A Novel Trust Management and Secure Communication Framework for Wireless Sensor Networks
Received: 22 December 2024 | Revised: 16 January 2025 | Accepted: 31 January 2025 | Online: 3 April 2025
Corresponding author: Kaumudi Keerthana
Abstract
In Wireless Sensor Networks (WSNs), ensuring secure and reliable communication amidst various cyber threats is a pivotal challenge. Existing security methods often struggle with high computational demands and do not adequately address the unique characteristics of WSNs, such as the limited energy resources and their susceptibility to specific types of attacks like blackhole and Sybil attacks. The proposed Lightweight MG-Net Model addresses security and performance challenges in WSNs by integrating a Trust Model, Anomaly Detection, and Secure Communication protocols into a novel hybrid deep learning framework. This framework combines MobileNet, which utilizes depthwise separable convolutions for efficient spatial feature extraction, with Gated Recurrent Units (GRUs) to capture temporal dependencies, enabling precise real-time anomaly detection with reduced computational demands. Trust management leverages a modified EigenTrust algorithm, dynamically updating trust scores based on node interactions to optimize reliability across network operations. The anomaly detection component was rigorously trained using a labeled dataset that includes various attack scenarios such as blackhole attacks, where detection accuracy exceeds 97.5%, and Sybil attacks, highlighting its robustness against sophisticated threats. Secure communications are upheld by the Datagram Transport Layer Security (DTLS) protocol, ensuring data integrity and confidentiality with an encryption success rate of 97%. Operational performance metrics are evaluated through simulations, showcasing the system’s efficiency with a detection latency under 2 s and energy consumption that is 30% lower than traditional security frameworks. Overall, the Lightweight MG-Net Model enhances WSN security without compromising on efficiency, demonstrating significant advancements in trust management, anomaly detection accuracy, and secure, low-latency communications.
Keywords:
trust, energy, detection, attacks, WSN, GRU, DTLSDownloads
References
S. M. P. Dinakarrao et al., "Cognitive and Scalable Technique for Securing IoT Networks Against Malware Epidemics," IEEE Access, vol. 8, pp. 138508–138528, Jan. 2020.
S. V. Lakshmi and V. K. Vatsavayi, "Query optimization using clustering and Genetic Algorithm for Distributed Databases," in International Conference on Computer Communication and Informatics, Coimbatore, India, Jan. 2016, pp. 1–8.
Y. Han, H. Hu, and Y. Guo, "Energy-Aware and Trust-Based Secure Routing Protocol for Wireless Sensor Networks Using Adaptive Genetic Algorithm," IEEE Access, vol. 10, pp. 11538–11550, Jan. 2022.
X. Lai and H. Wang, "RNOB: Receiver Negotiation Opportunity Broadcast Protocol for Trustworthy Data Dissemination in Wireless Sensor Networks," IEEE Access, vol. 6, pp. 53235–53242, Jan. 2018.
Y. Qiu, S. Li, Z. Li, Y. Zhang, and Z. Yang, "Multi-gradient routing protocol for wireless sensor networks," China Communications, vol. 14, no. 3, pp. 118–129, Mar. 2017.
X. Liu et al., "Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks," Journal of Parallel and Distributed Computing, vol. 135, pp. 140–155, Jan. 2020.
H. B. Mahajan, A. Badarla, and A. A. Junnarkar, "CL-IoT: cross-layer Internet of Things protocol for intelligent manufacturing of smart farming," Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 7, pp. 7777–7791, Jul. 2021.
S. Namasudra, D. Devi, S. Choudhary, R. Patan, and S. Kallam, "Security, Privacy, Trust, and Anonymity," in Advances of DNA Computing in Cryptography, Boca Raton, FL, USA: CRC Press, 2018, pp. 137–149.
S. Das, P. Gangwani, and H. Upadhyay, "Integration of Machine Learning with Cybersecurity: Applications and Challenges," in Artificial Intelligence in Cyber Security: Theories and Applications, T. Bhardwaj, H. Upadhyay, T. K. Sharma, and S. L. Fernandes, Eds. New York, NY, USA: Springer, 2023, pp. 67–81.
Z. Huanan, X. Suping, and W. Jiannan, "Security and application of wireless sensor network," Procedia Computer Science, vol. 183, pp. 486–492, Jan. 2021.
S. A. Yadwad, V. Valli, and S. Venkata, "Service Outages Prediction through Logs and Tickets Analysis," International Journal of Advanced Computer Science and Applications, vol. 12, no. 4, pp. 177–183, 2021.
V. Sharma, R. Beniwal, and V. Kumar, "Multi-level trust-based secure and optimal IoT-WSN routing for environmental monitoring applications," The Journal of Supercomputing, vol. 80, no. 8, pp. 11338–11381, May 2024.
V. Pathak, K. Singh, T. Khan, M. Shariq, S. A. Chaudhry, and A. K. Das, "A secure and lightweight trust evaluation model for enhancing decision-making in resource-constrained industrial WSNs," Scientific Reports, vol. 14, no. 1, Nov. 2024, Art. no. 28162.
P. Gangwani, A. Perez-Pons, and H. Upadhyay, "Evaluating Trust Management Frameworks for Wireless Sensor Networks," Sensors, vol. 24, no. 9, Jan. 2024, Art. no. 2852.
S. Shah et al., "A Dynamic Trust evaluation and update model using advance decision tree for underwater Wireless Sensor Networks," Scientific Reports, vol. 14, no. 1, Sep. 2024, Art. no. 22393.
R. M. Malkar, M. Tarambale, S. R. T, A. S. Chavan, C. N. Aher, and G. P, "Advancing Network Lifetime in Wireless Sensor Networks through Localization Techniques: A Perspective from Computer Networks," International Journal of Intelligent Systems and Applications in Engineering, vol. 12, no. 21s, pp. 1206–1216, Mar. 2024.
T. Khan et al., "An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach," Computer Communications, vol. 209, pp. 217–229, Sep. 2023.
L. K. Tyagi and A. Kumar, "A Hybrid Trust Based WSN protocol to Enhance Network Performance using Fuzzy Enabled Machine Learning Technique," International Journal of Intelligent Systems and Applications in Engineering, vol. 11, no. 9s, pp. 131–144, Jul. 2023.
S. Shanmuga Priya and N. Shanmuga Priya, "Energy-Efficient Trust and Quarantine-Based Secure Data Transmission in Wireless Sensor Networks," International Journal of Computer Networks and Applications, vol. 10, no. 2, pp. 156–165, Apr. 2023.
S. Madhuri and D. S. V. Lakshmi, "A Trusted Node Feedback Based Clustering Model For Detection Of Malicious Nodes In The Network," Journal of Theoretical and Applied Information Technology, vol. 101, no. 7, pp. 2686–2697, 2023.
Downloads
How to Cite
License
Copyright (c) 2025 Kaumudi Keerthana, A. Mahesh Babu

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.