Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

TSRP: A Novel Trust-Based and Energy-Aware Secure Routing Protocol for Resource-Constrained Wireless Sensor Networks

  • ORIGINAL CONTRIBUTION
  • Published:
Journal of The Institution of Engineers (India): Series B Aims and scope Submit manuscript

Abstract

This research introduces a novel method to enhance Wireless Sensor Network (WSN) security using a multi-dimensional trust evaluation framework called TSRP. Even with advancements, WSNs face major security risks, necessitating effective measures to prevent excessive stress on communication devices. The system evaluates trust, which is essential for ensuring the security of sensor nodes in WSNs. Instead of relying solely on encryption, this system assigns trust scores to individual relay nodes and derives reputation scores from neighboring nodes. This method effectively identifies trustworthy relay nodes while minimizing the impact on resources. The authentication method uses a progressive critical generation method and ensures resource efficiency through multi-dimensional trust calculation. The system was designed to create an equilibrium between the enhancement of the usage of the resources and the strengthening of security. Specifically, the goal is to maintain nodes with 74% energy efficiency while exhibiting a more predictable energy loss pattern. The results demonstrate an 81 percent reduction in energy fluctuations during operation, coupled with a 36 percent improvement in speed compared to current methods. Simulations confirm that the proposed system has superior data transmission performance and remarkable energy savings compared to existing methods. This provides a potential alternative for secure protocols in WSNs that feature resilience and resource awareness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. B. Pourghebleh, N.J. Navimipour, Data aggregation mechanisms in the Internet of things: a systematic review of the literature and recommendations for future research. J. Netw. Comput. Appl. 97, 23–34 (2017)

    Article  Google Scholar 

  2. J.M. Kizza, Internet of things (Iot): growth, challenges, and security, in Guide to computer network security. ed. by J.M. Kizza (Springer, Cham, 2024), pp.557–573

    Chapter  Google Scholar 

  3. B. Pourghebleh, N. Hekmati, Z. Davoudnia, M. Sadeghi, A roadmap towards energy-efficient data fusion methods in the internet of things. Concurr. Comput. Pract. Exp. (2022). https://doi.org/10.1002/cpe.6959

    Article  Google Scholar 

  4. K. Haseeb, Z. Jan, F.A. Alzahrani, G. Jeon, A secure mobile wireless sensor networks based protocol for smart data gathering with cloud. Comput. Electr. Eng. 97, 107584 (2022)

    Article  Google Scholar 

  5. M.-S. Shahryari, L. Farzinvash, M.-R. Feizi-Derakhshi, A. Taherkordi, High-throughput and energy-efficient data gathering in heterogeneous multi-channel wireless sensor networks using genetic algorithm. Ad Hoc Netw. 139, 103041 (2023)

    Article  Google Scholar 

  6. R. Priyadarshi, Energy-efficient routing in wireless sensor networks: a meta-heuristic and artificial intelligence-based approach: a comprehensive review. Arch. Comput. Methods Eng. 31, 2109–2137 (2024)

    Article  Google Scholar 

  7. P. Aruchamy, S. Gnanaselvi, D. Sowndarya, P. Naveenkumar, An artificial intelligence approach for energy-aware intrusion detection and secure routing in internet of things-enabled wireless sensor networks. Concurr. Comput. Pract. Exp. 35(23), e7818 (2023)

    Article  Google Scholar 

  8. J. Wang, Y. Liu, S. Rao, X. Zhou, J. Hu, A novel self-adaptive multi-strategy artificial bee colony algorithm for coverage optimization in wireless sensor networks. Ad Hoc Netw. 150, 103284 (2023)

    Article  Google Scholar 

  9. M. Zarei, O. Zarei, M. Karimi, M.R. Skandari, M. Haghighatjoo, M.W. Khordehbinan, The application of multi-criteria decision analysis in gaining a premier sort of stability in airplane safety. Safety Reliab. (2024). https://doi.org/10.1080/09617353.2024.2303699

    Article  Google Scholar 

  10. B.G. Sheena, N. Snehalatha, Multi-objective metaheuristic optimization-based clustering with network slicing technique for Internet of Things-enabled wireless sensor networks in 5G systems. Trans. Emerg. Telecommun. Technol. 34(8), e4626 (2023)

    Article  Google Scholar 

  11. M. A. Tofighi, B. Ousat, J. Zandi, E. Schafir, A. Kharraz, Constructs of deceit: exploring nuances in modern social engineering attacks. In: International conference on detection of intrusions and malware, and vulnerability assessment. pp. 107–127 Springer, Cham (2024) https://doi.org/10.1007/978-3-031-64171-8_6

  12. M. Mohseni, F. Amirghafouri, B. Pourghebleh, CEDAR: a cluster-based energy-aware data aggregation routing protocol in the internet of things using capuchin search algorithm and fuzzy logic. Peer-to-Peer Netw. Appl. 16, 189–209 (2022)

    Article  Google Scholar 

  13. S. Urooj, S. Lata, S. Ahmad, S. Mehfuz, S. Kalathil, Cryptographic data security for reliable wireless sensor network. Alex. Eng. J. 72, 37–50 (2023)

    Article  Google Scholar 

  14. M. Zhang, R. Feng, H. Zhang, Y. Su, A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks. Futur. Gener. Comput. Syst. 145, 466–477 (2023)

    Article  Google Scholar 

  15. A. Feroz Khan, G. Anandharaj, A cognitive energy efficient and trusted routing model for the security of wireless sensor networks: CEMT. Wireless Person. Commun. 119(4), 3149–3159 (2021)

    Article  Google Scholar 

  16. S.S. Babu, N. Geethanjali, Lifetime improvement of wireless sensor networks by employing trust index optimized cluster head routing (TIOCHR). Measur. Sens. 32, 101068 (2024)

    Article  Google Scholar 

  17. V. Hayyolalam, B. Pourghebleh, A.A. Pourhaji Kazem, Trust management of services (TMoS): Investigating the current mechanisms. Trans. Emerg. Telecommun. Technol. 31(10), e4063 (2020)

    Article  Google Scholar 

  18. T. Khan et al., ETERS: a comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs. Futur. Gener. Comput. Syst. 125, 921–943 (2021)

    Article  Google Scholar 

  19. V. Mythili, A. Suresh, M.M. Devasagayam, R. Dhanasekaran, SEAT-DSR: spatial and energy aware trusted dynamic distance source routing algorithm for secure data communications in wireless sensor networks. Cogn. Syst. Res. 58, 143–155 (2019)

    Article  Google Scholar 

  20. M. Revanesh, J.M. Acken, V. Sridhar, DAG block: trust aware load balanced routing and lightweight authentication encryption in WSN. Futur. Gener. Comput. Syst. 140, 402–421 (2023)

    Article  Google Scholar 

  21. M. Altuwairiqi, An optimized multi-hop routing protocol for wireless sensor network using improved honey badger optimization algorithm for efficient and secure QoS. Comput. Commun.. Commun. (2023). https://doi.org/10.1016/j.comcom.2023.08.011

    Article  Google Scholar 

  22. B. Kranthikumar, R. Leela Velusamy, Trust aware secured energy efficient fuzzy clustering-based protocol in wireless sensor networks. Soft. Comput.Comput (2023). https://doi.org/10.1007/s00500-023-08098-9

    Article  Google Scholar 

  23. K. Dinesh, S. Santhosh Kumar, Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network. Int. J. Info. Secur. 23, 199–223 (2023)

    Article  Google Scholar 

  24. D. Hemanand, P. Sridhar, C. Priya, P. Sathish Kumar, Trust aware clustering based secure routing techniques in wireless sensor network. J. Intell. Fuzzy Syst. 44, 8785 (2023)

    Article  Google Scholar 

  25. M. Essam, E. Shaaban, Enhancing S-LEACH security for wireless sensor networks. Int. J. Appl. Comput 4(2), 101–107 (2011)

    Google Scholar 

  26. L. B. Oliveira, H. C. Wong, M. Bern, R. Dahab, A. A. F. Loureiro, SecLEACH-A random key distribution solution for securing clustered sensor networks. In: Fifth IEEE international symposium on network computing and applications (NCA'06), IEEE, pp. 145–154 (2006)

  27. W. Y. Alghamdi, H. Wu, S. S. Kanhere, Reliable and secure end-to-end data aggregation using secret sharing in wsns. In: 2017 IEEE wireless communications and networking conference (WCNC), IEEE, pp. 1–6 (2017)

  28. S. Santhosh Kumar, Y. Palanichamy, M. Selvi, S. Ganapathy, A. Kannan, S.P. Perumal, Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks. Wireless Netw.Netw. 27, 3873–3894 (2021)

    Article  Google Scholar 

  29. R. Logambigai, A. Kannan, Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Netw. 22, 945–957 (2016)

    Article  Google Scholar 

Download references

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yameng Bai.

Ethics declarations

Conflict of interest

No competing interests to declare.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bai, Y., Xue, Y., Meng, J. et al. TSRP: A Novel Trust-Based and Energy-Aware Secure Routing Protocol for Resource-Constrained Wireless Sensor Networks. J. Inst. Eng. India Ser. B (2024). https://doi.org/10.1007/s40031-024-01158-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s40031-024-01158-0

Keywords