Abstract
This research introduces a novel method to enhance Wireless Sensor Network (WSN) security using a multi-dimensional trust evaluation framework called TSRP. Even with advancements, WSNs face major security risks, necessitating effective measures to prevent excessive stress on communication devices. The system evaluates trust, which is essential for ensuring the security of sensor nodes in WSNs. Instead of relying solely on encryption, this system assigns trust scores to individual relay nodes and derives reputation scores from neighboring nodes. This method effectively identifies trustworthy relay nodes while minimizing the impact on resources. The authentication method uses a progressive critical generation method and ensures resource efficiency through multi-dimensional trust calculation. The system was designed to create an equilibrium between the enhancement of the usage of the resources and the strengthening of security. Specifically, the goal is to maintain nodes with 74% energy efficiency while exhibiting a more predictable energy loss pattern. The results demonstrate an 81 percent reduction in energy fluctuations during operation, coupled with a 36 percent improvement in speed compared to current methods. Simulations confirm that the proposed system has superior data transmission performance and remarkable energy savings compared to existing methods. This provides a potential alternative for secure protocols in WSNs that feature resilience and resource awareness.
Similar content being viewed by others
References
B. Pourghebleh, N.J. Navimipour, Data aggregation mechanisms in the Internet of things: a systematic review of the literature and recommendations for future research. J. Netw. Comput. Appl. 97, 23–34 (2017)
J.M. Kizza, Internet of things (Iot): growth, challenges, and security, in Guide to computer network security. ed. by J.M. Kizza (Springer, Cham, 2024), pp.557–573
B. Pourghebleh, N. Hekmati, Z. Davoudnia, M. Sadeghi, A roadmap towards energy-efficient data fusion methods in the internet of things. Concurr. Comput. Pract. Exp. (2022). https://doi.org/10.1002/cpe.6959
K. Haseeb, Z. Jan, F.A. Alzahrani, G. Jeon, A secure mobile wireless sensor networks based protocol for smart data gathering with cloud. Comput. Electr. Eng. 97, 107584 (2022)
M.-S. Shahryari, L. Farzinvash, M.-R. Feizi-Derakhshi, A. Taherkordi, High-throughput and energy-efficient data gathering in heterogeneous multi-channel wireless sensor networks using genetic algorithm. Ad Hoc Netw. 139, 103041 (2023)
R. Priyadarshi, Energy-efficient routing in wireless sensor networks: a meta-heuristic and artificial intelligence-based approach: a comprehensive review. Arch. Comput. Methods Eng. 31, 2109–2137 (2024)
P. Aruchamy, S. Gnanaselvi, D. Sowndarya, P. Naveenkumar, An artificial intelligence approach for energy-aware intrusion detection and secure routing in internet of things-enabled wireless sensor networks. Concurr. Comput. Pract. Exp. 35(23), e7818 (2023)
J. Wang, Y. Liu, S. Rao, X. Zhou, J. Hu, A novel self-adaptive multi-strategy artificial bee colony algorithm for coverage optimization in wireless sensor networks. Ad Hoc Netw. 150, 103284 (2023)
M. Zarei, O. Zarei, M. Karimi, M.R. Skandari, M. Haghighatjoo, M.W. Khordehbinan, The application of multi-criteria decision analysis in gaining a premier sort of stability in airplane safety. Safety Reliab. (2024). https://doi.org/10.1080/09617353.2024.2303699
B.G. Sheena, N. Snehalatha, Multi-objective metaheuristic optimization-based clustering with network slicing technique for Internet of Things-enabled wireless sensor networks in 5G systems. Trans. Emerg. Telecommun. Technol. 34(8), e4626 (2023)
M. A. Tofighi, B. Ousat, J. Zandi, E. Schafir, A. Kharraz, Constructs of deceit: exploring nuances in modern social engineering attacks. In: International conference on detection of intrusions and malware, and vulnerability assessment. pp. 107–127 Springer, Cham (2024) https://doi.org/10.1007/978-3-031-64171-8_6
M. Mohseni, F. Amirghafouri, B. Pourghebleh, CEDAR: a cluster-based energy-aware data aggregation routing protocol in the internet of things using capuchin search algorithm and fuzzy logic. Peer-to-Peer Netw. Appl. 16, 189–209 (2022)
S. Urooj, S. Lata, S. Ahmad, S. Mehfuz, S. Kalathil, Cryptographic data security for reliable wireless sensor network. Alex. Eng. J. 72, 37–50 (2023)
M. Zhang, R. Feng, H. Zhang, Y. Su, A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks. Futur. Gener. Comput. Syst. 145, 466–477 (2023)
A. Feroz Khan, G. Anandharaj, A cognitive energy efficient and trusted routing model for the security of wireless sensor networks: CEMT. Wireless Person. Commun. 119(4), 3149–3159 (2021)
S.S. Babu, N. Geethanjali, Lifetime improvement of wireless sensor networks by employing trust index optimized cluster head routing (TIOCHR). Measur. Sens. 32, 101068 (2024)
V. Hayyolalam, B. Pourghebleh, A.A. Pourhaji Kazem, Trust management of services (TMoS): Investigating the current mechanisms. Trans. Emerg. Telecommun. Technol. 31(10), e4063 (2020)
T. Khan et al., ETERS: a comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs. Futur. Gener. Comput. Syst. 125, 921–943 (2021)
V. Mythili, A. Suresh, M.M. Devasagayam, R. Dhanasekaran, SEAT-DSR: spatial and energy aware trusted dynamic distance source routing algorithm for secure data communications in wireless sensor networks. Cogn. Syst. Res. 58, 143–155 (2019)
M. Revanesh, J.M. Acken, V. Sridhar, DAG block: trust aware load balanced routing and lightweight authentication encryption in WSN. Futur. Gener. Comput. Syst. 140, 402–421 (2023)
M. Altuwairiqi, An optimized multi-hop routing protocol for wireless sensor network using improved honey badger optimization algorithm for efficient and secure QoS. Comput. Commun.. Commun. (2023). https://doi.org/10.1016/j.comcom.2023.08.011
B. Kranthikumar, R. Leela Velusamy, Trust aware secured energy efficient fuzzy clustering-based protocol in wireless sensor networks. Soft. Comput.Comput (2023). https://doi.org/10.1007/s00500-023-08098-9
K. Dinesh, S. Santhosh Kumar, Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network. Int. J. Info. Secur. 23, 199–223 (2023)
D. Hemanand, P. Sridhar, C. Priya, P. Sathish Kumar, Trust aware clustering based secure routing techniques in wireless sensor network. J. Intell. Fuzzy Syst. 44, 8785 (2023)
M. Essam, E. Shaaban, Enhancing S-LEACH security for wireless sensor networks. Int. J. Appl. Comput 4(2), 101–107 (2011)
L. B. Oliveira, H. C. Wong, M. Bern, R. Dahab, A. A. F. Loureiro, SecLEACH-A random key distribution solution for securing clustered sensor networks. In: Fifth IEEE international symposium on network computing and applications (NCA'06), IEEE, pp. 145–154 (2006)
W. Y. Alghamdi, H. Wu, S. S. Kanhere, Reliable and secure end-to-end data aggregation using secret sharing in wsns. In: 2017 IEEE wireless communications and networking conference (WCNC), IEEE, pp. 1–6 (2017)
S. Santhosh Kumar, Y. Palanichamy, M. Selvi, S. Ganapathy, A. Kannan, S.P. Perumal, Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks. Wireless Netw.Netw. 27, 3873–3894 (2021)
R. Logambigai, A. Kannan, Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Netw. 22, 945–957 (2016)
Funding
The authors have not disclosed any funding.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
No competing interests to declare.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Bai, Y., Xue, Y., Meng, J. et al. TSRP: A Novel Trust-Based and Energy-Aware Secure Routing Protocol for Resource-Constrained Wireless Sensor Networks. J. Inst. Eng. India Ser. B (2024). https://doi.org/10.1007/s40031-024-01158-0
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s40031-024-01158-0