018). Trust-based analytical models for secure wireless sensor networks. In Security and Privacy Management, Techniques, and Protocols (pp. 47-65). IGI Global.
  13. Janakiraman, S., & Priya, M. D. (2022). Selfish node detection scheme based on bates distribution inspired trust factor for MANETs. EAI Endorsed Transactions on Energy Web, 9(6), e1-e1.
  14. Xia, F., Liaqat, H. B., Ahmed, A. M., Liu, L., Ma, J., Huang, R., & Tolba, A. (2016). User popularity-based packet scheduling for congestion control in ad-hoc social networks. Journal of Computer and System Sciences, 82(1), 93-112.
  15. Sengathir, J., & Manoharan, R. (2017). Co-operation enforcing reputation-based detection techniques and frameworks for handling selfish node behaviour in MANETs: A review. Wireless Personal Communications, 97, 3427-3447.
  16. Ahmed, A., Bakar, K. A., Channa, M. I., & Khan, A. W. (2016). A secure routing protocol with trust and energy awareness for wireless sensor network. Sensor Networks and Applications, 21(2), 272-285
  17. Karthik, N., & Ananthanarayana, V. S. (2017). A hybrid trust management scheme for wireless sensor networks. Wireless Personal Communications, 97(4), 5137-5170.
  18. Ahmed, A., Bakar, K. A., Channa, M. I., Khan, A. W., & Haseeb, K. (2017). Energy-aware and secure routing with trust for disaster response wireless sensor network. Peer-to-Peer Networking and Applications, 10(1), 216-237.
  19. AlFarraj, O., AlZubi, A., & Tolba, A. (2018). Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 1-11.
  20. Javaid, N. (2019). NADEEM: Neighbor node approaching distinct energy‐efficient mates for reliable data delivery in underwater WSNs. Transactions on Emerging Telecommunications Technologies, e3805.
  21. Zhao, J., Huang, J., & Xiong, N. (2019). An effective exponential-based trust and reputation evaluation system in wireless sensor networks. IEEE Access, 7, 33859-33869.
  22. Anwar, R. W., Zainal, A., Outay, F., Yasar, A., & Iqbal, S. (2019). BTEM: Belief based trust evaluation mechanism for wireless sensor networks. Future generation computer systems, 96, 605-616.
  23. Gautam, A. K., & Kumar, R. (2021). A trust based neighbor identification using MCDM model in wireless sensor networks. Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science), 14(4), 1336-135
  24. Das, R., & Dwivedi, M. (2022). Multi agent dynamic weight based cluster trust estimation for hierarchical wireless sensor networks. Peer-to-Peer Networking and Applications, 15(3), 1505-1520.
  25. Mendel, J. M., John, R. I., & Liu, F. (2006). Interval type-2 fuzzy logic systems made simple. IEEE transactions on fuzzy systems, 14(6), 808-821.
  26. Zadeh, L. A. (1975). The concept of a linguistic variable and its application to approximate reasoning—I. Information sciences, 8(3), 199-249.
  27. Liang, Q., & Mendel, J. M. (2000). Interval type-2 fuzzy logic systems: theory and design. IEEE Transactions on Fuzzy systems, 8(5), 535-550.
  28. Saaty, T. L. (1977). A scaling method for priorities in hierarchical structures. Journal of mathematical psychology, 15(3), 234-281.
  29. Bevilacqua, M., Ciarapica, F. E., & Giacchetta, G. (2006). A fuzzy-QFD approach to supplier selection. Journal of Purchasing and Supply Management, 12(1), 14-27.
  30. Zadeh LA (1965) Fuzzy sets. Information and control 8(3): 338-353.
  31. Wang TC, Chen YH (2008) Applying fuzzy linguistic preference relations to the improvement of consistency of fuzzy AHP. Information sciences 178(19): 3755-3765.
  32. Van Laarhoven, P. J., & Pedrycz, W. (1983). A fuzzy extension of Saaty's priority theory. Fuzzy sets and Systems, 11(1-3), 229-241.
  33. Buckley JJ (1985) Fuzzy hierarchical analysis. Fuzzy sets and systems 17(3): 233-247.
  34. Chang, D. Y. (1996). Applications of the extent analysis method on fuzzy AHP. European journal of operational research, 95(3), 649-655.
  35. Kahraman, C., Öztayşi, B., Sarı, İ. U., & Turanoğlu, E. (2014). Fuzzy analytic hierarchy process with interval type-2 fuzzy sets. Knowledge-Based Systems, 59, 48-57.
  36. Zavadskas, E. K., Kaklauskas, A., Turskis, Z., & Tamošaitienė, J. (2009). Multi-attribute decision-making model by applying grey numbers. Informatica, 20(2), 305-320.
  37. Tavana, M., Momeni, E., Rezaeiniya, N., Mirhedayatian, S. M., & Rezaeiniya, H. (2013). A novel hybrid social media platform selection model using fuzzy ANP and COPRAS-G. Expert Systems with Applications, 40(14), 5694-5702.
  38. Li, G. D., Yamaguchi, D., & Nagai, M. (2007). A grey-based decision-making approach to the supplier selection problem. Mathematical and computer modelling, 46(3-4), 573-581.

Acknowledgements


We would like to thank Reviewers for taking the time and effort necessary to review the manuscript. We sincerely appreciate all valuable comments and suggestions, which helped us to improve the quality of the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


No data available for above study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


E. Jyothi Kiranmayi, N.V. Rao and K.S. Nayanathara, “Hybrid Interval Type-2 Fuzzy AHP and COPRAS-G-based trusted neighbour node Discovery in Wireless Sensor Networks, Journal of Machine and Computing, vol.3, no.3, pp. 251-263, July 2023. doi: 10.53759/7669/jmc202303023.


Copyright


© 2023 E. Jyothi Kiranmayi, N.V. Rao and K.S. Nayanathara. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.