Energy-Efficient Secure Routing for a Sustainable Heterogeneous IoT Network Management. (2024)

Link/Page Citation

Author(s): Ashok Thangavelu (corresponding author) [1,*]; Prabakaran Rajendran [2]

1. Introduction

Heterogeneous Internet of Things (H-IoT) networks, which are distinguished by a variety of IoT devices, are the next evolution of networking infrastructures [1]. H-IoT is based on the development of multi-networking heterogeneous models, and effective communication tools for industrial as well as personal applications have been developed [2]. Since most end devices, such as sensors, run on batteries, it becomes imperative to look at energy consumption. Understanding how much energy is used in wireless transmission is crucial for estimating power usage [3]. An IoT-based WSN [4] constitutes various specialized sensors involved in various applications [5] like animal monitoring, environmental sensing, disaster management [6], habitat monitoring, intelligent transportation, healthcare, transport, armed forces surveillance, and weapon control [7,8]. As a sensor’s lifespan depends on its batteries [9], during harsh conditions in which they operate or are impossible to replace or recharge, an issue arises and threatens the WSN’s incorporation into the IoT. As a result, an extended network lifetime is seen as a significant obstacle for WSN-based IoT. Thus, a clustering technique is employed in the WSN to increase energy usage and network lifetime [10].

By decreasing spare data transfer between the nodes, and with reliance only on local information, clustering is a well-liked method for lowering energy use [11]. Rare clustering protocols [12] like Power-Efficient Gathering in Sensor Information Systems (PEGASIS), Low-Energy Adaptive Clustering Hierarchy (LEACH), Hybrid Energy Efficient Distributed (HEED) clustering, Threshold-Sensitive Energy Efficient Sensor Network (TEEN), Adaptive Threshold-Sensitive Energy Efficient Sensor Network (APTEEN), and base-station controlled dynamic clustering protocol were used, while the clustering protocols present poor results [13]. CH plays a critical role in optimizing energy utilization. Based on a few criteria, different clusters of sensor nodes in a WSN are created [14]. Numerous methods used optimization algorithms to suggest CH selection. Some of them are Particle Swarm Optimization (PSO), Artificial Bee Colony (ABC), and Whale Optimization Algorithm, which failed, due to a low number of parameter selections [15]. However, the weaknesses of IoT systems, such as limited resources, heterogeneous devices, and a lack of standardization, make them prone to dangerous faults and attacks [16,17].

Denial of Service, Ransomware, Botnet, SCADA/Trojan Horse, Packet Sniffing, and Man-in-the-Middle are some of the attacks that have had an impact on IoT [18]. For certain of the identified attacks, malicious disruptions of the data flow inside the IoT network must be avoided to decrease energy consumption. Early detection of intrusions helps stop attacks before they have a chance to do permanent harm [19]. More specifically, attack classification requires powerful processing units, such as GPUs and massive storage, which are needed for Machine Learning (ML) and Deep Learning (DL) [20]. Still, these attacks impede the creation of novel applications and intelligent systems. When compared to the state-of-the-art, the proposed research has rectified premature convergence, improved network lifetime with less energy usage, and obstructed attacks during communication [21,22].

The remarkable contributions of this work are listed below:

* Previous works focused less on threading attacks and data leakage in Heterogenous IoT. Hence, to overcome this limitation of research, a new security-based routing approach has been proposed.

* Memetic Algorithm (MA) for the selection of CH and feature extraction has been proposed to overcome the energy consumption, scalability and dimensional reduction issues.

* An Energy-Efficient Memetic Clustering Method (EEMCM) is proposed to tackle challenges like limited node energy, outlier detection, threats, data leaks, and redundancy, to reduce energy consumption.

The remainder of the document is arranged as follows. Section 2 describes the existing research. Section 3 describes the Energy-Efficient Memetic Clustering Method (EEMCM). Section 4 describes the results and presents a discussion about EEMCM. Section 5 discusses the outcome of the work and Section 6 closes the analysis with a conclusion.

2. Literature Survey

Alghamdi et al., 2020 [23] created a clustering model by taking into account four key factors such as energy, delay, distance, and security, for Cluster Head (CH) selection. Additionally, to choose the CHs, the analysis suggested a hybrid algorithm called Firefly replace the position update in Dragonfly, which combined the ideas of the two methods. The WSN paradigm focused on lifespan improvement and structural data flow, while fewer parameters were taken for the CH selection.

To choose the CHs in the IoT-WSN, Raslan et al., 2021 [24] provided an Improved Sunflower Optimization Algorithm (ISFO) algorithm. It was integrated by the Lèvy flight operator with the Sunflower Optimization Algorithm (SFO). The Lèvy flight operator was able to assist the SFO in avoiding early convergence and escaping from being trapped in the local minima. But then, the remaining population was stuck in the intermediate area if the overall best solution reached local minima.

Pour & Javidan et al., 2021 [25] suggested a clustering algorithm that considered the distance between nodes and sink, network density, and residual energy of nodes before selecting CHs. There was a significant decrease in power consumption as the number of rounds increased. Additionally, it focused each round’s calculation on a variable range that was established by network density, though it was high computation.

A clustering method with four steps of processing—cluster formation, splitting and merging, CH selection, and data transformation—based on Internet of Things devices was introduced by Poluru & Ramasamy et al., 2020 [26]. By the k-mean clustering approach, the network was clustered. To address every optimization issue, the Cyclic Rider Optimization Algorithm (C-ROA) was introduced. The performance of energy harvesting was not fully covered here.

Sankar et al., 2023 [27] suggested a Sandpiper Optimization Algorithm (SOA) that takes residual energy and distance into account when forming clusters and selecting the right CH node to increase network lifetime. The sink was positioned in the middle of the network region, and the simulation continued with various network sizes. Security was not taken into consideration in this work.

Bakshi et al., 2021 [28] presented a technique for adaptive CH selection based on Glow-worm Swarm Optimization (GSO). The network as a whole was divided into an optimal number of clusters by the method. The approach ensured minimized overlapping of the clusters using a voting mechanism that minimizes the communication overhead. Due to the limited step-size, GSO requires a trade-off between accuracy and convergence speed.

WSN clustering based on the memetic algorithm (MemA) was suggested by Ahmad et al., 2021 [29] to use local exploration strategies needed to reduce the likelihood of early convergence. MemA was used to dynamically balance the load among clusters to obtain optimal clusters in WSN-IoT. Finding a Cluster Head Set (CH-set) as soon as feasible when a requirement arises was the aim of the analysis. In the next generation, the Wireless Mobile Nodes (WMNs) with the highest weight value were chosen rather than newcomers. For a memetic algorithm search, there was frequently a maximum computational budget that was used.

To lower the energy consumption of WSN and increase both the stability period and network lifetime, an Energy-Efficient Two-Stage routing Protocol (EETSP) was presented by Dwivedi et al., 2021 [30]. By using this protocol, the CHs and Secondary Cluster Heads (SCHs) lower the network’s energy consumption while also greatly increasing the number of packets transmitted to the Base Station (BS). The BS’s processing power, energy supply, and computing capability were all constrained. Using symmetric key techniques, Hybrid Secure Multipath Optimized Routing (HSMOR) was presented by Kala et al., 2021 [31] with multi-variation tuples. The adversaries in the WSN were discovered and prevented by the suggested strategy. With the use of a sophisticated symmetric key methodology, it also organized an authentication and encryption model to select the sensor hubs. Performance metrics considered here were fewer, and better analysis could have been performed for this work.

For WSN-based IoT networks with energy constraints, Fixed-Parameter Tractable Approximation Clustering (FPTAC), an energy-aware data distribution mechanism was developed by Yarinezhad & Sabaei et al., 2021 [32]. FPTAC presented an approximation algorithm needed to solve LBCP with an approximation ratio of 1.2. FPTAC was outfitted with a routing mechanism to ascertain the pathways within the network, thereby completing the protocol for WSN-based IoT networks. Routing algorithms have an energy-hole problem because they ignore the nodes’ positions and current energies.

3. Proposed Methodology

This paper proposes an EEMCM based on efficient cluster formation and CH selection and integrates the AlexNet architecture for anomaly detection to address energy consumption and security challenges in H-IoT WSNs, as shown in Figure 1.

3.1. Initialization

During the Initialization phase, 'n' number of sensor nodes are deployed. Each IoT node performs self-configuration tasks, by the integration of communication parameters in the network connections like network topology, node density, and environmental conditions. (1)Initialsensornodes(S[sub.i])={S[sub.i1],S[sub.i2],…,S[sub.in]}

In Equation (1), S[sub.i] represents the initialization of 'n' number of sensor nodes in the network as S[sub.in]. (2)ParameterSetup(P[sub.i])={P[sub.i1],P[sub.i2],…,P[sub.in]}

In Equation (2), P[sub.i] represents the communication parameters such as network topology, node density, and environment data to set up in the sensor node S[sub.i]. (3)NetworkConnections(A)=[a[sub.11]a[sub.12]…a[sub.1n]a[sub.21]a[sub.22]…a[sub.2n]…………a[sub.n1]a[sub.n2]…a[sub.nn]]

In Equation (3), A represents the adjacency matrix of the network, where a[sub.ij] represents the connection status between the sensor nodes S[sub.i] and S[sub.j]. Each entry a[sub.ij] can take on a value of 1 if a connection between sensor nodes S[sub.i] and S[sub.j] exists and 0 if there is no connection.

3.2. Cluster Formation

In this phase, 'n', the sensor nodes are deployed in the network and formed as a cluster. For this grouping, the methodology utilizes the Memetic Algorithm (MA) for cluster formation in H-IoT. MA combines the strengths of evolutionary algorithms with local and global search techniques for efficient exploration of solution spaces while refining candidate solutions towards optimality. However, MA may struggle to handle multimodal optimization issues in which the search space is complex. Large-scale multimodal optimization problems also provide scalability challenges, resulting in longer convergence periods. To address these issues, data parallelism techniques are implemented to distribute the computational workload across multiple processors into the MA as Parallelized-MA (PMA) for cluster formation. PMA involves dividing data into smaller subsets and distributing them across multiple processing units. Each unit independently computes on its assigned subset, enabling parallel execution. So, the data points can be processed independently, allowing for efficient cluster formation over huge data. By doing this, PMA significantly reduces the convergence time and enhances its scalability in dealing with large-scale multimodal optimization problems.

Step 1: The MA fitness function is defined, which evaluates the fitness function and measures how well each cluster configuration satisfies the constraints of the network, such as efficient data routing, balanced energy consumption, and effective communication. (4)MA(F(x))=?[sub.i=1][sup.n]f[sub.i](S[sub.i])

In Equation (4), F(x) is the highest fitness value of the candidate solution x, which corresponds to a particular arrangement of sensor nodes into clusters. It calculates the highest fitness of a candidate solution x by summing the fitness values f[sub.i](S[sub.i]) derived from parameters such as node connectivity, energy levels, and proximity to other nodes of individual nodes (S[sub.i]). (5)LocalSearch(x)=?(x,Neighbour(x))

In Equation (5), the local search operator of ?(x), explores the neighbour of a candidate solution x. A global search also needs to be performed. (6)GlobalSearch(x)=?(population)

In Equation (6), the global search operator, ?(population) explores the entire population of candidate solutions. The operator ? is applied to the entire population, selecting common elements among all candidate solutions in the population. (7)T(S[sub.i],S[sub.j])={S[sub.i]iff(S[sub.i])>f(S[sub.j])S[sub.j]if(S[sub.i])=f(S[sub.j])

Equation (7) represents the selection operator used in the Memetic Algorithm. It compares the fitness values of the candidate S[sub.i], S[sub.j] and selects the one with the higher fitness for further evolution. (8)C(S[sub.i],S[sub.j])={S[sub.i][sup.K]withprobability1/2S[sub.j][sup.K]withprobability1/2

Equation (8) represents the uniform crossover operator ‘C’ used in the Memetic Algorithm. It selects genes from either of the parent solutions,S[sub.i] or S[sub.j], with an equal probability of creating offspring solutions. (9)p=(S[sub.i,]P[sub.i],A)

In Equation (9), p represents the PMA for cluster formation. PMA distributes the computational workload across multiple processing units, enabling parallel execution of cluster formation tasks to improve scalability.

3.3. CH Selection

Throughout this stage, after the cluster formation, the approach leverages the abilities of the PMA for CH selection in H-IoT. This method assigns a probability to each sensor node based on its fitness value for individuals to determine the probability of selection to serve as a CH. Subsequently, in PMA, the cluster formation of 'n' sensor nodes data is divided into multitasks, and each task is assigned a fitness percentage that represents its completion efficiency. The task with the highest efficiency is often determined by completion time and is designated as the CH. Integrating the fitness percentage method with PMA ensures efficient CH selection from the parallel processing capabilities of PMA. (10)P[sub.i]=fi/?j=1nfj

In Equation (10), P[sub.i] represents the probability of selecting the sensor node 'i' as a CH. ?[sub.j=1][sup.n]f[sub.j] represents the sum of fitness values of all sensor nodes in the network. (11)CH[sub.i]={1withprobabilityP[sub.i]0otherwise

In Equation (11), CH[sub.i] denoting the binary variable indicates whether sensor node 'i' is selected as a CH (1) or not (0) based on the probability. (12)E[sub.i]=Num of completed tasks/Total Num of task

In Equation (12), E[sub.i] represents the task completion efficiency of sensor node 'i' out of the total number of tasks assigned in the parallel processing in the PMA. (13)F.P[sub.i]=Ei/?j=1nEj

In Equation (13), F.P[sub.i] represents the fitness percentage of sensor node 'i' in the task completion efficiency. (14)CH[sub.i]={1ifE[sub.i]=Max(E)0otherwise

In Equation (14), Max(E) represents the maximum task completion efficiency among all sensor nodes in the network. (15)CH.PMA=?[sub.i=1][sup.n]P[sub.i].PMA(S[sub.i,]P[sub.i],A)

Equation (15) signifies that the CH selection with PMA is determined by the summation of the fitness probability P[sub.i] of each sensor node multiplied by its corresponding output from the PMA. This integration ensures that CHs are selected efficiently based on both fitness probability and the parallel processing capabilities of PMA.

3.4. Routing

After the cluster formation and selection, the data are transmitted to the base station (BS) or sink. For this purpose, selecting the shortest path is necessary, and hence an energy-aware routing method for routing data to the BS in an H-WSN has been presented. This method balances energy consumption in the network and prevents network congestion. It considers both the distance to the BS and the energy levels of sensor nodes with potential routes when calculating the path cost. Sensor nodes evaluate multiple paths and select the one with the lowest energy-aware cost, ensuring efficient data transmission while conserving energy and providing a network lifetime. By integrating energy-aware routing techniques into the methodology, optimizing the data delivery to the BS in H-WSNs, the mitigation of energy constraint issues and improvement in network performance are achieved. (16)EnergyawareRouting(PathCost[sub.ij])=Distance[sub.ij]*Energy[sub.ij]

Equation (16), PathCost[sub.ij], represents the cost of the path from sensor node i to j. Distance[sub.ij] indicates the distance between the sensor node 'i' and 'j' and Energy[sub.ij] indicates the energy level of the sensor node 'i' to 'j'. (17)PotentialRoutes={r[sub.1],r[sub.2],…,r[sub.m]}

In Equation (17), Potential Routes represents the set of potential routes from the sensor node to the BS and r[sub.m] indicates the total number of potential routes. (18)Cost(r[sub.k])=?[sub.i=1][sup.n]PathCost[sub.ij]

In Equation (18), Cost(r[sub.k]) represents the energy-aware cost with the route r[sub.k], by summing the path costs of all sensor nodes along the route and ?[sub.i=1][sup.n]PathCost[sub.ij] indicates the summation of the path cost of all sensor nodes 'i' along the route r[sub.k], of both distance and energy. To select the optimal path:(19)Optimalpath-argmin[sub.rk]?PotentialRoutes.Cost(r[sub.k])

Equation (19) represents the selected optimal routing path among the potential routes and argmin[sub.rk]?PotentialRoutes.Cost(r[sub.k]) denotes the process of selecting the route rk with the minimum energy-aware cost among all potential routes.

In the selection of an optimal routing path in H-WSNs by using the energy-aware routing method, efficient data transmission is ensured while minimizing the energy and improving the network performance.

3.5. Anomaly Detection

To improve the network performance and reduce energy consumption, our model aims to build an efficient chi-squared test for feature selection and AlexNet for anomaly detection. In H-WSN, the sensor node collects the data from their environment. The sensor nodes transmit the collected data wirelessly to a data sink for further analysis and processing. Moreover, the collected data are input into our AlexNet models, enabling effective anomaly detection and improving the performance of the IoT network.

3.5.1. Feature Selection

The chi-squared test is a filter-based method and is a well-known feature selection technique. The benefit of this feature selection method is that it is network efficient. A chi-squared test is used in statistics to test the independence of two events. The data are assigned with two variables, observed count OC and expected count EC. Chi-squared measures how the expected count of EC and observed count of OC deviates from each other. The high-level feature is detected by the chi-squared test, which is utilized to identify the most relevant features from the sensor data for anomaly detection. By selecting a subset of innovative features, the chi-squared test reduces the dimension of the data by improving the network efficiency. (20)S[sub.i.c]=?OCi-ECi/ECi

In Equation (20), c represents the degree of freedom, OC is the observed count and EC is the expected count. The relationship is between the independent category feature (predictor) and dependent category feature (response). In our feature selection method, we aim to select the feature with a high dependence value on the utilization of the chi-squared test on the response, and the features are selected and fed to the AlexNet model for training, as shown in Figure 2.

3.5.2. Classification

One well-known DL architecture, AlexNet, is used mainly to identify irregularities in data transfers. In particular, dangers like Mirai and Bash lite attacks might try to enter systems while data are being transferred. The strong capabilities of AlexNet play a crucial role in spotting and stopping these types of intrusion attempts, protecting the security and integrity of the data transfer procedure. To minimize spatial dimensions and preserve the spatial relationships between nearby features, AlexNet makes use of overlapping pooling layers. Fully connected layers, pooling layers, and convolutional layers make up the AlexNet module. These layers work together as a sequential model to extract features. AlexNet contains input, hidden, and output layers. The input layer starts with the convolutional layers that apply an activation function such as the Parametric Rectified Linear Unit (PReLu). This activation function was employed in this investigation to handle the non-linear data, which effectively addresses anomaly detection and helps to avoid overfitting, providing better unseen data and reducing the risk in training time. After the input layer, the hidden layer has pooling layers that scale down the data to reduce the feature dimensionality; finally, fully connected layers learn the data and use them for classification. The use of AlexNet, a state-of-the-art architecture for any anomaly detection task may be highly advantageous for the computer vision fields of ML and intelligent processing problems. During this operation, the AlexNet model analyses incoming sensor data and the devices significantly identified from its normal patterns as anomalies. The classified operation is given by (21)O[sub.i,j,k]=?[sub.l=1][sup.Din]?[sub.l=1][sup.F]?[sub.n=1][sup.F]I[sub.i+m-1,j+n-1,l].K[sub.m,n,l,k]+b[sub.k]

In Equation (21), O[sub.i,j,k] represents the output of the feature map, and I the pixel value of the input image at the location i+m-1,j+n-1,l. (22)PReLU={f[sub.x].xifx<0xifx=0

Equation (22) represents the PReLU activation function in the input layer, where x is the input to the activation function and f[sub.x] is the learnable parameter that adjusts the slope of the negative part of the function. K is the weight of the kernel at the position (m, n) in channel l for filter k and b[sub.k] is the bias team of the filter k. (23)a[sub.i]=b(S[sub.i])={f[sub.x]S[sub.i],S[sub.i]<0S[sub.i]S[sub.i]=0,

In Equation (23), f[sub.x] represents a real number, S[sub.i] is the input value, and b is the PReLU Activation function.

The gradients of PReLU are (24)dai/dSi=b[sup.'](S[sub.i])={f[sub.x],S[sub.i]<01,S[sub.i]=0, (25)dai/dfx={S[sub.i],S[sub.i]<00,S[sub.i]=0,

In Equations (24) and (25) all of the slopes on the left have a starting value of 0. By leveraging the complementary strengths of the AlexNet for anomaly detection, this hybrid model aims to achieve efficient anomaly detection in WSNs to improve network performance and reduce energy consumption.

4. Results and Discussions

EECMCM has been implemented by MATLAB 2023a, with Windows 10 OS, Intel core i7 processor, and 8GB RAM, and their results are shown in the upcoming section.

4.1. Dataset Description

This dataset fills the gap in the public botnet datasets, particularly in the IoT domain. It suggests actual traffic data collected from nine commercial IoT devices that have been verified to be infected with BASHLITE and Mirai.

Dataset link: https://www.kaggle.com/datasets/mkashifn/nbaiot-dataset (accessed on 23 April 2024).

Use of formal techniques in this study:

Formal techniques used in this study are the Energy-Efficient Cluster Head Selection Mechanism for Livestock Industry using Artificial Rabbits Optimization (EECHS-ARO) [33], the Energy-Efficient Cluster Head Selection in Wireless Sensor Networks Using an Improved Grey Wolf Optimization (EECHIGWO) [22], the Osprey Optimization Algorithm based on Energy-Efficient Cluster Head Selection (SWARAM) [15] and Hybrid Snake Whale Optimization (HSWO) [34]. However, previously, there were a number of models that focused on minimization of energy consumption in WSN. These works excelled in results. Hence, these works are taken as formal techniques for comparison.

4.2. Performance Analysis of EECMCM

Operational efficiency is maximized and energy consumption is reduced by optimizing network configuration parameters like node density and network topology. The system performs better and uses its resources more efficiently because of optimized configuration, which guarantees more efficient network operations.

The graph in Figure 3a depicts the random node deployment of heterogeneous nodes in a WSN with 50 nodes and Figure 3b depicts the random node deployment of heterogeneous nodes in a WSN with 100 nodes. The placement of some nodes closer to one another and some farther apart results in a significant change in node density from that of random node deployment.

Figure 4a shows optimal path determination in WSN with 50 nodes. Figure 4b shows optimal path determination in WSN with 100 nodes. Optimally secure determination reduces routing overhead to offer fully secure data transfer. For this, energy-aware routing is considered. This technique effectively prevents network congestion and balances energy consumption within the network.

From Table 1, it is seen that using the dataset the attacks are injected to the model and this model evaluated the attacks. Based on these statistics, the table shows the training time and execution time of each attack based on its features, which is tabulated.

4.3. Comparative Analysis of Proposed Algorithm with Existing Algorithms

4.3.1. Comparative Analysis of Proposed MA with Existing Algorithms

The simulation results for the WSN’s performance, taking into account dead nodes, are shown in Figure 5a, with existing techniques like EECHS-ARO [33], HSWO [34] and SWARAM. When a node’s energy ran out throughout the simulation, that node counted as a dead node. The network lifetime, which was defined as the amount of time until the network’s final node died, was intended to be measured by the simulation. The quantity of alive nodes in the network indicates how many nodes are there. A large number of active nodes in the network improves network performance. The suggested methodology’s alive node performance is evaluated using various node counts and existing algorithms. Figure 5b shows the comparison of alive nodes. The performance evaluation of packets transmitted by the proposed methodology with existing algorithms is presented in Figure 5c. Figure 5d illustrates how the total number of packets received by the base station (BS) is increased by reducing the energy consumption of the nodes during data packet transmission.

The simulation results for communication overhead are graphically shown in Figure 6a for those proposed with existing techniques like EECHS-ARO, HSWO, EECHIGWO, and SWARAM, and Table 2 provides evidence that the suggested method performs better than the existing methods. The existing method has attained a value of 0 for 50 nodes and 5, 14, 11.5, 10.5 and 7.5 for 300 nodes during simulation. For nodes 50, 100, 150, 200, 250, and 300 the proposed method attained 0, 0, 0, 1, 3, and 5, respectively. The proposed value is lower compared with the existing one. Thus, the proposed was better in communication overhead.

EC is shown graphically in Figure 6b and the tabular form is viewed in Table 3; it was found to be lower compared to existing approaches for EECHS-ARO, HSWO, EECHIGWO, and SWARAM with 0.17, 0.15, 0.13, 0.1 for 500 nodes, while 0.8, 0.1, 0.12, 0.15, 0.18, 0.2, 0.22 and 0.25 are the values of rounds 500,1000,1500, 2000, 2500, 3000, 3500, 4000 proposed, which is lower compared with existing approaches. Thus, the proposed approach was better for EC.

The network lifetime of the suggested strategy and the use of the previous models are shown in Figure 6c, where the x-axis presents the no. of nodes and the y-axis represents the network lifetime. This is viewed in Table 4: 4900, 3147, 4048, and 4512 are the values of EECHS-ARO, HSWO, EECHIGWO, and SWARAM, where the proposed approach attained 5107 for 100 nodes. The proposed approach attained 5024, 5542, 5261 and 5217 for 200, 300, 400 and 500 nodes, respectively. The proposed approach attained a higher network lifetime than the existing approaches.

The end-to-end delays of the proposed- and existing-scheme comparison are displayed in Figure 6d and in Table 5. The optimality factor is satisfied by the suggested scheme’s constant attempt to deliver the packet to the best intermediate node. Conversely, existing methods require a significant amount of time to locate the destination node. Additionally, the destination node takes a while to respond, so the average end-to-end delay in the associated scheme is longer than that in the suggested model. The values 2.3, 6.85, 5.8, and 4.48 are those of EECHS-ARO, HSWO, EECHIGWO, and SWARAM and the proposed approach obtained 2.35ms for 100 nodes.

The PDR of the proposed approach is greater, with a value of 98.05. It is compared with existing techniques like EECHS-ARO, HSWO, EECHIGWO, and SWARAM, which obtained 98.72, 90.81,93.74, and 97.45 for 100nodes. The proposed approach obtained 97,96, 95.25, 99 for 200, 300, 400, and 500 nodes, respectively. The PDRs are graphically shown in Figure 6e and the values are displayed in tabular form in Table 6.

The scalability vs. network size of the proposed approach is lower, with a value of 24. It is compared with existing techniques like EECHS-ARO, HSWO, EECHIGWO, and SWARAM, which obtained 43, 50, 68, and 85 for 500 nodes. The values 24, 20, 19, and 15 are the proposed values for 1000, 2000, 3000, and 5000 nodes, respectively. The scalability vs. network size is graphically shown in Figure 6f and the values are displayed in Table 7.

The scalability vs. network load of the proposed approach is higher, with a value of 171. It is compared with existing techniques like EECHS-ARO, HSWO, EECHIGWO, and SWARAM, which obtained 170, 166, 160, and 158 for 5000 nodes. The scalability vs. network size is graphically shown in Figure 6g and the respective values are shown in Table 8. Figure 6h shows the comparison of the cluster head count produced by the existing approach and suggested in each iteration. The throughput graph is displayed in Figure 6i for the proposed and existing approaches.

Table 9 shows the description of the packets delivered to the sink. For 100 nodes, the existing methods delivered 10,000, 16,000, 20,000 and 25,000 packets with EECHS-ARO, HSWO, EECHIGWO, and SWARAM, respectively, and the proposed method received 28,000 packets.

Table 10 shows the description of the scalability of density. For node 500, existing methods attained 60, 60, 55 and 50 for EECHS-ARO, HSWO, EECHIGWO, and SWARAM, and the proposed method obtained 63.

Figure 7 shows average energy effect of the proposed and existing algorithms. Average energy effect is measured to show the superiority of the proposed model in energy consumption. Those proposed, CHOCR [35], IMD-EACBR [36], IDR-DRL-DC [37] and DTC-BR [38], obtained average energy effect of 90, 92, 95, 95 and 90 (%), respectively, thus proving that the proposed model obtained a better average energy effect.

Figure 8 shows the packet loss ratio compared to recent existing works. From the figure, it is clear that the proposed model attained better packet loss, which was due to security measures taken against cyber security attacks. Those proposed, CHOCR [35], IMD-EACBR [36], IDR-DRL-DC [37] and DTC-BR [38], obtained a loss ratio of 12, 15, 17, 21 and 22%, respectively. Thus, overall, the proposed model excels more than previous ones.

Figure 9 shows the robustness of the proposed EECM model. From the figure, the various attacks in the dataset are identified within the minimum time, which has been clearly mentioned. Attacks such as OS Scan, Active Wiretap, ARP MitM, Video Injection, Fuzzing, SSDP Flood, SYN DoS, SSL Renegotiation and Mirai have been focused on in this work. The proposed model obtained 98.05, 98.01, 98.06, 98, 98.01, 98.05, 98.05, 98.05 and 98.01 (%), respectively, where exiting models attained a very low percentage.

Figure 10 shows the computational complexity of the model in terms of time O(N[sup.2]). From this, it has been proven that the proposed model attained a minimum time complexity of 18.9%, while others such as CHOCR [35], IMD-EACBR [36], IDR-DRL-DC [37] and DTC-BR [38] attained 22, 24, 22 and 23 (%), respectively. Thus, the proposed model was proven to be effective.

4.3.2. Comparative Analysis of AlexNet with Existing Algorithm

Empirical findings are obtained from comparing machine learning models, according to accuracy. A range of assessment metrics employed to determine the effectiveness are shown in Figure 11. The percentage of correctly classified data instances relative to the total number of data instances is known as accuracy. A high accuracy of 97.45% is achieved by the CNN, and the 96.81% achieved by the RNN is not far behind. An accuracy of 95.33% is achieved by the ANN. The proposed has achieved 99.11%. From the analysis, CNN obtained 96.56%, KNN obtained 96.4%, RNN obtained 94.77% and the proposed model obtained 99%. Recall and F1 score metrics provide details on recall and precision while capturing all positive instances. With an F1 score of 97.55% and a recall of 97.44%, CNN performs admirably. KNN and RNN have comparable F1 scores and recall rates of approximately 95%. With a recall of 98.23% and an F1 score of 98.89%, the proposed notably beats the existing in both recall and precision.

5. Discussion

In this study, energy consumption is the main goal of the proposed model, and security is also considered. A large number of active nodes in the network improves network performance. The suggested methodology’s live node performance is evaluated using various node counts and existing algorithms. The existing communication overhead attained a value of 0 for 50 nodes and 5, 14, 11.5, 10.5, and 7.5 for 300 nodes during simulation. For nodes 50, 100, 150, 200, 250, and 300 the proposed methodology attain 0, 0, 0, 1, 3, and 5, respectively. Energy consumption for EECHS-ARO, HSWO, EECHIGWO, and SWARAM is 0.17, 0.15, 0.13, and 0.1 for 500 nodes; 0.8, 0.1, 0.12, 0.15, 0.18, 0.2, 0.22 and 0.25 are the values of rounds 500, 1000, 1500, 2000, 2500, 3000, 3500, and 4000 for the proposed model, which shows the supremacy of the proposed model. The average energy effect is measured to show the superiority of the proposed model for energy consumption. For the proposed CHOCR [35], IMD-EACBR [36], IDR-DRL-DC [37] and DTC-BR [38] obtained average energy effect of 90, 92, 95, 95 and 90 (%), respectively. Thus, the energy consumption of the model has been minimized effectively.

6. Conclusions

In the world of technology, H-IoT is thought to be the next big thing, bringing billions of objects and gadgets online for use and analysis. An innovative method known as EEMCM was proposed to address the scalability issues. It enhances the efficiency of anomaly detection in IoT WSNs by combining the MA with the AlexNet architecture. MA was first used for cluster formation and CH selection. Routing path creation was the next step, after which the data were ready for high-level feature extraction. The extracted features were then categorized to find anomalies. The AlexNet architecture gathered high-level features containing model-relevant data as input to identify anomalies and to distinguish between legitimate and possible attacks within the IoT WSNs. The accuracy, precision, recall, and F1-score of the proposed model is 99.11%, 99%, 98.23% and 98.89%. Overall, the EEMCM obtained superior results compared to existing algorithms. In future work, the performance of the EEMCM can be tested in a real-time environment by considering various other performance parameters such as mobility, security, fault tolerance, and load balancing. In addition, we can develop hybrid algorithms to choose the optimal CH.

Author Contributions

Both authors contributed to the conception of the problem setting and overall design of the work. This version was revised and improved by both authors, who also read and approved the final manuscript. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

The research is original and all the figures and tables are created by the authors of this manuscript.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data sets are available in the Kaggle public repository and can be accessed publicly. The implementation of the proposed method is posted for public access in the github link https://github.com/ashokttedcc/HT1.git (accessed on 23 April 2024).

Conflicts of Interest

The authors declare that they have no conflict of interest.

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

References

1. N.-N. Dao; T.V. Phan; U. Sa’ad; J. Kim; T. Bauschert; D.-T. Do; S. Cho Securing Heterogeneous IoT with Intelligent DDoS Attack Behavior Learning., 2021, 16,pp. 1974-1983. DOI: https://doi.org/10.1109/jsyst.2021.3084199.

2. A. Mukherjee; D.K. Jain; L. Yang On-Demand Efficient Clustering for Next Generation IoT Applications: A Hybrid NN Approach., 2021, 21,pp. 25457-25464. DOI: https://doi.org/10.1109/jsen.2020.3026647.

3. R.K. Singh; P.P. Puluckul; R. Berkvens; M. Weyn Energy consumption analysis of LPWAN technologies and lifetime estimation for IoT application., 2020, 20, 4794. DOI: https://doi.org/10.3390/s20174794.

4. N. Subramani; S.K. Perumal; J.S. Kallimani; S. Ulaganathan; S. Bhargava; S. Meckanizi Controlling energy aware clustering and multihop routing protocol for IoT assisted wireless sensor networks., 2022, 34,p. e7106. DOI: https://doi.org/10.1002/cpe.7106.

5. S.K. Chaurasiya; S. Mondal; A. Biswas; A. Nayyar; M.A. Shah; R. Banerjee An Energy-Efficient Hybrid Clustering Technique (EEHCT) for IoT-Based Multilevel Heterogeneous Wireless Sensor Networks., 2023, 11,pp. 25941-25958. DOI: https://doi.org/10.1109/ACCESS.2023.3254594.

6. K. Jaiswal; V. Anand A Grey-Wolf based Optimized Clustering approach to improve QoS in wireless sensor networks for IoT applications., 2021, 14,pp. 1943-1962. DOI: https://doi.org/10.1007/s12083-021-01099-1.

7. L. Sahoo; S.S. Sen; K. Tiwary; S. Moslem; T. Senapati Improvement of Wireless Sensor Network Lifetime via Intelligent Clustering Under Uncertainty., 2024, 12,pp. 25018-25033. DOI: https://doi.org/10.1109/access.2024.3365490.

8. S.S. Elashry; A.S. Abohamama; H.M. Abdul-Kader; M.Z. Rashad; A.F. Ali A Chaotic Reptile Search Algorithm for Energy Con-sumption Optimization in Wireless Sensor Networks., 2024, 12,pp. 38999-39015. DOI: https://doi.org/10.1109/ACCESS.2024.3374781.

9. M. Bilal; E.U. Munir; F.K. Alarfaj Hybrid Clustering and Routing Algorithm with Threshold-Based Data Collection for Hetero-geneous Wireless Sensor Networks., 2022, 22, 5471. DOI: https://doi.org/10.3390/s22155471.

10. A.A.-H. Hassan; W.M. Shah; A.-H.H. Habeb; M.F.I. Othman; M.N. Al-Mhiqani An Improved Energy-Efficient Clustering Protocol to Prolong the Lifetime of the WSN-Based IoT., 2020, 8,pp. 200500-200517. DOI: https://doi.org/10.1109/access.2020.3035624.

11. A.M. Jubair; R. Hassan; A.H.M. Aman; H. Sallehudin; Z.G. Al-Mekhlafi; B.A. Mohammed; M.S. Alsaffar Optimization of clustering in Wireless sensor networks: Techniques and protocols., 2021, 11, 11448. DOI: https://doi.org/10.3390/app112311448.

12. X. Yan; C. Huang; J. Gan; X. Wu Game Theory-Based Energy-Efficient Clustering Algorithm for Wireless Sensor Networks., 2022, 22, 478. DOI: https://doi.org/10.3390/s22020478. PMID: https://www.ncbi.nlm.nih.gov/pubmed/35062439.

13. R. Sharma; V. Vashisht; U. Singh Metaheuristics-based energy efficient clustering in WSNs: Challenges and research contributions., 2020, 10,pp. 253-264. DOI: https://doi.org/10.1049/iet-wss.2020.0102.

14. O.I. Khalaf; C.A.T. Romero; S. Hassan; M.T. Iqbal Mitigating Hotspot Issues in Heterogeneous Wireless Sensor Networks., 2022, 2022,p. 7909472. DOI: https://doi.org/10.1155/2022/7909472.

15. R. Somula; Y. Cho; B.K. Mohanta SWARAM: Osprey Optimization Algorithm-Based Energy-Efficient Cluster Head Selection for Wireless Sensor Network-Based Internet of Things., 2024, 24, 521. DOI: https://doi.org/10.3390/s24020521. PMID: https://www.ncbi.nlm.nih.gov/pubmed/38257614.

16. M. Krichen A Survey on Formal Verification and Validation Techniques for Internet of Things., 2023, 13, 8122. DOI: https://doi.org/10.3390/app13148122.

17. K. Hofer-Schmitz; B. Stojanovic Towards formal verification of IoT protocols: A Review., 2020, 174,p. 107233. DOI: https://doi.org/10.1016/j.comnet.2020.107233.

18. S. Rizvi; R. Orr; A. Cox; P. Ashokkumar; M.R. Rizvi Identifying the attack surface for IoT network., 2020, 9,p. 100162. DOI: https://doi.org/10.1016/j.iot.2020.100162.

19. C. Ionnou Vasos Vassiliou IEEE Computer Society, Institute of Electrical and Electronics Engineers.,

20. N. Almurisi; S. Tadisetty Cloud-based virtualization environment for IoT-based WSN: Solutions, approaches and challenges., 2022, 13,pp. 4681-4703. DOI: https://doi.org/10.1007/s12652-021-03515-z.

21. A. Shukla; S. Tripathi A multi-tier based clustering framework for scalable and energy efficient WSN-assisted IoT network., 2020, 26,pp. 3471-3493. DOI: https://doi.org/10.1007/s11276-020-02277-4.

22. M. Rami Reddy; M.L. Ravi Chandra; P. Venkatramana; R. Dilli Energy-Efficient Cluster Head Selection in Wireless Sensor Networks Using an Improved Grey Wolf Optimization Algorithm., 2023, 12, 35. DOI: https://doi.org/10.3390/computers12020035.

23. T.A. Alghamdi Energy efficient protocol in wireless sensor network: Optimized cluster head selection model., 2020, 74,pp. 331-345. DOI: https://doi.org/10.1007/s11235-020-00659-9.

24. A.F. Raslan; A.F. Ali; A. Darwish; H.M. El-Sherbiny An Improved Sunflower Optimization Algorithm for Cluster Head Selection in the Internet of Things., 2021, 9,pp. 156171-156186. DOI: https://doi.org/10.1109/access.2021.3126537.

25. S.E. Pour; R. Javidan A new energy aware cluster head selection for leach in wireless sensor networks., 2021, 11,pp. 45-53. DOI: https://doi.org/10.1049/wss2.12007.

26. R.K. Poluru; L.K. Ramasamy Optimal cluster head selection using modified rider assisted clustering for IoT., 2020, 14,pp. 2189-2201. DOI: https://doi.org/10.1049/iet-com.2020.0236.

27. S. Sankar; S. Ramasubbareddy; R.K. Dhanaraj; B. Balusamy; P. Gupta; W. Ibrahim; R. Verma Cluster Head Selection for the Internet of Things Using a Sandpiper Opti-mization Algorithm (SOA)., 2023, 2023,p. 3507600. DOI: https://doi.org/10.1155/2023/3507600.

28. M. Bakshi; C. Chowdhury; U. Maulik Energy-efficient cluster head selection algorithm for IoT using modified glow-worm swarm optimization., 2021, 77,pp. 6457-6475. DOI: https://doi.org/10.1007/s11227-020-03536-z.

29. M. Ahmad; B. Shah; A. Ullah; F. Moreira; O. Alfandi; G. Ali; A. Hameed Optimal Clustering in Wireless Sensor Networks for the Internet of Things Based on Memetic Algorithm: MemeWSN., 2021, 2021,p. 8875950. DOI: https://doi.org/10.1155/2021/8875950.

30. A.K. Dwivedi; P.S. Mehra; O. Pal; M.N. Doja; B. Alam EETSP: Energy-efficient two-stage routing protocol for wireless sensor network-assisted Internet of Things., 2021, 34,p. e4965. DOI: https://doi.org/10.1002/dac.4965.

31. I. Kala; S. Karthik; K. Srihari Advanced hybrid secure multipath optimized routing in Internet of Things (IoT)-based WSN., 2021, 34,p. e4782. DOI: https://doi.org/10.1002/dac.4782.

32. R. Yarinezhad; M. Sabaei An optimal cluster-based routing algorithm for lifetime maximization of Internet of Things., 2021, 156,pp. 7-24. DOI: https://doi.org/10.1016/j.jpdc.2021.05.005.

33. R.B.S. Ramalingam; S. Basheer; P. Balasubramanian; M. Rashid; G. Jayaraman EECHS-ARO: Energy-efficient cluster head selection mechanism for livestock industry using artificial rabbits optimization and wireless sensor networks., 2023, 31,pp. 3123-3144. DOI: https://doi.org/10.3934/era.2023158.

34. D. Samiayya; S. Radhika; A. Chandrasekar An optimal model for enhancing network lifetime and cluster head selection using hybrid snake whale optimization., 2023, 16,pp. 1959-1974. DOI: https://doi.org/10.1007/s12083-023-01487-9.

35. K. Lakshmanna; N. Subramani; Y. Alotaibi; S. Alghamdi; O.I. Khalafand; A.K. Nanda Improved Metaheuristic-Driven Energy-Aware Cluster-Based Routing Scheme for IoT-Assisted Wireless Sensor Networks., 2022, 14, 7712. DOI: https://doi.org/10.3390/su14137712.

36. A. Srivastava; R. Paulus Coverage hole aware optimal cluster based routing for wireless sensor network assisted IoT using hybrid deep recurrent neural network., 2022, 35,p. 1. DOI: https://doi.org/10.1002/cpe.7535.

37. S.S. Sebastin; V. Prabhu; V. Parthasarathy An intelligent data routing strategy based on deep reinforcement learning for IoT enabled WSNs., 2023, 6,p. 100298. DOI: https://doi.org/10.1016/j.prime.2023.100298.

38. M.E. Al-Sadoon; A. Jedidi; H. Al-Raweshidy Dual-Tier Cluster-Based Routing in Mobile Wireless Sensor Network for IoT Application., 2023, 11,pp. 4079-4094. DOI: https://doi.org/10.1109/access.2023.3235200.

Figures and Tables

Figure 1: Block Diagram for Proposed Methodology. [Please download the PDF to view the image]

Figure 2: Proposed AlexNet Architecture. [Please download the PDF to view the image]

Figure 3: Random node deployment of heterogeneous nodes in a WSN: (a) with 50 nodes (b) with 100 nodes. [Please download the PDF to view the image]

Figure 4: Optimal path determination in WSN. (a) 50 nodes (b)100 nodes. The green dots represent the cluster heads, blue dots represent the cluster members and the green circles represent the source and destination. [Please download the PDF to view the image]

Figure 5: Comparison of (a) dead nodes, (b) alive nodes, (c) packets transmitted and (d) packets received in the network. [Please download the PDF to view the image]

Figure 6: (a) Communication Overhead; (b) Energy Consumption; (c) Network Lifetime; (d) End—to—End Delay; (e) PDR; (f) Scalability vs. Network size; (g) Scalability vs. Network Load; (h) CH Selection; (i) Throughput. [Please download the PDF to view the image]

Figure 7: Average energy-effect comparison. [Please download the PDF to view the image]

Figure 8: Packet loss-ratio comparison. [Please download the PDF to view the image]

Figure 9: Packet delivery ratio for the comparison of various attacks. [Please download the PDF to view the image]

Figure 10: Time-complexity comparison graph. [Please download the PDF to view the image]

Figure 11: Performance analysis of accuracy, precision, recall and F1-score. [Please download the PDF to view the image]

Table 1: Attack type statistics of proposed model.

Attack TypePacketsTraining Time [min]Execution Time [min]

Recon

1,697,851

33.3

18.9

Man in middle

2,504,267

14.2

20.1

DoS

2,771,276

18.7

34.1

Botnet (Mirai)

764,137

52

66.9

Table 2: Comparative Analysis of Communication Overhead.

MethodsCommunication Overhead
50100150200250300

EECHS-ARO

3.5

6

7

9

14

HSWO

3.5

6

8

11.5

EECHIGWO

2.5

5

7

10.5

SWARAM

1.5

4

5

7.5

PROPOSED

1

3

5

Table 3: Comparative analysis of Energy Consumption (EC).

MethodsEnergy Consumption (EC)
5001000150020002500300035004000

EECHS-ARO

0.17

0.19

0.21

0.23

0.28

0.38

0.42

0.59

HSWO

0.15

0.17

0.2

0.21

0.25

0.35

0.38

0.54

EECHIGWO

0.13

0.15

0.18

0.2

0.23

0.32

0.3

0.45

SWARAM

0.1

0.12

0.15

0.18

0.2

0.28

0.28

0.35

PROPOSED

0.8

0.1

0.12

0.15

0.18

0.2

0.22

0.25

Table 4: Comparative analysis of Network Lifetime.

MethodsNetwork Lifetime
100200300400500

EECHS-ARO

4900

4700

5500

5200

5000

HSWO

3147

3081

4498

4239

3990

EECHIGWO

4048

3723

4689

4505

4254

SWARAM

4512

4321

5169

4933

4689

PROPOSED

5107

5024

5542

5261

5217

Table 5: Comparative analysis of end-to-end delay.

MethodsEnd-to-End Delay
100200300400500

EECHS-ARO

2.3

4.3

5.08

6.25

2.01

HSWO

6.85

8.02

9.47

9.86

6.15

EECHIGWO

5.8

7.13

9

9.31

5.18

SWARAM

4.48

5.33

7.32

8.69

3.39

PROPOSED

2.35

4.25

5.5

6.1

2.2

Table 6: Comparative analysis of PDR.

MethodsPDR
100200300400500

EECHS-ARO

98.72

96.5

95.25

94.75

99.5

HSWO

90.81

88.95

86.87

84.78

92.81

EECHIGWO

93.74

91.5

89.96

88.8

94.81

SWARAM

97.45

95.44

94.28

93.74

98.14

PROPOSED

98.05

97

96

95.25

99

Table 7: Comparative analysis of scalability with network size.

MethodsScalability with Network Size
5001000200030005000

EECHS-ARO

43

42

41

24

20

HSWO

50

43

36

30

20

EECHIGWO

68

60

50

40

38

SWARAM

85

70

60

55

55

PROPOSED

24

24

20

19

15

Table 8: Comparative analysis of Scalability with Network Load.

MethodsScalability with Network Load
5001000200030005000

EECHS-ARO

100

130

150

160

170

HSWO

86

111

120

130

166

EECHIGWO

85

100

111

121

160

SWARAM

80

95

100

111

158

PROPOSED

111

131

153

165

171

Table 9: Comparative analysis of packets delivered to sink.

MethodsPackets Delivered to Sink
1002505001000125022504000

EECHS-ARO

10,000

15,000

22,000

34,000

32,000

60,000

79,000

HSWO

16,000

25,000

30,000

45,000

58,000

80,000

130,000

EECHIGWO

20,000

30,000

35,000

54,000

61,000

105,000

147,000

SWARAM

25,000

35,000

40,000

64,000

70,000

110,000

157,000

PROPOSED

28,000

38,000

42,000

65,000

70,100

120,000

158,000

Table 10: Comparative analysis of scalability of density.

MethodsScalability of Density
5001000200030005000

EECHS-ARO

60

75

80

100

145

HSWO

60

70

75

80

124

EECHIGWO

55

70

75

75

120

SWARAM

50

60

58

60

111

PROPOSED

63

75

85

123

161

Author Affiliation(s):

[1] Department of Biomedical Engineering, Kongunadu College of Engineering and Technology, Namakkal City 621215, India

[2] Department of Electrical and Electronics Engineering, Bharathidasan Institute of Technology, Anna University, Tiruchirappalli City 620024, India; [emailprotected]

Author Note(s):

[*] Correspondence: [emailprotected]

DOI: 10.3390/su16114756

COPYRIGHT 2024 MDPI AG
No portion of this article can be reproduced without the express written permission from the copyright holder.

Copyright 2024 Gale, Cengage Learning. All rights reserved.


Energy-Efficient Secure Routing for a Sustainable Heterogeneous IoT Network Management. (2024)
Top Articles
Latest Posts
Article information

Author: Reed Wilderman

Last Updated:

Views: 6023

Rating: 4.1 / 5 (72 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Reed Wilderman

Birthday: 1992-06-14

Address: 998 Estell Village, Lake Oscarberg, SD 48713-6877

Phone: +21813267449721

Job: Technology Engineer

Hobby: Swimming, Do it yourself, Beekeeping, Lapidary, Cosplaying, Hiking, Graffiti

Introduction: My name is Reed Wilderman, I am a faithful, bright, lucky, adventurous, lively, rich, vast person who loves writing and wants to share my knowledge and understanding with you.