A Multi-Layered Assessment System for Trustworthiness Enhancement and Reliability for Industrial Wireless Sensor Networks

被引:3
作者
Khan, Mohd Anas [1 ]
Shalu, Quadri Noorulhasan [2 ]
Naveed, Quadri Noorulhasan [2 ]
Lasisi, Ayodele [2 ]
Kaushik, Sheetal [3 ]
Kumar, Sunil [4 ]
机构
[1] Jamia Millia Islamia, Dept Comp Engn, Delhi, India
[2] King Khalid Univ, Coll Comp Sci, Dept Comp Sci, Abha 62529, Saudi Arabia
[3] Amity Sch Engn & Technol, Gurgaon, Haryana, India
[4] Cent Univ Haryana, Dept Comp Sci & Informat Technol, Mahendragarh, Haryana, India
关键词
Trust; Reliability; Dependability; IWSN security; Healthcare; TRUST; LIGHTWEIGHT; MECHANISM;
D O I
10.1007/s11277-024-11391-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The decision-making process in Industrial Wireless Sensor Networks heavily relies on the information provided by smart sensors. Ensuring the trustworthiness of these sensors is essential to prolong the lifetime of the network. Additionally, dependable data transmission by sensor nodes is crucial for effective decision-making. Trust management approaches play a vital role in safeguarding industrial sensor networks from internal threats, enhancing security, dependability, and network resilience. However, existing trust management schemes often focus solely on communication behaviour to calculate trust values, potentially leading to incorrect decisions amidst prevalent malicious attacks. Moreover, these schemes often fail to meet the resource and dependability requirements of IWSNs. To address these limitations, this paper proposes a novel hybrid Trust Management Scheme called the Multi-layered Assessment System for Trustworthiness Enhancement and Reliability (MASTER). The MASTER scheme employs a clustering approach within a hybrid architecture to reduce communication overhead, effectively detecting and mitigating various adversarial attacks such as Sybil, Blackhole, Ballot stuffing, and On-off attacks with minimal overheads. This multifactor trust scheme integrates both communication-based trust and data-based trust during trust estimation, aiming to improve the lifetime of industrial sensor networks. Furthermore, the proposed MASTER scheme utilizes a flexible weighting scheme that assigns more weight to recent interactions during both direct and recommendation (indirect) trust evaluation. This approach ensures robust and precise trust values tailored to the specific network scenario. To efficiently process and glean insights from dispersed data, machine learning algorithms are employed, offering a suitable solution. Experimental results demonstrate the superior performance of the MASTER scheme in several key metrics compared to recent trust models. For instance, when 30% of malicious Sensor Nodes (SNs) exist in a network comprising 500 sensor nodes, the MASTER scheme achieves a malicious behaviour detection rate of 97%, surpassing the rates of other models. Even after the occurrence of malicious SNs exceeding 30%, the False Negative Rate (FNR) in the MASTER scheme remains lower than other models due to adaptive trust functions employed at each level. With 50% malicious SNs in the network, the MASTER scheme achieves a malicious behaviour detection accuracy of 91%, outperforming alternative models. Moreover, the average energy consumption of SNs in the MASTER scheme is significantly lower compared to other schemes, owing to its elimination of unnecessary transactions through clustered topology utilization. Specifically, with 30% and 50% malicious SNs in the network, the MASTER scheme achieves throughput rates of 150 kbps and 108 kbps, respectively, demonstrating its efficiency in challenging network scenarios. Overall, the proposed MASTER scheme offers a comprehensive solution for enhancing security, trustworthiness, and collaboration among sensor nodes in IWSNs, while achieving superior performance in various metrics compared to existing trust models.
引用
收藏
页码:1997 / 2036
页数:40
相关论文
共 42 条
[1]   A Zero-Trust Network-Based Access Control Scheme for Sustainable and Resilient Industry 5.0 [J].
Abuhasel, Khaled Ali .
IEEE ACCESS, 2023, 11 :116398-116409
[2]   RETRACTED: 5G standards for the Industry 4.0 enabled communication systems using artificial intelligence: perspective of smart healthcare system (Retracted Article) [J].
Alhayani, Bilal ;
Kwekha-Rashid, Ameer Sardar ;
Mahajan, Hemant B. ;
Ilhan, Haci ;
Uke, Nilesh ;
Alkhayyat, Ahmed ;
Mohammed, Husam Jasim .
APPLIED NANOSCIENCE, 2022, 13 (3) :1807-1817
[3]  
Anitha S., 2023, Measurement: Sensors, V29
[4]   BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks [J].
Anwar, Raja Waseem ;
Zainal, Anazida ;
Outay, Fatma ;
Yasar, Ansar ;
Iqbal, Saleem .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 :605-616
[5]   An artificial intelligence approach for energy-aware intrusion detection and secure routing in internet of things-enabled wireless sensor networks [J].
Aruchamy, Prasanth ;
Gnanaselvi, Sabeena ;
Sowndarya, Devi ;
Naveenkumar, Pushpalatha .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23)
[6]   Internet of Things (IoT)-Based Smart Healthcare System for Efficient Diagnostics of Health Parameters of Patients in Emergency Care [J].
Balasundaram, A. ;
Routray, Sidheswar ;
Prabu, A. V. ;
Krishnan, Prabhakar ;
Malla, Prince Priya ;
Maiti, Moinak .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (21) :18563-18570
[7]   Prediction of middle box-based attacks in Internet of Healthcare Things using ranking subsets and convolutional neural network [J].
Bangali, Harun ;
Rodrigues, Paul ;
Pandimurugan, V. ;
Rajasoundaran, S. ;
Kumar, S. V. N. Santhosh ;
Selvi, M. ;
Kannan, A. .
WIRELESS NETWORKS, 2024, 30 (03) :1493-1511
[8]   Anomaly detection via blockchained deep learning smart contracts in industry 4.0 [J].
Demertzis, Konstantinos ;
Iliadis, Lazaros ;
Tziritas, Nikos ;
Kikiras, Panagiotis .
NEURAL COMPUTING & APPLICATIONS, 2020, 32 (23) :17361-17378
[9]   GWO-SMSLO: Grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networks [J].
Dinesh, K. ;
Svn, Santhosh Kumar .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (02) :585-611
[10]   Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network [J].
Dinesh, K. ;
Santhosh Kumar, S. V. N. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (01) :199-223