Publication:
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach

dc.contributor.authorKhan, Tayyab
dc.contributor.authorSingh, Karan
dc.contributor.authorShariq, Mohd
dc.contributor.authorAhmad, Khaleel
dc.contributor.authorSavita, K. S.
dc.contributor.authorAhmadian, Ali
dc.contributor.authorSalahshour, Soheil
dc.contributor.authorConti, Mauro
dc.contributor.institutionKhan, Tayyab, School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India
dc.contributor.institutionSingh, Karan, School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India
dc.contributor.institutionShariq, Mohd, School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India, Department of Mathematics, Università degli Studi di Padova, Padua, Italy
dc.contributor.institutionAhmad, Khaleel, Maulana Azad National Urdu University, Hyderabad, Hyderabad, India
dc.contributor.institutionSavita, K. S., Department of Computer and Information Science, Universiti Teknologi PETRONAS, Seri Iskandar, Malaysia
dc.contributor.institutionAhmadian, Ali, Decisions Lab, Università degli Studi di Reggio Calabria, Reggio Calabria, Italy, College of Engineering and Aviation, CQUniversity Australia, Rockhampton, Australia
dc.contributor.institutionSalahshour, Soheil, College of Engineering and Aviation, CQUniversity Australia, Rockhampton, Australia, Faculty of Engineering and Natural Sciences, Bahçeşehir Üniversitesi, Istanbul, Turkey, Faculty of Science and Letters, Pîrî Reis Üniversitesi, Istanbul, Turkey
dc.contributor.institutionConti, Mauro, Department of Mathematics, Università degli Studi di Padova, Padua, Italy
dc.date.accessioned2025-10-05T15:00:45Z
dc.date.issued2023
dc.description.abstractWireless Sensor Networks (WSNs) are often used for critical applications where trust and security are of paramount importance. Trust evaluation is one of the key mechanisms to ensure the security and reliability of WSNs. Traditional trust evaluation schemes rely on fixed, predetermined thresholds, or rules and static attack models, which may not be suitable for all situations such as dynamic and heterogeneous network environments with new and unknown attack scenarios as well as have several problems such as limited security and scalability, limited accuracy, incomplete coverage, lack of adaptability that can limit their effectiveness. Machine Learning (ML) has been shown to be an effective tool for trust evaluation in WSNs, offering several benefits over existing schemes such as greater adaptability, scalability, and accuracy since ML algorithms can analyze and learn from the data collected in real-time from multiple sources (sensor readings, network traffic, and user behavior) enabling them to dynamically adjust their decision-making criteria based on the current network conditions. Trust-aware ML-based security mechanisms achieve safety and efficient decision-making by reducing uncertainty and risk to accomplish real-world tasks. This paper presents a Machine Learning (ML)-based trust evaluation model in the unattended autonomous WSN environment to achieve reliability, adaptability, scalability, and accuracy by generating quick and reliable trust values dynamically. The proposed machine learning algorithm extracts various trust features such as Co-Location Relationship (CLR), Co-Work Relationship (CWR), Cooperativeness-Frequency-Duration (CFD), and Reward (R) to obtain a robust trust rating of sensor devices and predict future misbehavior. These trust features are combined to generate a final trust rating before making any decision about the reliability of any sensor device. Moreover, the projected trust model (ETDMA) integrate direct communication trust and indirect trust with the help of a logical time window that periodically records the trustworthy and suspicious interactions. Simulation experiments exhibit the effectiveness of the proposed trust evaluation method in terms of change in trust values, malicious nodes detection (94%), FNR (0.9%), F1-Score (0.6), and accuracy (92%) in the presence of 50 malicious nodes. © 2023 Elsevier B.V., All rights reserved.
dc.identifier.doi10.1016/j.comcom.2023.06.014
dc.identifier.endpage229
dc.identifier.issn01403664
dc.identifier.issn1873703X
dc.identifier.scopus2-s2.0-85165089792
dc.identifier.startpage217
dc.identifier.urihttps://doi.org/10.1016/j.comcom.2023.06.014
dc.identifier.urihttps://hdl.handle.net/20.500.14719/7879
dc.identifier.volume209
dc.language.isoen
dc.publisherElsevier B.V.
dc.relation.sourceComputer Communications
dc.subject.authorkeywordsAccuracy
dc.subject.authorkeywordsAttacks
dc.subject.authorkeywordsDetection
dc.subject.authorkeywordsFnr
dc.subject.authorkeywordsMachine Learning
dc.subject.authorkeywordsTrust
dc.subject.authorkeywordsWsn
dc.subject.authorkeywordsBehavioral Research
dc.subject.authorkeywordsDecision Making
dc.subject.authorkeywordsHeterogeneous Networks
dc.subject.authorkeywordsLearning Algorithms
dc.subject.authorkeywordsNetwork Security
dc.subject.authorkeywordsPetroleum Reservoir Evaluation
dc.subject.authorkeywordsReliability
dc.subject.authorkeywordsScalability
dc.subject.authorkeywordsSensor Nodes
dc.subject.authorkeywordsAccuracy
dc.subject.authorkeywordsAttack
dc.subject.authorkeywordsDecisions Makings
dc.subject.authorkeywordsDetection
dc.subject.authorkeywordsFnr
dc.subject.authorkeywordsMachine Learning Algorithms
dc.subject.authorkeywordsMachine-learning
dc.subject.authorkeywordsTrust
dc.subject.authorkeywordsTrust Evaluation
dc.subject.authorkeywordsTrust Values
dc.subject.authorkeywordsMachine Learning
dc.subject.indexkeywordsBehavioral research
dc.subject.indexkeywordsDecision making
dc.subject.indexkeywordsHeterogeneous networks
dc.subject.indexkeywordsLearning algorithms
dc.subject.indexkeywordsNetwork security
dc.subject.indexkeywordsPetroleum reservoir evaluation
dc.subject.indexkeywordsReliability
dc.subject.indexkeywordsScalability
dc.subject.indexkeywordsSensor nodes
dc.subject.indexkeywordsAccuracy
dc.subject.indexkeywordsAttack
dc.subject.indexkeywordsDecisions makings
dc.subject.indexkeywordsDetection
dc.subject.indexkeywordsFNR
dc.subject.indexkeywordsMachine learning algorithms
dc.subject.indexkeywordsMachine-learning
dc.subject.indexkeywordsTrust
dc.subject.indexkeywordsTrust evaluation
dc.subject.indexkeywordsTrust values
dc.subject.indexkeywordsMachine learning
dc.titleAn efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
dc.typeArticle
dcterms.referencesNajib, Warsun, Survey on trust calculation methods in internet of things, Procedia Computer Science, 161, pp. 1300-1307, (2019), Journal of Information Technology, (2020), Khan, Tayyab, A Novel and Comprehensive Trust Estimation Clustering Based Approach for Large Scale Wireless Sensor Networks, IEEE Access, 7, pp. 58221-58240, (2019), Khan, Tayyab, ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs, Future Generation Computer Systems, 125, pp. 921-943, (2021), Rathore, Heena, Novel approach for security in Wireless Sensor Network using bio-inspirations, (2014), Sagar, Subhash, Towards a machine learning-driven trust evaluation model for social internet of things: A time-aware approach, ACM International Conference Proceeding Series, pp. 283-290, (2020), Jayasinghe, Upul, Machine Learning Based Trust Computational Model for IoT Services, IEEE Transactions on Sustainable Computing, 4, 1, pp. 39-52, (2019), IEEE Netw Lett, (2019), Amouri, Amar, A machine learning based intrusion detection system for mobile internet of things, Sensors, 20, 2, (2020), Alghofaili, Yara, A Trust Management Model for IoT Devices and Services Based on the Multi-Criteria Decision-Making Approach and Deep Long Short-Term Memory Technique, Sensors, 22, 2, (2022)
dspace.entity.typePublication
local.indexed.atScopus
person.identifier.scopus-author-id57208839546
person.identifier.scopus-author-id55450561600
person.identifier.scopus-author-id57225464047
person.identifier.scopus-author-id43660915000
person.identifier.scopus-author-id36806725100
person.identifier.scopus-author-id59760609700
person.identifier.scopus-author-id23028598900
person.identifier.scopus-author-id15019127200

Files