Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A Multi-Layered Assessment System for Trustworthiness Enhancement and Reliability for Industrial Wireless Sensor Networks

  • Research
  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The decision-making process in Industrial Wireless Sensor Networks heavily relies on the information provided by smart sensors. Ensuring the trustworthiness of these sensors is essential to prolong the lifetime of the network. Additionally, dependable data transmission by sensor nodes is crucial for effective decision-making. Trust management approaches play a vital role in safeguarding industrial sensor networks from internal threats, enhancing security, dependability, and network resilience. However, existing trust management schemes often focus solely on communication behaviour to calculate trust values, potentially leading to incorrect decisions amidst prevalent malicious attacks. Moreover, these schemes often fail to meet the resource and dependability requirements of IWSNs. To address these limitations, this paper proposes a novel hybrid Trust Management Scheme called the Multi-layered Assessment System for Trustworthiness Enhancement and Reliability (MASTER). The MASTER scheme employs a clustering approach within a hybrid architecture to reduce communication overhead, effectively detecting and mitigating various adversarial attacks such as Sybil, Blackhole, Ballot stuffing, and On–off attacks with minimal overheads. This multifactor trust scheme integrates both communication-based trust and data-based trust during trust estimation, aiming to improve the lifetime of industrial sensor networks. Furthermore, the proposed MASTER scheme utilizes a flexible weighting scheme that assigns more weight to recent interactions during both direct and recommendation (indirect) trust evaluation. This approach ensures robust and precise trust values tailored to the specific network scenario. To efficiently process and glean insights from dispersed data, machine learning algorithms are employed, offering a suitable solution. Experimental results demonstrate the superior performance of the MASTER scheme in several key metrics compared to recent trust models. For instance, when 30% of malicious Sensor Nodes (SNs) exist in a network comprising 500 sensor nodes, the MASTER scheme achieves a malicious behaviour detection rate of 97%, surpassing the rates of other models. Even after the occurrence of malicious SNs exceeding 30%, the False Negative Rate (FNR) in the MASTER scheme remains lower than other models due to adaptive trust functions employed at each level. With 50% malicious SNs in the network, the MASTER scheme achieves a malicious behaviour detection accuracy of 91%, outperforming alternative models. Moreover, the average energy consumption of SNs in the MASTER scheme is significantly lower compared to other schemes, owing to its elimination of unnecessary transactions through clustered topology utilization. Specifically, with 30% and 50% malicious SNs in the network, the MASTER scheme achieves throughput rates of 150 kbps and 108 kbps, respectively, demonstrating its efficiency in challenging network scenarios. Overall, the proposed MASTER scheme offers a comprehensive solution for enhancing security, trustworthiness, and collaboration among sensor nodes in IWSNs, while achieving superior performance in various metrics compared to existing trust models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig.4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data availability

The datasets generated and/or analyzed during the current study are available from the corrresponding author on reasonable request.

References

  1. Fang, W., Zhang, W., Chen, W., Liu, Y., & Tang, C. (2020). TMSRS: Trust management-based secure routing scheme in industrial wireless sensor network with fog computing. Wireless Networks, 26, 3169–3182.

    Article  Google Scholar 

  2. Yang, L., Yinzhi, Lu., Yang, S. X., Guo, T., & Liang, Z. (2020). A secure clustering protocol with fuzzy trust evaluation and outlier detection for industrial wireless sensor networks. IEEE Transactions on Industrial Informatics, 17(7), 4837–4847.

    Article  Google Scholar 

  3. Jiewu, L., Ye, S., Man Zhou, J., Zhao, L., Liu, Q., Guo, W., Cao, W., & Leijie, Fu. (2020). Blockchain-secured smart manufacturing in industry 4.0: A survey. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 51, 237–252.

    Google Scholar 

  4. Leontaris, L., Mitsiaki, A., Charalampous, P., Dimitriou, N., Leivaditou, E., Karamanidis, A., Papageorgiou, E. (2023). A blockchain-enabled deep residual architecture for accountable, in-situ quality control in industry 4.0 with minimal latency. Computers in Industry, 149, 103919.

  5. Saidi, A., Benahmed, K., & Seddiki, N. (2020). Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks. Ad Hoc Networks. https://doi.org/10.1016/j.adhoc.2020.102215

    Article  Google Scholar 

  6. Kim, T.-H., RekhaGoyat, M. K., Rai, G. K., Buchanan, W. J., Saha, R., & Thomas, R. (2019). A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks. IEEE Access, 7, 184133–184144.

    Article  Google Scholar 

  7. Anwar, R. W., AnazidaZainal, FatmaOutay, Yasar, A., & Iqbal, S. (2019). BTEM: Belief based trust evaluation mechanism for wireless sensor networks. Future Generation Computer Systems, 96, 605–616.

    Article  Google Scholar 

  8. Rathee, G., Balasaraswathi, M., Prabhu Chandran, K., Gupta, S. D., & Boopathi, C. S. (2021). A secure WSN sensors communication in industry 4.0 using blockchain technology. Journal of Ambient Intelligence and Humanized Computing, 12, 533–545.

    Article  Google Scholar 

  9. Jingwen, W., Jing, X., Yan, Z., Yulong, Fu., Pedrycz, W., & Yang, L. T. (2020). A Survey on trust evaluation based on machine learning. ACM Computing Surveys (CSUR), 53, 1–36.

    Google Scholar 

  10. Ravikumar, P., Ganesh, P., & Kumar,. (2024). A novel energy-efficient routing protocol for industrial WSN using hybrid COOT-LS algorithm with LSTM-based DOM prediction. International Journal of Communication Systems. https://doi.org/10.1002/dac.5656

    Article  Google Scholar 

  11. Dinesh, K., & Svn, S. K. (2024). GWO-SMSLO: Grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networks. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-024-01708-9

    Article  Google Scholar 

  12. Anitha, S., Saravanan, S., & Chandrasekar, A. (2023). Trust management based multidimensional secure cluster with RSA cryptography algorithm in WSN for secure data transmission. Measurement: Sensors. https://doi.org/10.1016/j.measen.2023.100889

    Article  Google Scholar 

  13. Khan, T., Singh, K., Ahmad, K., & Ahmad, K. A. B. (2023). A secure and dependable trust assessment (SDTS) scheme for industrial communication networks. Scientific Reports, 13(1), 1910.

    Article  Google Scholar 

  14. Yang, L., Yang, S. X., Li, Y., Yinzhi, Lu., & Guo, T. (2022). Generative adversarial learning for trusted and secure clustering in industrial wireless sensor networks. IEEE Transactions on Industrial Electronics, 70(8), 8377–8387.

    Article  Google Scholar 

  15. Khan, T., Singh, K., Hasan, M. H., Khaleel Ahmad, G., Reddy, T., Mohan, S., & Ahmadian, A. (2021). ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs. Future Generation Computer Systems, 125, 921–943.

    Article  Google Scholar 

  16. Shaikh, R. A., Jameel, H., d’Auriol, B. J., Lee, H., & Lee, S. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20, 1698–1712.

    Article  Google Scholar 

  17. Li, X., Zhou, F., & Junping, Du. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE transactions on information forensics and security, 8(6), 924–935.

    Article  Google Scholar 

  18. Talbi, S., et al. (2017). Adaptive and dual data-communication trust scheme for clustered wireless sensor networks. Telecommunication Systems, 65, 605–619.

    Article  Google Scholar 

  19. Singh, M., et al. (2017). A lightweight trust mechanism and overhead analysis for clustered WSN. IETE Journal of Research, 63(3), 297–308.

    Article  Google Scholar 

  20. Khan, T., Singh, K., Shariq, M., Khaleel Ahmad, K. S., Savita, A. A., Salahshour, S., & Conti, M. (2023). An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach. Computer Communications, 209, 217–229.

    Article  Google Scholar 

  21. Alhayani, B., Kwekha-Rashid, A. S., Mahajan, H. B., Ilhan, H., Uke, N., Alkhayyat, A., & Mohammed, H. J. (2023). 5G standards for the Industry 4.0 enabled communication systems using artificial intelligence: perspective of smart healthcare system. Applied nanoscience, 13, 1807–1817.

    Article  Google Scholar 

  22. Demertzis, K., Iliadis, L., Tziritas, N., & Kikiras, P. (2020). Anomaly detection via blockchained deep learning smart contracts in industry 4.0. Neural Computing and Applications, 32, 17361–17378.

    Article  Google Scholar 

  23. Leng, J., Ruan, G., Jiang, P., Xu, K., Liu, Q., Zhou, X., Liu, C. (2020). Blockchain-empowered sustainable manufacturing and product lifecycle management in industry 4.0: A survey. Renewable and sustainable energy reviews, 132, 110112.

  24. Jayasinghe, U., Lee, GyuMyoung, Um, T.-W., & Shi, Qi. (2018). Machine learning based trust computational model for WSN services. IEEE Transactions on Sustainable Computing, 4(1), 39–52.

    Article  Google Scholar 

  25. Kwon, S., Jeong, J., & Shon, T. (2018). Toward security enhanced provisioning in industrial IoT systems. Sensors, 18(12), 4372.

    Article  Google Scholar 

  26. Balasundaram, A., Sidheswar Routray, A. V., Prabu, P. K., Malla, P. P., & Maiti, M. (2023). Internet of things (WSN) based smart healthcare system for efficient diagnostics of health parameters of patients in emergency care. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2023.3246065

    Article  Google Scholar 

  27. Aruchamy, P., Gnanaselvi, S., Sowndarya, D., & Naveenkumar, P. (2023). An artificial intelligence approach for energy-aware intrusion detection and secure routing in internet of things-enabled wireless sensor networks. Concurrency and Computation: Practice and Experience, 35(23), e7818.

    Article  Google Scholar 

  28. Abuhasel, Khaled Ali. A zero-trust network-based access control scheme for sustainable and resilient industry 5.0. IEEE Access (2023)

  29. Paruthi Ilam, V. P., Prasanth, A., Manikandan, S. P., & DeviSowndarya, K. K. (2023). A hybrid ANFIS reptile optimization algorithm for energy-efficient inter-cluster routing in internet of things-enabled wireless sensor networks. Peer-to-Peer Networking and Applications, 16(2), 1049–1068.

    Article  Google Scholar 

  30. Kavitha, V., & Ganapathy, K. (2022). Galactic swarm optimized convolute network and cluster head elected energy-efficient routing protocol in WSN. Sustainable Energy Technologies and Assessments. https://doi.org/10.1016/j.seta.2022.102154

    Article  Google Scholar 

  31. Smache, M., Olivereau, A., Franco-Rondisson, T., Tria, A. (2019). Time synchronization attack scenarios and analysis of effective self-detection parameters in a distributed industrial wireless sensor network. in 2019 17th international conference on privacy, Security and Trust (PST) (pp. 1–5). IEEE.

  32. Zhang, W., Sun, H., Fang, W., Zhu, C., & Jia, G. (2023). Trust evaluation and decision based on ds evidence theory: Early models and future perspectives. IEEE Access, 11, 16032–16041.

    Article  Google Scholar 

  33. Roy, P. K., & Bhattacharya, A. (2022). SDIWSN: A software-defined networking-based authentication protocol for real-time data transfer in industrial wireless sensor networks. IEEE Transactions on Network and Service Management, 19(3), 3465–3477.

    Article  Google Scholar 

  34. Khan, T., & Singh, K. (2023). RTM: Realistic weight-based reliable trust model for large scale WSNs. Wireless Personal Communications, 129(2), 953–991.

    Article  Google Scholar 

  35. Nancy, P., Muthurajkumar, S., Sannasi Ganapathy, S. V. N., Kumar, S., Selvi, M., & Arputharaj, K. (2020). Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Communications, 14(5), 888–895.

    Article  Google Scholar 

  36. Dinesh, K., & Santhosh Kumar, S. V. N. (2023). Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network. International Journal of Information Security. https://doi.org/10.1007/s10207-023-00737-4

    Article  Google Scholar 

  37. Bangali, H., Paul Rodrigues, V., Pandimurugan, S. R., Santhosh Kumar, S. V. N., Selvi, M., & Kannan, A. (2023). Prediction of middle box-based attacks in internet of healthcare things using ranking subsets and convolutional neural network. Wireless Networks. https://doi.org/10.1007/s11276-023-03603-2

    Article  Google Scholar 

  38. Naga, S. V., Kumar, S., Yesuraj, R., Munuswamy, S., & Arputharaj, K. (2023). A comprehensive survey on certificate-less authentication schemes for vehicular ad hoc networks in intelligent transportation systems. Sensors, 23(5), 2682.

    Article  Google Scholar 

  39. Rajkumar, Y., & Santhosh Kumar, S. V. N. (2024). An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks. Wireless Networks, 30(1), 335–362.

    Article  Google Scholar 

  40. Rajasoundaran, S., Santhosh Kumar, S. V. N., Selvi, M., Thangaramya, K., & Arputharaj, K. (2024). Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks. Wireless Networks, 30(1), 209–231.

    Article  Google Scholar 

  41. Jayashree, S., & Santhosh Kumar, S. V. N. (2024). LAPEP—lightweight authentication protocol with enhanced privacy for effective secured communication in vehicular ad-hoc network. Wireless Networks, 30(1), 151–178.

    Article  Google Scholar 

  42. Khan, T., & Singh, K. (2024). DTMS: A Dual trust-based multi-level sybil attack detection approach in WSNs. Wireless Personal Communications, 134(3), 1389–1420.

    Article  Google Scholar 

Download references

Acknowledgement

The authors extend their appreciation to the Deanship of Scientific Research and Graduate Studies at King Khalid University for funding this work through Large Research Project under grant number RGP2/496/45.

Funding

The authors extend their appreciation to the Deanship of Scientific Research and Graduate Studies at King Khalid University for funding this work through Large Research Project under grant number RGP2/496/45.

Author information

Authors and Affiliations

Authors

Contributions

CRediT auMohd Anas Khan: Writing—original draft, Methodology. Shalu:Writing—original draft, Methodology, Software, Validation, Visualization. Quadri Noorulhasan Naveed: Conceptualization, Formal analysis, Investigation. Ayodele Lasisi: Conceptualization, Writing—review & editing, Methodology. Sheetal Kaushik: Conceptualization, Writing, Formal analysis, Investigation. Sunil Kumar: Supervision, Formal analysis, Investigation, Editing.

Corresponding author

Correspondence to Sheetal Kaushik.

Ethics declarations

Conflict of interest

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, M.A., Shalu, Naveed, Q.N. et al. A Multi-Layered Assessment System for Trustworthiness Enhancement and Reliability for Industrial Wireless Sensor Networks. Wireless Pers Commun 137, 1997–2036 (2024). https://doi.org/10.1007/s11277-024-11391-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-024-11391-x

Keywords