A Cluster-Tree-Based Secure Routing Protocol Using Dragonfly Algorithm (DA) in the Internet of Things (IoT) for Smart Agriculture
Abstract
:1. Introduction
- CTSRD provides a distributed and lightweight trust mechanism called weighted trust (W-Trust). This mechanism evaluates the trust value of IoT nodes in accordance with interactions between them and other nodes. If W-Trust detects the abnormal behavior of an IoT node, it quickly reduces the direct trust value related to this node based on a penalty factor to avoid its hostile activities in the network. On the other hand, if W-Trust detects the normal behavior of a node, it improves the trust level of this node based on a reward factor to increase the participation probability of this node in the routing process.
- CTSRD introduces a trust-based clustering method called T-Clustering. In this clustering process, cluster head nodes (CHs) are selected from honest nodes. Note that clustering reduces communication overhead and energy consumption, improves the packet delivery rate (PDR), and lowers delay in the data transfer process. In CTSRD, nodes that are closer to the cluster center and have a higher energy and neighbor degree, and are closer to the sink node, and increase their chance of becoming the cluster head.
- CTSRD forms a routing tree based on the dragonfly algorithm (DA-Tree) between the cluster head nodes. The DA-Tree provides a fitness function for evaluating the routing tree. The parameters used in the fitness function include the number of hops to the base station, remaining energy, intra-cluster traffic, and the trust value. This algorithm finds an optimal, stable, and secure routing tree, and consequently makes a balanced energy distribution in the network.
- Finally, CTSRD is compared with EEMSR and E-BEENISH in terms of network lifetime, energy consumption, and packet delivery ratio. This comparison shows that CTSRD evenly distributes the consumed energy in IoT and prolongs the network lifetime. However, it has a slightly lower PDR than EEMSR.
2. Related Works
3. Basic Concepts
4. System Model
4.1. Network Model
- Cluster member nodes: The task of CMs is to obtain data from the desired area and forward it to CH using a direct connection.
- Cluster head nodes: The task of CHs is to receive data from CMs, aggregate these data packets, and transfer them to the base station. CHs use a binary routing tree to transfer data to the BS.
- Basic station: The main task of BS is to process, analyze, and decide on data received from CHs. The position of the base station is fixed and pre-defined for all IoT nodes.
4.2. Energy Model
4.3. Attack Model
- The black hole node does not send any route request message.
- The black hole node deletes all received data packets in the network.
- The black hole node responds to all RREQs to form fake routes on the network.
- The black hole node cancels all routing packets and route error packets (RERR).
5. The Proposed Routing Method
- Distributed and lightweight trust mechanism (W-trust);
- Trust-based clustering process (T-clustering);
- Routing tree based on dragonfly algorithm (DA-tree);
5.1. Distributed and Lightweight Trust Mechanism (W-Trust)
5.1.1. Direct Trust
5.1.2. Indirect Trust
5.1.3. Total Trust
Algorithm 1 W-Trust mechanism |
|
5.2. Trust-Based Clustering Process (T-Clustering)
- Selecting a CH node: In CTSRD, each IoT node periodically exchanges a beacon message with its neighbors. This message contains information about the location, remaining energy, and trust value of the corresponding node. According to this message, each IoT node holds a neighborhood table for recording the information obtained from its single-hop neighboring nodes. According to the information in this table, each node such as uses Equation (18) to calculate its chance () to be selected as CH. This chance depends on four parameters, including the centrality of the node, the remaining energy, the neighbor degree, and the distance to the base station.
- Joining the cluster: After IoT nodes have received beacon messages from each other, they extract the chances of neighboring nodes from these messages. Then, each IoT node such as compares its chance () to the chances of other neighboring nodes. If has the highest chance compared to neighbors, it broadcasts a CH-candidate message to its neighbors to inform them of its status. Otherwise, if the chance of is less than other neighboring nodes, it waits for receiving CH-candidate messages from other neighboring nodes. Suppose that receives multiple CH-candidate messages from different neighboring nodes. In this case, is connected to the safest CH, which is a node with the highest trust level. Then, the CH transfers an ACK message to the cluster member node.
- Leaving the cluster: In IoT, the energy of cluster member nodes may end and these nodes die due to resource depletion. Therefore, it is necessary for CHs to be aware of the status of their members at any moment. To achieve this, CMs periodically send a beacon message to their CH to announce their membership to the cluster. If a specified time period () is expired, and the CH does not receive any beacon packet from its cluster member node, it deletes the identification of this node from its cluster member list to cancel its membership to the cluster.
- Supporting the node: It is a very important step in any clustering algorithm. If the trust level corresponding to the CH node decreases, or its energy is lower than an energy threshold, it is necessary to replace this CH. In CTSRD, when the cluster is formed, the CH node records the cluster members in a list and saves their chances and trust levels. Then, CH chooses a backup CH node, which is a node with the maximum chance from CMs with the highest trust level. When the CH node is exposed to failure, the backup CH is responsible for playing the role of CH.
Algorithm 2 T-Clustering |
|
5.3. Routing Tree Based on Dragonfly Algorithm (DA-Tree)
- Primary population formation: This step initializes each dragonfly using a random manner. Each dragonfly is an array whose number of elements indicates the number of CHs, and each element corresponds to a CH in the routing tree. The purpose of the dragonfly algorithm is to prioritize CHs on the network and place a CH with a higher priority at the upper level of the routing tree. Note that in each dragonfly, each element specifies the priority of the corresponding CH in the network.
- DA-based routing tree creation: This step describes how to create DA-Tree based on dragonflies. DA-Tree follows four rules.
- –
- Rule 1: The root of the tree is the base station.
- –
- Rule 2: According to the dragonfly, the CH with the maximum priority is the left child of BS, and the CH with the second priority is placed as the right child of the base station.
- –
- Rule 3: At each level of this binary routing tree, the leftmost CH must first determine its children. In this case, it first specifies its left child and then the right child in DA-Tree. The left child and the right child are two CHs, which have the highest and second priorities, respectively, and have not been chosen so far.
- –
- Rule 4: If two CH have a similar priority in a dragonfly, the CH with a higher trust level has a higher priority.
- Tree evaluation: This step presents a fitness function to evaluate the formed routing trees. This function comprises four scales:1. Number of hops to BSThis scale is used in the fitness function to place CHs close to BS at the upper tree levels because these nodes consume less energy to send data to BS.2. Remaining energyThis parameter is considered in the fitness function to place high-energy CHs at the upper tree levels because the nodes placed at upper levels have more tasks and require a lot of energy. They must send data related to their cluster member nodes as well as data packets received from other CHs in their sub-tree to the BS.3. Number of cluster membersThis parameter is used in the fitness function to place CHs, which connect to the small number of cluster members at upper tree levels. If there is a cluster head node that connects to many CMs, it needs a lot of energy to receive/send data packets within the cluster. Thus, it must be placed at the downer tree levels to reduce the communication overhead due to inter-cluster connections. This improves energy consumption in the network.4. Trust levelThis scale is used in the fitness function to place the safer CHs at upper tree levels. CHs at upper tree levels have more tasks in terms of inter-cluster communications. As a result, these nodes should be safer because, if a malicious node attacks these CHs, it can cause more damage to the network performance.Finally, this fitness function is calculated based on Equation (21).
- Stop condition: This step specifies the stop condition of the DA-Tree algorithm. When it is met, the DA-Tree algorithm ends, and the best response is considered its output. In the DA-Tree, the stop condition is 300 iterations for ending this algorithm. Upon the completion of the algorithm, the BS sends a message to CHs to inform them of their positions in this routing tree.
Algorithm 3 DA-Tree |
|
6. Simulation and Evaluation of Results
- EEMSR, like CTSRD, focuses on network security and energy efficiency simultaneously while E-BEENISH only focuses on energy efficiency.
- Both EEMSR and E-BEENISH use an efficient clustering method, as in our scheme.
- EEMSR presents a GA-based routing method for creating paths between CHs while our scheme uses DA for creating a routing tree between CHs.
6.1. Trust Evaluation
6.2. Network Lifetime
6.3. Remaining Energy
6.4. Packet Delivery Rate (PDR)
7. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Velosa, A.; Hines, J.F.; Hung, L.; Perkins, E.; Satish, R.M. Predicts 2015: The Internet of Things. 2014. Available online: https://www.gartner.com/doc/2952822/predicts–internet-things (accessed on 23 March 2017).
- Horwitz, L. The Future of IoT Miniguide: The Burgeoning IoT Market Continues; Tech. Rep.; CISCO: San Jose, CA, USA, 2019. [Google Scholar]
- Statista. Number of Connected Devices Worldwide 2030| Statista; Statista Research Department: New York, NY, USA, 2021. [Google Scholar]
- Muzammal, S.M.; Murugesan, R.K.; Jhanjhi, N.Z. A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches. IEEE Internet Things J. 2020, 8, 4186–4210. [Google Scholar] [CrossRef]
- Yousefpoor, M.S.; Barati, H. Dynamic key management algorithms in wireless sensor networks: A survey. Comput. Commun. 2019, 134, 52–69. [Google Scholar] [CrossRef]
- Yousefpoor, M.S.; Barati, H. DSKMS: A dynamic smart key management system based on fuzzy logic in wireless sensor networks. Wirel. Netw. 2020, 26, 2515–2535. [Google Scholar] [CrossRef]
- Thenmozhi, R.; Sakthivel, P.; Kulothungan, K. Hybrid multi-objective-optimization algorithm for energy efficient priority-based QoS routing in IoT networks. Wirel. Netw. 2022, 1–18. [Google Scholar] [CrossRef]
- Roberts, M.K.; Ramasamy, P. An improved high performance clustering based routing protocol for wireless sensor networks in IoT. Telecommun. Syst. 2022, 1–15. [Google Scholar] [CrossRef]
- Firouzi, F.; Farahani, B.; Weinberger, M.; DePace, G.; Aliee, F.S. IoT Fundamentals: Definitions, Architectures, Challenges, and Promises. In Intelligent Internet of Things; Firouzi, F., Chakrabarty, K., Nassif, S., Eds.; Springer: Cham, Switzerland, 2020. [Google Scholar]
- Naresh, M.; Munaswamy, P. Smart agriculture system using IoT technology. Int. J. Recent Technol. Eng. 2019, 7, 98–102. [Google Scholar]
- Sinha, B.B.; Dhanalakshmi, R. Recent advancements and challenges of Internet of Things in smart agriculture: A survey. Future Gener. Comput. Syst. 2022, 126, 169–184. [Google Scholar] [CrossRef]
- Jain, A.; Kumar, A. Smart agriculture monitoring system using IoT. Int. J. Res. Appl. Sci. Eng. Technol. 2020. [Google Scholar] [CrossRef]
- Ratnaparkhi, S.; Khan, S.; Arya, C.; Khapre, S.; Singh, P.; Diwakar, M.; Shankar, A. Smart agriculture sensors in IoT: A review. Mater. Today Proc. 2020. [Google Scholar] [CrossRef]
- Khoa, T.A.; Man, M.M.; Nguyen, T.Y.; Nguyen, V.; Nam, N.H. Smart agriculture using IoT multi-sensors: A novel watering management system. J. Sens. Actuator Netw. 2019, 8, 45. [Google Scholar] [CrossRef] [Green Version]
- Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A survey on IoT security: Application areas, security threats, and solution architectures. IEEE Access 2019, 7, 82721–82743. [Google Scholar] [CrossRef]
- Pal, S.; Jadidi, Z. Analysis of security issues and countermeasures for the industrial internet of things. Appl. Sci. 2021, 11, 9393. [Google Scholar] [CrossRef]
- Alaba, F.A.; Othman, M.; Hashem, I.A.T.; Alotaibi, F. Internet of Things security: A survey. J. Netw. Comput. Appl. 2017, 88, 10–28. [Google Scholar] [CrossRef]
- Singh, P.; Khari, M.; Vimal, S. EESSMT: An Energy Efficient Hybrid Scheme for Securing Mobile Ad hoc Networks Using IoT. Wirel. Pers. Commun. 2022, 126, 2149–2173. [Google Scholar] [CrossRef]
- Arora, S.; Batra, I.; Malik, A.; Luhach, A.K.; Alnumay, W.S.; Chatterjee, P. Seed: Secure and energy efficient data-collection method for IoT network. Multimed Tools Appl. 2022, 1–15. [Google Scholar] [CrossRef]
- Moussa, N.; Nurellari, E.; El Belrhiti El Alaoui, A. A novel energy-efficient and reliable ACO-based routing protocol for WSN-enabled forest fires detection. J. Ambient. Intell. Humaniz. Comput. 2022, 1–17. [Google Scholar] [CrossRef]
- Ahmed, A.; Abdullah, S.; Bukhsh, M.; Ahmad, I.; Mushtaq, Z. An energy-efficient data aggregation mechanism for IoT secured by blockchain. IEEE Access 2022, 10, 11404–11419. [Google Scholar] [CrossRef]
- Hussein, S.M.; López Ramos, J.A.; Ashir, A.M. A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks. Electronics 2022, 11, 2721. [Google Scholar] [CrossRef]
- Yousefpoor, M.S.; Yousefpoor, E.; Barati, H.; Barati, A.; Movaghar, A.; Hosseinzadeh, M. Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review. J. Netw. Comput. Appl. 2021, 190, 103118. [Google Scholar] [CrossRef]
- Yousefpoor, E.; Barati, H.; Barati, A. A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks. Peer-to-Peer Netw. Appl. 2021, 14, 1917–1942. [Google Scholar] [CrossRef]
- Jeong, H.; Lee, S.W.; Hussain Malik, M.; Yousefpoor, E.; Yousefpoor, M.S.; Ahmed, O.H.; Hosseinzadeh, M.; Mosavi, A. SecAODV: A Secure Healthcare Routing Scheme Based on Hybrid Cryptography in Wireless Body Sensor Networks. Front. Med. 2022, 9, 829055. [Google Scholar] [CrossRef] [PubMed]
- Lu, Y.; Da Xu, L. Internet of Things (IoT) cybersecurity research: A review of current research topics. IEEE Internet Things J. 2018, 6, 2103–2115. [Google Scholar] [CrossRef]
- Pourghebleh, B.; Wakil, K.; Navimipour, N.J. A comprehensive study on the trust management techniques in the Internet of Things. IEEE Internet Things J. 2019, 6, 9326–9337. [Google Scholar] [CrossRef]
- Grammatikis, P.I.R.; Sarigiannidis, P.G.; Moscholios, I.D. Securing the Internet of Things: Challenges, threats and solutions. Internet Things 2019, 5, 41–70. [Google Scholar] [CrossRef]
- Zhang, Y.; Ren, Q.; Song, K.; Liu, Y.; Zhang, T.; Qian, Y. An Energy Efficient Multi-Level Secure Routing Protocol in IoT Networks. IEEE Internet Things J. 2021, 9, 10539–10553. [Google Scholar] [CrossRef]
- Zhang, Y.; Zhang, X.; Ning, S.; Gao, J.; Liu, Y. Energy-efficient multilevel heterogeneous routing protocol for wireless sensor networks. IEEE Access 2019, 7, 55873–55884. [Google Scholar] [CrossRef]
- Li, C.; Liu, Y.; Xiao, J.; Zhou, J. MCEAACO-QSRP: A novel QoS secure routing protocol for industrial internet of things. IEEE Internet Things J. 2022, 9, 18760–18777. [Google Scholar] [CrossRef]
- Gali, S.; Nidumolu, V. An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things. Clust. Comput. 2022, 25, 1779–1789. [Google Scholar] [CrossRef]
- Khan, T.; Singh, K.; Hasan, M.H.; Ahmad, K.; Reddy, G.T.; Mohan, S.; Ahmadian, A. ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs. Future Gener. Comput. Syst. 2021, 125, 921–943. [Google Scholar] [CrossRef]
- Glissa, G.; Rachedi, A.; Meddeb, A. A secure routing protocol based on RPL for Internet of Things. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–7. [Google Scholar]
- Airehrour, D.; Gutierrez, J.A.; Ray, S.K. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Gener. Comput. Syst. 2019, 93, 860–876. [Google Scholar] [CrossRef]
- Mujeeb, S.M.; Sam, R.P.; Madhavi, K. Trust and energy aware routing algorithm for Internet of Things networks. Int. J. Numer. Model. Electron. Netw. Devices Fields 2021, 34, e2858. [Google Scholar] [CrossRef]
- Muzammal, S.M.; Murugesan, R.K.; Jhanjhi, N.Z.; Hossain, M.S.; Yassine, A. Trust and Mobility-Based Protocol for Secure Routing in Internet of Things. Sensors 2022, 22, 6215. [Google Scholar] [CrossRef] [PubMed]
- Nayak, S.; Ahmed, N.; Misra, S. Deep learning-based reliable routing attack detection mechanism for industrial Internet of Things. Ad Hoc Netw. 2021, 123, 102661. [Google Scholar] [CrossRef]
- Hu, H.; Han, Y.; Yao, M.; Song, X. Trust based secure and energy efficient routing protocol for wireless sensor networks. IEEE Access 2021, 10, 10585–10596. [Google Scholar] [CrossRef]
- Mirjalili, S. Dragonfly algorithm: A new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. Neural Comput. Appl. 2016, 27, 1053–1073. [Google Scholar] [CrossRef]
- Mirjalili, S.; Mirjalili, S.M.; Lewis, A. Grey wolf optimizer. Adv. Eng. Softw. 2014, 69, 46–61. [Google Scholar] [CrossRef] [Green Version]
- Yang, X.S. A new metaheuristic bat-inspired algorithm. In Nature Inspired Cooperative Strategies for Optimization (NICSO2010); Springer: Berlin, Germany, 2010; pp. 65–74. [Google Scholar]
- Kennedy, J.; Eberhart, R. Particle swarm optimization. In Proceedings of the ICNN’95—International Conference on Neural Networks, Perth, Australia, 27 November–1 December 1995; Volume 4, pp. 1942–1948. [Google Scholar]
- Holland, J.H. Genetic algorithms. Sci. Am. 1992, 267, 66–73. [Google Scholar] [CrossRef]
- Yang, X.S. Firefly algorithms for multimodal optimization. In International Symposium on Stochastic Algorithms; Springer: Berlin, Germany, 2009; pp. 169–178. [Google Scholar]
Technique | Security Mechanism | Energy Efficiency | Strengths | Weaknesses |
---|---|---|---|---|
EEMSR [29] | ✓ | ✓ | Presenting a robust and efficient trust technique, balancing energy consumption, improving network lifetime, increasing reliability, enhancing security, high scalability, reducing latency, high data transmission rate when there are malicious nodes | High time complexity and computational complexity |
E-BEENISH [30] | × | ✓ | Reducing energy consumption, improving network lifetime, high scalability, improving the data transmission rate | Not having a strong security mechanism for dealing with network attacks, low reliability |
MCEAACO-QSRP [31] | ✓ | ✓ | Lowering energy consumption, providing secure services in the network, reducing end-to-end delay, improving the trust value, and increasing the data transmission rate under black hole attacks | Low scalability, flat network model |
CBBMOR-TSM [32] | ✓ | × | Using a robust trust mechanism, increasing the data transmission rate, lowering energy consumption and latency in the network despite black hole and DDoS attacks, suitable throughput | Low scalability, flat network model |
ETERS [33] | ✓ | ✓ | Designing a strong trust technique, high scalability, suitable throughput, acceptable packet delivery rate, optimal energy consumption, acceptable latency, resistance against some attacks, easy implementation | High time complexity and computational complexity |
SPRL [34] | ✓ | × | Protecting against some attacks, low latency | High overhead |
SecTrust-RPL [35] | ✓ | × | Lowering communication overhead, protecting against rank and Sybil attacks, performing both attack detection and malicious node isolation | Not considering the uncertainty in the recommendations |
EHTARA [36] | ✓ | ✓ | Improving energy consumption, managing the data transmission process between nodes, presenting a trust-based data transmission process | Not providing an accurate and certain security analysis, not determining how to deal with network attacks |
SMTrust [37] | ✓ | × | High data transmission rate and reliability, improving throughput, designing security mechanism for detecting black hole and rank attacks | Flat network model, low scalability, low communication overhead, high latency |
GAN-C [38] | ✓ | × | Timely attack detection, decreasing latency, and packet loss | High time complexity and computational complexity, high routing overhead, low scalability |
TBSEER [39] | ✓ | ✓ | Decreasing energy consumption, improving network security, designing a robust trust mechanism, ability to identify various attacks, low latency and packet loss, high scalability | High routing overhead |
CTSRD | ✓ | ✓ | Presenting a robust and energy-efficient routing technique, evenly distributing the consumed energy between the network nodes, enhancing energy consumption, and network lifetime | Low packet delivery rate |
Algorithm | Description | Properties | ||||||
---|---|---|---|---|---|---|---|---|
Convergence Rate | Accuracy | Execution Time | Implementation | Ability to Reach the Global Optimum | Local Optimum Issue | Trade-Off between Local and Global Searches | ||
DA [40] | This algorithm simulates the social behavior of dragonflies in the nature. It utilizes a high convergence rate. | High | High | Short | Simple | Good | No | Good |
GWO [41] | This algorithm simulates the hunting behavior of gray wolves. It is simple and efficiently solves large and complex issues. | High | Low | Short | Simple | Bad | Yes | Bad |
BA [42] | It simulates the feeding behavior of bats. It is efficient and regularity adjusts its factors. | High | Low | Short | Simple | Bad | Yes | Almost good |
PSO [43] | It simulates the social life of birds. It needs the storage capacity to maintain the global optimum and the local optimum in each particle. | High | Low | Short | Simple | Almost good | Yes | Almost good |
GA [44] | It is presented to simulate the gene evolution. | High | Medium | Long | Simple | Almost good | Yes | Good |
FA [45] | It simulates the brightness behavior of fireflies. FA depends on two principles, namely light intensity and attractiveness. | High | High | High | Simple | Almost good | No | Good |
Parameter | Value |
---|---|
Simulator | NS2 |
Network environment | m |
BS location | |
Number of IoT nodes | 100 |
Types of IoT nodes | Four types |
Energy of IoT nodes | , , , |
Connection radius of IoT nodes | m |
Trust threshold () | |
Packet size | Byte |
Maximum transmissions | packet/round |
Energy consumed by the electrical circuit of receiver/transmitter () | nJ/bit |
Signal amplifier coefficient in the free space () | 10 pJ/bit/ |
Signal amplifier coefficient in the multi-path space () | 0.0013 pJ/bit/m |
Population size | 80 |
Stop condition | iterations |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hosseinzadeh, M.; Tanveer, J.; Masoud Rahmani, A.; Yousefpoor, E.; Sadegh Yousefpoor, M.; Khan, F.; Haider, A. A Cluster-Tree-Based Secure Routing Protocol Using Dragonfly Algorithm (DA) in the Internet of Things (IoT) for Smart Agriculture. Mathematics 2023, 11, 80. https://doi.org/10.3390/math11010080
Hosseinzadeh M, Tanveer J, Masoud Rahmani A, Yousefpoor E, Sadegh Yousefpoor M, Khan F, Haider A. A Cluster-Tree-Based Secure Routing Protocol Using Dragonfly Algorithm (DA) in the Internet of Things (IoT) for Smart Agriculture. Mathematics. 2023; 11(1):80. https://doi.org/10.3390/math11010080
Chicago/Turabian StyleHosseinzadeh, Mehdi, Jawad Tanveer, Amir Masoud Rahmani, Efat Yousefpoor, Mohammad Sadegh Yousefpoor, Faheem Khan, and Amir Haider. 2023. "A Cluster-Tree-Based Secure Routing Protocol Using Dragonfly Algorithm (DA) in the Internet of Things (IoT) for Smart Agriculture" Mathematics 11, no. 1: 80. https://doi.org/10.3390/math11010080
APA StyleHosseinzadeh, M., Tanveer, J., Masoud Rahmani, A., Yousefpoor, E., Sadegh Yousefpoor, M., Khan, F., & Haider, A. (2023). A Cluster-Tree-Based Secure Routing Protocol Using Dragonfly Algorithm (DA) in the Internet of Things (IoT) for Smart Agriculture. Mathematics, 11(1), 80. https://doi.org/10.3390/math11010080