Publication: An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
| dc.contributor.author | Khan, Tayyab | |
| dc.contributor.author | Singh, Karan | |
| dc.contributor.author | Shariq, Mohd | |
| dc.contributor.author | Ahmad, Khaleel | |
| dc.contributor.author | Savita, K. S. | |
| dc.contributor.author | Ahmadian, Ali | |
| dc.contributor.author | Salahshour, Soheil | |
| dc.contributor.author | Conti, Mauro | |
| dc.contributor.institution | Khan, Tayyab, School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India | |
| dc.contributor.institution | Singh, Karan, School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India | |
| dc.contributor.institution | Shariq, Mohd, School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India, Department of Mathematics, Università degli Studi di Padova, Padua, Italy | |
| dc.contributor.institution | Ahmad, Khaleel, Maulana Azad National Urdu University, Hyderabad, Hyderabad, India | |
| dc.contributor.institution | Savita, K. S., Department of Computer and Information Science, Universiti Teknologi PETRONAS, Seri Iskandar, Malaysia | |
| dc.contributor.institution | Ahmadian, Ali, Decisions Lab, Università degli Studi di Reggio Calabria, Reggio Calabria, Italy, College of Engineering and Aviation, CQUniversity Australia, Rockhampton, Australia | |
| dc.contributor.institution | Salahshour, Soheil, College of Engineering and Aviation, CQUniversity Australia, Rockhampton, Australia, Faculty of Engineering and Natural Sciences, Bahçeşehir Üniversitesi, Istanbul, Turkey, Faculty of Science and Letters, Pîrî Reis Üniversitesi, Istanbul, Turkey | |
| dc.contributor.institution | Conti, Mauro, Department of Mathematics, Università degli Studi di Padova, Padua, Italy | |
| dc.date.accessioned | 2025-10-05T15:00:45Z | |
| dc.date.issued | 2023 | |
| dc.description.abstract | Wireless Sensor Networks (WSNs) are often used for critical applications where trust and security are of paramount importance. Trust evaluation is one of the key mechanisms to ensure the security and reliability of WSNs. Traditional trust evaluation schemes rely on fixed, predetermined thresholds, or rules and static attack models, which may not be suitable for all situations such as dynamic and heterogeneous network environments with new and unknown attack scenarios as well as have several problems such as limited security and scalability, limited accuracy, incomplete coverage, lack of adaptability that can limit their effectiveness. Machine Learning (ML) has been shown to be an effective tool for trust evaluation in WSNs, offering several benefits over existing schemes such as greater adaptability, scalability, and accuracy since ML algorithms can analyze and learn from the data collected in real-time from multiple sources (sensor readings, network traffic, and user behavior) enabling them to dynamically adjust their decision-making criteria based on the current network conditions. Trust-aware ML-based security mechanisms achieve safety and efficient decision-making by reducing uncertainty and risk to accomplish real-world tasks. This paper presents a Machine Learning (ML)-based trust evaluation model in the unattended autonomous WSN environment to achieve reliability, adaptability, scalability, and accuracy by generating quick and reliable trust values dynamically. The proposed machine learning algorithm extracts various trust features such as Co-Location Relationship (CLR), Co-Work Relationship (CWR), Cooperativeness-Frequency-Duration (CFD), and Reward (R) to obtain a robust trust rating of sensor devices and predict future misbehavior. These trust features are combined to generate a final trust rating before making any decision about the reliability of any sensor device. Moreover, the projected trust model (ETDMA) integrate direct communication trust and indirect trust with the help of a logical time window that periodically records the trustworthy and suspicious interactions. Simulation experiments exhibit the effectiveness of the proposed trust evaluation method in terms of change in trust values, malicious nodes detection (94%), FNR (0.9%), F1-Score (0.6), and accuracy (92%) in the presence of 50 malicious nodes. © 2023 Elsevier B.V., All rights reserved. | |
| dc.identifier.doi | 10.1016/j.comcom.2023.06.014 | |
| dc.identifier.endpage | 229 | |
| dc.identifier.issn | 01403664 | |
| dc.identifier.issn | 1873703X | |
| dc.identifier.scopus | 2-s2.0-85165089792 | |
| dc.identifier.startpage | 217 | |
| dc.identifier.uri | https://doi.org/10.1016/j.comcom.2023.06.014 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.14719/7879 | |
| dc.identifier.volume | 209 | |
| dc.language.iso | en | |
| dc.publisher | Elsevier B.V. | |
| dc.relation.source | Computer Communications | |
| dc.subject.authorkeywords | Accuracy | |
| dc.subject.authorkeywords | Attacks | |
| dc.subject.authorkeywords | Detection | |
| dc.subject.authorkeywords | Fnr | |
| dc.subject.authorkeywords | Machine Learning | |
| dc.subject.authorkeywords | Trust | |
| dc.subject.authorkeywords | Wsn | |
| dc.subject.authorkeywords | Behavioral Research | |
| dc.subject.authorkeywords | Decision Making | |
| dc.subject.authorkeywords | Heterogeneous Networks | |
| dc.subject.authorkeywords | Learning Algorithms | |
| dc.subject.authorkeywords | Network Security | |
| dc.subject.authorkeywords | Petroleum Reservoir Evaluation | |
| dc.subject.authorkeywords | Reliability | |
| dc.subject.authorkeywords | Scalability | |
| dc.subject.authorkeywords | Sensor Nodes | |
| dc.subject.authorkeywords | Accuracy | |
| dc.subject.authorkeywords | Attack | |
| dc.subject.authorkeywords | Decisions Makings | |
| dc.subject.authorkeywords | Detection | |
| dc.subject.authorkeywords | Fnr | |
| dc.subject.authorkeywords | Machine Learning Algorithms | |
| dc.subject.authorkeywords | Machine-learning | |
| dc.subject.authorkeywords | Trust | |
| dc.subject.authorkeywords | Trust Evaluation | |
| dc.subject.authorkeywords | Trust Values | |
| dc.subject.authorkeywords | Machine Learning | |
| dc.subject.indexkeywords | Behavioral research | |
| dc.subject.indexkeywords | Decision making | |
| dc.subject.indexkeywords | Heterogeneous networks | |
| dc.subject.indexkeywords | Learning algorithms | |
| dc.subject.indexkeywords | Network security | |
| dc.subject.indexkeywords | Petroleum reservoir evaluation | |
| dc.subject.indexkeywords | Reliability | |
| dc.subject.indexkeywords | Scalability | |
| dc.subject.indexkeywords | Sensor nodes | |
| dc.subject.indexkeywords | Accuracy | |
| dc.subject.indexkeywords | Attack | |
| dc.subject.indexkeywords | Decisions makings | |
| dc.subject.indexkeywords | Detection | |
| dc.subject.indexkeywords | FNR | |
| dc.subject.indexkeywords | Machine learning algorithms | |
| dc.subject.indexkeywords | Machine-learning | |
| dc.subject.indexkeywords | Trust | |
| dc.subject.indexkeywords | Trust evaluation | |
| dc.subject.indexkeywords | Trust values | |
| dc.subject.indexkeywords | Machine learning | |
| dc.title | An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach | |
| dc.type | Article | |
| dcterms.references | Najib, Warsun, Survey on trust calculation methods in internet of things, Procedia Computer Science, 161, pp. 1300-1307, (2019), Journal of Information Technology, (2020), Khan, Tayyab, A Novel and Comprehensive Trust Estimation Clustering Based Approach for Large Scale Wireless Sensor Networks, IEEE Access, 7, pp. 58221-58240, (2019), Khan, Tayyab, ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs, Future Generation Computer Systems, 125, pp. 921-943, (2021), Rathore, Heena, Novel approach for security in Wireless Sensor Network using bio-inspirations, (2014), Sagar, Subhash, Towards a machine learning-driven trust evaluation model for social internet of things: A time-aware approach, ACM International Conference Proceeding Series, pp. 283-290, (2020), Jayasinghe, Upul, Machine Learning Based Trust Computational Model for IoT Services, IEEE Transactions on Sustainable Computing, 4, 1, pp. 39-52, (2019), IEEE Netw Lett, (2019), Amouri, Amar, A machine learning based intrusion detection system for mobile internet of things, Sensors, 20, 2, (2020), Alghofaili, Yara, A Trust Management Model for IoT Devices and Services Based on the Multi-Criteria Decision-Making Approach and Deep Long Short-Term Memory Technique, Sensors, 22, 2, (2022) | |
| dspace.entity.type | Publication | |
| local.indexed.at | Scopus | |
| person.identifier.scopus-author-id | 57208839546 | |
| person.identifier.scopus-author-id | 55450561600 | |
| person.identifier.scopus-author-id | 57225464047 | |
| person.identifier.scopus-author-id | 43660915000 | |
| person.identifier.scopus-author-id | 36806725100 | |
| person.identifier.scopus-author-id | 59760609700 | |
| person.identifier.scopus-author-id | 23028598900 | |
| person.identifier.scopus-author-id | 15019127200 |
