Abstract
Although IoT technology is advanced, wireless systems are prone to faults and attacks. The replaying information about routing in the case of multi-hop routing has led to the problem of identity deception among nodes. The devastating attacks against the routing protocols as well as harsh network conditions make the situation even worse. Although most of the research in the literature aim at making the IoT system more trustworthy and ensuring faultlessness, it is still a challenging task. Motivated by this, the present proposal introduces a trust-aware routing mechanism (TARM), which uses an edge node with mobility feature that can collect data from faultless nodes. The edge node works based on a trust evaluation method, which segregates the faulty and anomalous nodes from normal nodes. In TARM, a modified gray wolf optimization (GWO) is used for forming the clusters out of the deployed sensor nodes. Once the clusters are formed, each cluster’s trust values are calculated, and the edge node starts collecting data only from trustworthy nodes via the respective cluster heads. The artificial bee colony optimization algorithm executes the optimal routing path from the trustworthy nodes to the mobile edge node. The simulations show that the proposed method exhibits around a 58% hike in trustworthiness, ensuring the high security offered by the proposed trust evaluation scheme when validated with other similar approaches. It also shows a detection rate of 96.7% in detecting untrustworthy nodes. Additionally, the accuracy of the proposed method reaches 91.96%, which is recorded to be the highest among the similar latest schemes. The performance of the proposed approach has proved that it has overcome many weaknesses of previous similar techniques with low cost and mitigated complexity.
1. Introduction
Incredible development in the Internet of Things (IoT) in a decade has led this technology to flourish in various domains. Connecting billions of devices in the physical world through IoT technology has narrowed the gap between the physical and the cyber world. Though many IoT applications have made our lives simpler, it is cumbersome to manage these systems with high security and fidelity. Security and privacy issues are significant concerns to IoT applications [1]. These concerns are so because, due to the unattended randomly placed sensor nodes that are vulnerable to intrusions and attacks, even the data transmitted by sensor nodes are not trustworthy many times. The breach in security may incur huge losses to these systems. Thus, it is indispensable to inhibit such losses to construct a reliable and trustworthy approach [2,3]. Secured data transmission is one of the key challenges in IoT applications. The devices involved in the process of data collection and transmission are more prone to attacks and faults. Some of the applications’ requirements are not only limited to security but also mandate the mitigation of delay, energy usage, and packet loss. Some of the issues such as congestion, delay in transmission, and energy consumption can be dealt with using existing routing algorithms [4,5,6]. Figure 1 shows the cloud-based sensor network having EDGE nodes to send the data to the cloud server for real-time data analysis.
Figure 1.
EDGE-node-based IoT application.
Edge technology, which serves as an extension of the cloud, shows an enormous technological improvement by shifting the burden of storage and computing to the edge network that is confined to an edge layer near the sensing devices. This technique not only alleviates the resource constraints at the end devices but also uplifts the system performance [7]. The Edge network can be easily integrated with IoT networks and achieves a remarkable success in obtaining desired QoS parameters. The trust issues can also be resolved using this technology [8]. There has been enormous research conducted to solve the issue of security by using edge node approaches and trust mechanisms such as [9,10,11]. In [10], the best route path with trustworthy nodes is generated and a mobile edge node visits each sensor with a significant trust value and collects data. Some research works have focused on establishing route paths using trust-based schemes. In [11], a belief-based trust approach to identify malicious nodes is proposed that guarantees defense against Denial of service (DoS), Bad-mouth, and On–Off attacks. The direct and indirect trust values are gathered using the Bayesian estimation technique to determine the correlation in time series data, which can be used to estimate inaccurate knowledge thereby avoiding data from malicious nodes. The issues encountered while designing a network for data collection using trust-based scenarios such as cross-layer optimized networks, 3D underwater sensor networks, UAV-based edge networks, etc. are also major concerns while designing a sensor network. These issues are addressed and resolved in [10,12,13,14].
Although these methods promise good gain and robustness to the system, some loopholes exist in the functionality of these systems. The trust-based routing and selection of trustworthy nodes consumes much energy and time. This paper presents an optimal way of solving this problem by introducing a novel Trust-aware Routing Mechanism. It deals with the IoT architecture exhibiting the edge layer, which uses security-enabled designs, authorization, authentication, privacy, and intrusion detection mechanisms and protocols. It also employs an optimized way to organize the nodes and apply a trust mechanism to all nodes. Furthermore, it establishes a route path using artificial bee colony (ABC) optimization, which is specially designed for edge nodes. The motivation behind this architecture is to provide a buffer facility and enhance the system’s privacy using edge nodes. Our proposed approach is efficient in conserving energy and boosting the accuracy of the system. The main and original contributions of this work are listed below:
- 1.
- The sensor network having sensor nodes randomly deployed is clustered and the selection of cluster head is conducted using the modified gray wolf optimization approach [15].
- 2.
- The clustered network consists of many clusters with their respective cluster heads and a mobile edge node that evaluates the trust of every node in a cluster and gathers trustworthy information from those nodes.
- 3.
- The inter- and intra-cluster routing is optimized using the artificial bee colony optimization approach, which provides the best optimal path for the data flow to the edge node.
- 4.
- The performance analysis for the proposed model is based on energy consumption, delay, detection rate, accuracy, and network lifetime.
The remainder of this paper is arranged as per the sections mentioned below:
Section 2 gives an overview of the relevant works associated with the technique used in the proposed model. Section 3 describes the problem formulation. A thorough explanation of the techniques used to build the model is discussed in Section 4. It also presents the algorithm of the proposed approach. Section 5 analyses the performance of the work on various metrics and compares it with other similar existing approaches. Section 6 gives a conclusion with a future direction to the proposed methodology.
2. Related Works
In this section, we provide an overview of the recently published trust-aware routing protocols with their advantages and limitations. We summarize these in Table 1.
Table 1.
Summary of related work on recently published trust-aware protocols.
There are many research contributions on trust-aware routing in the literature; we summarize the most recent ones in this section. Wang et al. [16] proposed a trust evaluation scheme based on mobile edge nodes for IoT. In [17], the authors propose a routing protocol called trust-based secure and energy (TBSEER) routing protocol to resolve the congestion and serious energy dissipation problems. In this proposal, the nodes calculate the adaptive direct trust value, and the sink nodes take care of indirect trust computation. Here, the edge nodes efficiently identify the untrustworthy nodes, thereby reducing the risk of attacks. A virtual force data collection (VFDC) scheme is proposed in [10] that enables a mobile edge node to visit every trustworthy node and collect their data to ensure both energy-saving and security of the system. Another approach called Intelligent Trust Cloud (ITCM) [18] management is used to determine the untrustworthy devices in the Internet of Medical Things (IoMT). This approach works in three phases: firstly, the trust clouds are formed; then, they are established through the Fuzzy inference system; finally, the third phase deals with seeking untrustworthy nodes in it.
In [19,20,21], the authors propose trust-based algorithms to select trustworthy nodes, and the data are collected from those nodes using edge node or edge intelligence. These approaches isolate the detected malicious nodes using different techniques. Deep reinforcement learning-based trustworthy target tracking is presented in [8]. This approach is efficient but computationally heavy and resource hungry. The trustworthiness is also helpful in Industrial IoT for secure applications [28]. In addition to the trust evaluation of the sensor nodes, the routing of nodes is another important aspect of the cloud-enabled sensor network. There have been many optimization algorithms implemented by researchers to procure optimal routing for the nodes.
The use of optimization also plays a vital role in establishing optimal paths for the nodes in IoT-based sensor networks. The hybrid algorithms for clustering, namely, K-means with Ant lion optimization (ALO-K) and modified bee colony optimization with K-means, are proposed in [22,23], respectively. In [29], Black Widow (BWO) optimization and ABC protocol are utilized for optimized clustering and routing in a resource-limited sensor network for IoT applications. In [24], the authors use the modified version of artificial bee (ABC) colony optimization called parallel ABC algorithm to detect various attacks and ensure successful communication in edge-enabled industrial IoT. A blockchain approach is used in [26] to address the trustworthiness of IoT agriculture applications in [30]. This approach is cost-efficient but computationally complex. Similarly, ref. [31] also used blockchain technology to address trustworthiness in digital twins. In [25], authors use the Ant Colony Optimization approach (ACO) to fetch data from the rendezvous points in an optimally routed sensor network that generates uneven data from the sensors. In [26], authors use a hybrid approach by implementing Principal Component Analysis (PCA) along with the gray wolf optimizer to optimize the parameters of the Deep neural network, which enables detecting the intrusion in the Internet of Medical Things (IoMT). The authors in [27] incorporate a hybrid metaheuristic approach to choose optimal cluster heads to obtain energy efficiency in the network. This approach uses a hybrid algorithm called Whale Optimization and Simulated Annealing (WOA-SA).
The above-discussed methods deal with the problem of security and energy consumption by providing various solutions such as trust-based data collection, optimized routing, and edge-node-enabled secure data transmission. However, a trade-off has been observed between the efficiency and security of the algorithms, as mentioned above. This is because some researchers use the edge nodes for secure and prosperous transmission based on the trust values of nodes, and some use optimized routing to enhance the system’s QoS parameters. So, a hybrid approach that uses edge node computing and optimized route establishment for data transmission needs to be developed in clustered IoT-enabled sensor networks. This paper uses a modified gray wolf optimizer (GWO) for the clustering process. It provides high convergence with no local optima problem. It also employs the trust evaluation approach to pick trustworthy nodes. The route path is devised by implementing the artificial bee colony optimizer, enabling the mobile edge node to collect data optimally from all trustworthy nodes.
3. Problem Statement
The goal of this article is to evaluate the trustworthy nodes and to detect the faulty nodes using the proposed trust evaluation scheme on the nodes. This improves the security of the IoT cloud. We assume the highest energy mobile node as an EDGE node called ‘MEN’, which is capable of collecting and fusing the data to the sensor cloud network. It also provides good computing power and a buffer facility for unused data. The set of sensors deployed in a underlying cloud-based sensor network are . The trusted nodes are identified by calculating the trust values considering various parameters. and are direct and indirect trust values used to evaluate the trustworthiness of the nodes in each cluster. Furthermore, the trusted nodes from every cluster are considered to route via trust paths for optimal data aggregation at the MEN.
4. Proposed Trust-Aware Routing Mechanism
This paper deals with trust issues arising during data transmission in IoT-enabled WSNs. The proposed model uses an edge node to fetch the data from only trusted nodes. However, detecting the trusted nodes is a challenging task. In this context, we proposed a Trust-Aware Routing Mechanism (TARM) through an edge node for IoT-enabled WSNs, which is summarized using a flow graph in Figure 2. The proposed algorithm uses modified GWO and ABC optimizations to achieve the goal in this context. Modified GWO is employed for the clustering of nodes to ensure energy efficiency in the network. Then, all nodes of each cluster are checked for their trustworthiness using a trust evaluation algorithm based on the calculation of direct and indirect trust values. Once the untrustworthy nodes are identified, the mobile edge node collects the data from all CHs in each cluster. The notations used in the paper are given along with their meanings in Table 2.
Figure 2.
Optimized clustering and trust evaluation process with ABC-based routing.
Table 2.
Frequently used notations.
An optimized routing mechanism based on ABC optimization is utilized to efficiently route the data from nodes to CH and from CH to Mobile Edge Node (MEN). The ABC aims to find an optimized relay path from the nodes that reach CH and ultimately the MEN. There are three sets of bees—onlookers, scouts, and employee bees. The suggested ABC approach for routing guarantees the drop in energy depletion during the routing of information in inter- and intra-cluster. The low hop count indicates that this is a low energy consumption when data are sent from nodes to CH and all CHs to the mobile edge node. The process is repeated, and scout bees search and forage the food site again. Figure 3 depicts the routing paths for the nodes, which are evaluated as trustworthy and untrustworthy nodes, the latter of which do not participate in data transmission.
Figure 3.
Evaluation of trustworthy nodes establishing optimized trust path for data routing.
4.1. Clustering through Modified GWO
The modified GWO [15] is employed to elect the cluster head (CH) in every cluster. The distance, CH balancing factor, and residual energy are the primary factors to identify the best CH in a cluster. The positions of the nodes are sent to the BS after the network deployment. The BS implements a modified GWO algorithm (Algorithm 1) using the objective function based on the above parameters. Initially, for the sensor nodes whose residual energy is higher by 10% compared with average energy, those nodes are considered to be CHs. Based on the hierarchy of dominance of gray wolves (high-energy nodes), is considered the best solution, (with the least value of fitness) followed by (higher value than the least) and then . Apart from those, is taken as the least optimal solution calculated by the objective function given below:
where
The above equation represents the total energy of all CHs. A minimum value of this factor denotes less energy usage, where a is the cluster number and b denotes total CHs. represents cluster head in cluster a.
is the balancing factor. To avoid the formation of some huge and small clusters, this parameter is defined to balance the cluster size to minimize power consumption. n is the total number of sensor nodes and represents the number of sensor nodes in cluster a.
is the average sink distance from each CH. S is the base station position.
is the average intra-cluster distance and dist() is the total intra-cluster distance of each node from its CH. are ‘k’ sensors that are in a communication range. The above equation must evaluate the minimum value. The overall fitness function defined in Equation (1) needs to be minimized. For an optimal selection of CH, the above objective function is evaluated for each CH. The node with the least value of fitness in that cluster is selected as CH.
While hunting, gray wolves surround their prey and then attack it. Initially, the location of the prey is unknown. The hunting process is governed by best solutions alpha, beta, and omega and they upgrade their positions using the search agents beta and alpha, shown in Equations (6)–(12).
where is the position of CH; , , are the positions of gray wolves (best optimal solutions); p is the ongoing iteration; , are coefficient vectors for various prey positions, where and . Here, and are vectors randomly picked between [0, 1].
| Algorithm 1. Modified gray wolf optimizer based clustering |
| Input: , , , , |
| Output: |
| 1: Initialize the gray wolf population randomly |
| 2: Initialize a, B & C |
| 3: Determine the fitness of using Equation (1) |
| 4: while do |
| 5: for each wolf do |
| 6: Update the position using Equation (12) |
| 7: Update , , |
| 8: |
| 9: end for |
| 10: end while |
| 11: return |
Finally, the wolves attack, and the range of also reduces in , where a is reduced to 0 from 2. The two conditions that play an important role in selecting the optimal cluster head are as follows:
- (1)
- When , the nodes diverge to search for the prey depending on the positions of , , and .
- (2)
- When , the wolves converge to attack the prey. After the successful completion of clustering, the optimal CHs are chosen and the non-CHs join the CH in their proximity by sending a request for joining as a cluster member.
After successful completion of clustering, the optimal CHs are chosen and the non-CHs join the CH in their proximity by sending a request for joining as a cluster member. The non-CHs are acknowledged by receiving an acceptance; this way, the clusters are formed. Figure 4 shows the positions of , , wolves and the candidate wolf with reference to the position of the prey. The nearest position is of .
Figure 4.
, , , and candidate wolves with reference to the position of the prey.
4.2. Trust-Value-Based Route Path Selection
In this section, we evaluate the values for trusted nodes along with the routing strategy.
4.2.1. Trust Values Evaluation
To ensure data trustworthiness, nodes are at first checked whether they are trustworthy or not. The mobile edge node, which gathers information, evaluates the node trust, thereby reducing the distance and mobile delays. Let be the initial trustworthiness of nodes, T be the threshold for trustworthiness, and be the trust value of a node. Keeping the storage space of all nodes in consideration, the space for memory can be taken in [0, 10] intervals. Let 5 be the initial trust value of the node. If , the node is untrustworthy. If , it shows complete trustworthiness. To avoid the biased performance of nodes, a multi-dimensional model for evaluating trust is employed. The trust calculation exhibits direct and indirect trusts, which is discussed as follows:
DIRECT TRUST: Manifests a trust relationship between directly communicating nodes. The direct trust values can be determined using the below parameters [21]:
- 1.
- Communication trust value:is the communication trust value; and are the weight variables of old and new trust values, respectively; and are old and new trust values, respectively. SC is the number of successful communications and N is the total communications.
- 2.
- Positional intimacy: The measure of successful delivery of messages when a node is very close to CH.indicates trust value of the node with location, dist is the distance between the node and CH, R is the range of communication for that node.
- 3.
- Loss of packets:is the number of packets sent and expresses the number of packets received.
- 4.
- Energy: Determines the lifetime of nodes. Trust value of a node in terms of energy is the ratio of its residual energy to its initial energyshows the total trust values of i and j; , , , and are the weights of communication trust; and .
INDIRECT TRUST: When two nodes communicate via a recommendation of a third node adjacent to one of the two nodes, the indirect trust value has to be calculated. For example, A and B nodes interact via intermediary nodes x, y, and z, which are the neighborhood nodes to A. Then, A projects indirect trust at B, and the trust is transferred from A to B through nodes x, y, and z. The indirect trust of node A at B can be expressed as
is the trust of A after passing through x to B. The indirect trust of A at B is expressed as
where n is the counter representing m adjacent nodes to A. The total trust is given by the sum of direct trust () and indirect trust (), which is calculated as
To identify the faulty node and trustworthy node, the following measure should be considered:
Algorithm 2 shows how nodes are evaluated based on trust values and how untrustworthy nodes are identified. The trusted routing path based on the optimized ABC approach, utilized to transfer data from all trusted nodes to all CHs and then to the MEN, can be achieved with Algorithm 3. Figure 2 represents the flow of the proposed methodology.
| Algorithm 2. Trust evaluation scheme |
| Input: W, , MEN, R |
| Output: Trustworthy nodes with trust values for each cluster, optimized inter- and intra-cluster route paths |
| 1: for all nodes in c cluster do |
| 2: if then |
| 3: the node is directly communicated and compute direct trust value using Equations (13)–(17) |
| 4: else |
| 5: The node is not directly communicated |
| 6: for A node do |
| 7: if then |
| 8: Mark x as the neighbor of A and compute indirect trust values using Equation (19) |
| 9: else |
| 10: node x is not the neighbor of A |
| 11: end if |
| 12: end for |
| 13: end if |
| 14: end for |
| Algorithm 3. ABC routing on trusted paths for all trusted neighboring nodes |
|
4.2.2. Routing
The artificial bee colony algorithm [32] is a search-based probabilistic evolutionary approach of optimization. It works in three stages: (i) food sources; (ii) foraging for food by employer bees; (iii) observing and random searching by scout and onlooker bees to know the food source, which is the solution set. Although the search time of this algorithm is longer, it is beneficial in preventing premature convergence. To combat the problem of search time, we have modified the fitness function and developed the ABC approach, which is inspired by [24] to enhance its accuracy. The following steps can be followed to easily understand the proposed ABC approach:
- 1.
- Initialize the swarm size, food source, employer bees, and onlooker bees such that . The scout bee (cluster member) searches for food resources ,
- 2.
- Initialize the random solutions using the equation below:
- 3.
- Find optimized solutions (relay CH) for food sites by employee bees using the equation below:
- 4.
- The random solutions are generated from the above equation, this solution set chooses candidate and partner solutions from the remainder set. The new solution by selecting a decision variable from the first chosen solution can be generated using Equation (27)where is the global best solution that produces optimal convergence efficiently and is the new step size given by . The above Equation (26) enables the CHs to quickly relay the data to the nearest trustworthy CH or node.
- 5.
- The next phase is the onlooker bee phase; these onlooker bees are managed by the CH nodes. It searches for the relay CH depending on the following probability for each solution:where . Once all the probabilities associated with every solution are obtained, the onlooker bees select the initial S and compare its probability with the random number .
- (a)
- If , the onlooker bees repeat the same process and do not generate new S.
- (b)
- If , the onlookers generate new S by choosing an arbitrary decision variable in current S using Equation (26).
- 6.
- The scout bees use a trail vector to keep track of the failures when they fail to generate a better solution. Here, the new solutions are generated using Equation (23). The best fitness value among the previous and newly generated solutions based on the fitness function is stored in the trail vector.
- 7.
- If the mobile edge node receives the data from CH, it acknowledges CH intimating delivery. The delivery update equation is determined by Equation (29):where l and m are the two nodes in a cluster.
- 8.
- Based on the optimized path, the nearest CH transmits its data to the MEN.
The pseudo-code for the trust evaluation scheme based on the ABC routing approach for mobile edge node is provided in Algorithm 1. Figure 5 portrays a visualization of the proposed TARM that focuses on the clustered network wherein clustering is performed by the modified GWO. This clustered network then undergoes a trust evaluation mechanism at MEN to identify trustworthy nodes. Routing through the trustworthy nodes via the CH is then performed using the ABC algorithm explained in Section 4.2.2. It initially evaluates the trust values of the nodes and classifies them as trustworthy and untrustworthy nodes. Then, it applies the ABC approach proposed in this section on the MEN and enables the optimal route discovery for MEN through the trusted nodes and, finally, to the base station. The edge node is used because of its properties such as storage capability, processing ability, and location near the base station. The mobility of the MEN is restricted to its transmission radius. Nevertheless, the CHs are able to relay the information to other CH nodes in order to make the information reach the CH nearer to the MEN.
Figure 5.
The trust evaluation model for proposed TARM.
4.3. Complexity Analysis
In general, the GWO algorithm starts with the initialization of parameters with a complexity of where is the number of packs. An outer for loop runs until maximum rounds are reached computing the complexity of . Now, the inner three for loops run until the number of packs are reached and they count the complexity of , where is the maximum iterations and s is the size of the pack. Thus, the total complexity for the worst case is determined by . ABC does not depend on the problem dimension; thus, time complexity for it is scaled to where n is the size of the bee population. The search complexity (depending on onlooker bee population) of ABC is given by , where is the number of onlooker bees and indicates maximum cycles.
5. Performance Evaluation
In this section, the performance of the proposed TARM is verified in the MATLAB software (8 GB RAM, i7 core CPU Windows 10 system) and is validated with other similar latest trust-based models that employ edge nodes such as ITCM [18], TBSEER [17], VFDC [10], TEC-SFS [33], and TEM-MEN [16]. Deployment of the sensor nodes in the network is considered according to Sah et al. [34]. The simulation is performed using some parameter settings described in Table 3. We evaluated and plotted (Figure 6) different metrics including the rate of detecting the untrustworthy nodes to the total number of nodes in the network, the accuracy of the model with the increasing percentage of untrustworthy nodes, overall energy utilization in the network, the trust values of nodes with increasing untrustworthy node percentage, average end-to-end delay, and network life evaluation.
Table 3.
Network parameters.
Figure 6.
Simulation results. (a) Percentage detection rate versus the number of nodes in the network. (b) Accuracy in % with respect to the increasing percent of untrustworthy nodes. (c) Representation of trusted route and initial route paths for 50 nodes in network size. (d) Evaluation of energy consumption (mJ) of all algorithms for varying percentages of untrustworthy nodes. (e) Trust values of nodes for different untrustworthy node percentages. (f) Average end-to-end delay in ms versus the percent of untrustworthy nodes. (g) Network lifetime evaluation for FND, HND, and LND. (h) Rate in % for packet loss in the network.
The experiment includes one IoT network that has clustered WSN scenarios, one MEN, and one base station. The CH in each cluster gathers data from the nodes once the trustworthy nodes are identified. The CH has the ability to relay data to other CHs until it reaches the CH closest to the MEN. The trusted route path established using ABC optimization is updated at the MEN, and the MEN with the data transmission rate of 2 Mbps receives the data from its nearest CH. The data transmission time from MEN to the cloud server is 10 ms. The MEN moves with uniform speed and its motion is restricted to the CH, which is in its proximity. This is performed to save energy and to avoid unnecessary delays. However, the selection of starting point, radius of communication, and speed can be adjusted.
5.1. Accuracy and Rate of Detection of Untrustworthy Nodes
Figure 6a presents the comparison of various approaches in terms of detection rate in percentage while varying the number of nodes. When the network undergoes a high number of detection rounds, the detection rate of the proposed TARM technique to detect the untrustworthy nodes enhances gradually. In Figure 6a, the approaches considered for comparison are VFDC, TEM-MEN, TEC-SFS, and the proposed method. We can see that the rate at which the proposed TARM detects the untrustworthy nodes increases rapidly compared with the TEM-MEN and TEC-SFS, which show a more or less constant increase in the rate of detection. However, TEC-SFS has a good detection rate but the rate of increase of the detection percent in the case of TEC-SFS from zero number of nodes to 200 is not much and it gradually increases at a constant pace. Both TEM-MEN and TEC-SFS show only a 14.6% and 9.5% increase in the rate of detection when starting from the 0th node to 200th node, respectively. At the same time, the TARM offers a 67.6% hike in the enhancement of detection rate from 0 nodes to 200 nodes. TARM has a slightly higher detection rate than the VFDC and TEM-MEN for the maximum number of nodes. Further, it is examined that as the iterations of the moving path enhances, the rate of recognition of trust evaluation correspondingly increases.
The accuracy of the trust evaluation mechanism is defined as how accurately the scheme can recognize untrustworthy nodes. It is verified that the TBSEER and proposed method both resist sinkhole attacks under a varying number of malicious nodes. As shown in Figure 6b, the accuracy plot is drawn against the percentage of untrustworthy nodes. The lowest accuracy is shown by the VFDC method, which is 71.1%. The highest accuracy is shown by the proposed method, which is 91.96%. The TBSEER performs very well in this case and records an accuracy of 88.76% for the highest percentage of untrustworthy nodes.
Figure 6c shows the initial route path in the absence of a trust evaluation scheme and the trusted route when the trust evaluation algorithm is executed. Figure 6c shows that the trusted route path takes mostly trustworthy nodes and covers a very short distance to transmit the data to the destination, whereas the same task if performed by the initial route path takes more nodes and hops, which enhances the distance as well as the energy and latency in the network. The calculation for energy consumption for the trusted route has been performed and is represented in Figure 6d.
5.2. Impact of the Percentage of Untrustworthy Nodes on QoS Parameters
Figure 6d shows energy consumption in the whole network for the increasing number of untrustworthy nodes. The proposed method, as observed in Figure 6d, outperforms the other three similar methods. The TBSEER method shows 13.09% more energy consumption compared with the proposed method. Similarly, for VFDC, the percentage enhancement in energy usage is 54.92% higher than the energy usage in the proposed method. The proposed method shows 73.37% higher energy efficiency compared with the ITCM approach.
Figure 6e depicts the node trust values for increasing percentage of untrustworthy nodes. As the proportion of the untrustworthy nodes enhances to 50%, the trust values of the nodes decline rapidly. This factor reflects the trustworthiness of the proposed trust evaluation scheme. All the algorithms show the same declination but the proposed method shows superiority over others. The proposed model shows 58% higher trustworthiness compared with the TBSEER method and this percentage goes beyond 100 for other approaches.
In Figure 6f, the value of average end-to-end delay rises as the percentage of untrustworthy nodes increases. In the case of TBSEER, the frequent packet losses are responsible for the delay in establishing the link between the nodes for packet re-transmission. Moreover, it leads to the degradation of the routing stability. The proposed approach shows 85.16% less delay than the TBSEER protocol. The TEM-MEN approach is tested on the cloud as well as edge computing and it is verified that edge computing is more reliable for real-time applications as it offers low latency, as shown in Figure 6f. The ITCM offers 81.77% high delay and the proposed method is 35.5% more delay-efficient than the TEM-MEN approach.
The network lifetime analysis is depicted in Figure 6g. As can be observed from the graph, the network lifetime represented by the number of rounds is calculated when the first node dies, when the half node dies, and when the last node dies. The proposed model offers the highest network life for all three conditions ensuring the effectiveness and reliability of the system over a longer period. The ITCM performs poorly; TBSEER performs moderately in all three cases and outperforms the other two algorithms, which are ITCM and VFDC. The proposed method is 83.8%, 45.1%, and 28% more efficient compared with TBSEER for FND, HND, and LND, respectively. In general, it is verified that for the same network size, the scenario with a high number of IoT devices offers short network life compared with the small scenario. In the proposed method, the network size of is kept constant and the number of nodes is increased. It is recorded that there is not much difference between the scenario with 50 nodes and the scenario with 200 nodes. However, in the case of ITCM, the network life is short because of the same reason.
Figure 6h depicts the packet loss rate for TBSEER, VFDC, TEM-MEN, and the proposed method. It can be seen from the graph that as the percentage of untrustworthy nodes increases in the network, a large number of packets or data flows to the untrustworthy nodes produces a gradual increase in the packet loss rate. However, the proposed trust model offers low packet loss since the distance of the average route length gets reduced resulting in the low untrustworthy nodes encountering the trusted route. It is observed that for a low percentage of untrustworthy nodes, the percentage hike in the packet loss rate is 38.74%, 45.5%, and 59.39% for TEM-MEN, TBSEER, and VFDC methods, respectively, when contrasted with the proposed method. For a higher percentage of trustworthy nodes, the percentage packet loss of the proposed method reduces by 24.86% when compared with TEM-MEN. TBSEER performs better than VFDC and shows an 11.66% decrease in packet loss rate than that in VFDC.
Table 4 gives the average route length for the trust evaluation approaches that employ edge nodes. The proposed scheme calculates the shortest route length for the trusted route. The longest route path is given by the VFDC algorithm. TBSEER performs moderately and the TEM-MEN approach performs well after the proposed method. Table 5 shows the comparison between various optimization approaches on the basis of energy usage, data sent to the cluster heads, and cluster load balance factor. It can be clearly observed that the proposed model, which employs a modified GWO algorithm, delivers the highest number of packets to CH—i.e., 1858—whereas the other optimization approaches such as PSO, Cuckoo search, GWO, and whale optimization, respectively, delivered 1124, 1466, 1689, and 1256 packets successfully to CH node. The minimum load balance factor for cluster balance is recorded for modified GWO and is 0.48. The energy consumed during the intra-cluster communication is lower for modified GWO (0.26 J) than for PSO (0.89 J), GWO (0.38 J), CS (0.73 J), and WOA (0.45 J).
Table 4.
Average route length.
Table 5.
Intra-cluster parameters comparison with other optimization approaches used for clustering of nodes.
Besides this, a separate set of experiments are conducted on the two untrusted scenarios, which are mentioned below:
- 1.
- Of the total 200 nodes, 25% or 50 untrustworthy nodes are considered to be uniformly distributed in the given area of .
- 2.
- Of the total 200 nodes, 50% or 100 untrustworthy nodes are considered to be uniformly distributed in the given area of .
The simulation results for network lifetime, throughput analysis, and energy efficiency are presented in Figure 7, Figure 8 and Figure 9, respectively. The proposed method is compared against the untrusted scenarios of TBSEER and VFDC approaches. Figure 7a depicts the network life for the 25% of untrustworthy nodes out of the total 200 nodes. Similarly, Figure 7b gives the network lifetime analysis for 50% of untrustworthy nodes out of the total 200 nodes. It is noticed that the network lifetime of the proposed TARM method is higher than the other two methods. Figure 8 presents the throughput evaluation for 25% and 50% of untrustworthy nodes out of 200 nodes in Figure 8a,b, respectively.
Figure 7.
Network lifetime evaluation for untrusted scenarios: (a) 25% of untrustworthy nodes out of the total 200 nodes; (b) 50% of untrustworthy nodes out of the total 200 nodes.
Figure 8.
Throughput analysis for untrusted scenarios: (a) 25% of untrustworthy nodes out of the total 200 nodes; (b) 50% of untrustworthy nodes out of the total 200 nodes.
Figure 9.
Energy efficiency in joules for untrusted scenarios: (a) 25% of untrustworthy nodes out of the total 200 nodes; (b) 50% of untrustworthy nodes out of the total 200 nodes.
Finally, the efficiency in terms of energy is depicted for both the untrusted scenarios against TBSEER and VFDC methods in Figure 9a,b, respectively. It is observed that for the first scenario—that is, 25% of untrustworthy nodes out of total nodes, the performance of the proposed method is better and sustains for more iterations compared with the second scenario—that is, 50% of untrustworthy nodes out of 200 nodes. This shows that as the number of untrustworthy nodes increases, the performance starts degrading. Hence, the proposed method works on detecting the faulty or untrustworthy nodes and establishing trust routes using trusted nodes in the sensor network.
5.3. Statistical Evaluation
The statistical evaluation is the non-parametric evaluation of the approach performed for validating the performance of the proposed technique with other similar techniques. For comparison, we consider five existing but similar approaches i.e., particle swarm optimization (PSO), ant colony optimization (ACO), hybrid whale GWO [35], modified bee colony optimization (MBCO) [23], and ant lion optimization with K-means (ALO-K) [22]. The objective function is taken to be the proposed one, which is expressed in Equation (1). Table 6 shows the success rates and average time taken for execution of all these algorithms. Higher success rate exhibits better performance, and lower time taken for execution leads to faster convergence of the algorithm. It can be noted that the proposed modified GWO and ABC algorithms performs better than other existing algorithms.
Table 6.
Success rates and average time of execution for all algorithms.
We compare the heuristic algorithms using the datasets described in Table 7 and paired observations. Statistical tests such as Friedman’s test and Holm’s test help in identifying the best heuristic approach for trustworthiness. The test procedures used in this paper to analyze the observations in datasets are Friedman’s test and Holm’s test. In these methods, the null hypothesis says that all algorithms have the same variances and mean cost while the alternate hypothesis says that all algorithms have different variances and mean cost.
Table 7.
Dataset description.
5.3.1. Friedman Test
It is used to find the variations between the groups which have rank-dependent variables. The null hypothesis states that all algorithms perform equally while the alternate hypothesis says that there are differences in each algorithm’s performance. Here, we consider the best optimal values of intra-cluster distances expressed in Equation (5) as the basis to assign ranks (written in brackets after each best-optimized value) from one to six, as shown in Table 8. The Friedman distribution value is given by
where is expressed as
where x is the number of datasets and y is the total number of algorithms ( and ) being compared. The degree of freedom is and , i.e., between 5 and 20; using this, the critical value obtained from F-distribution at is 2.711. The values of and computed from the above equations are 18.428 and 11.216, respectively. As it can be noticed that is greater than the critical value, the null hypothesis is rejected, showing that the performances of all algorithms are different.
Table 8.
Average ranks of algorithms based on optimized values.
5.3.2. Holm’s Test
Friedman’s test shows the rejection of the null hypothesis for all algorithms; so, here, we use Holm’s procedure as a post-hoc test. The z-value is given by , where the ranks are taken from Table 8. is the average rank of the proposed method and . Using this z-value, the p-value is obtained from a normal distribution chart. This p-value is compared with . If the p-value is less than , the null hypothesis is rejected; otherwise, it is accepted. Table 9 shows that Hybrid WGWO, MBCO, and ALO-K perform similarly to the proposed algorithm and other heuristic approaches perform differently.
Table 9.
Average ranks of algorithms based on optimized values.
6. Conclusions
To establish a trust-based relationship between the nodes in an IoT-based network and a mobile edge data collector for dynamic scenarios, we develop a trust-aware model that enables clustering and routing in a sensor network. In our proposed work, an edge-enabled IoT architecture is implemented to find trustworthy nodes and those nodes are only targeted for data gathering. The clustering is performed using modified gray wolf optimization and the ABC approach is utilized for effective routing. The results manifested that the proposed work ensures energy-saving and has the advantage of having negligible packets drop. The proposed scheme shows approximately 80% reduction in average delay and around 50–70% reduction in energy consumption when compared with other state-of-the-art approaches. Furthermore, the accuracy of the proposed scheme is recorded to be 91.96%. The proposed distributed method can be easily implemented for a broad range of IoT applications that ensures good data transmission and information storage by virtue of edge intelligence. As a future direction, this work can be further extended for large-scale sensor networks that can use more than one edge node. The method can be made computationally efficient by employing some novel learning techniques to find trustworthy nodes and routes. Furthermore, multi-objective optimization can also be used to achieve energy-efficient optimized clustering and routing.
Author Contributions
Conceptualization, A.S. and P.J.; Data curation, A.S. and P.J.; Formal analysis, A.S., P.J. and S.S.S.; Funding acquisition, R.S.R. and S.S.S.; Investigation, A.S. and P.J.; Methodology, A.S. and P.J.; Project administration, P.J. and R.S.R.; Resources, A.S., P.J. and R.S.R.; Software, S.S.S.; Supervision, R.S.R. and S.S.S.; Validation, A.S., P.J., R.S.R. and S.S.S.; Visualization, A.S. and P.J.; Writing—original draft, A.S. and P.J.; Writing—review & editing, P.J., R.S.R. and S.S.S. All authors have read and agreed to the published version of the manuscript.
Funding
This research received no external funding.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
The data used for this paper are cited within the article.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Donta, P.K.; Srirama, S.N.; Amgoth, T.; Annavarapu, C.S.R. Survey on recent advances in IoT application layer protocols and machine learning scope for research directions. Digit. Commun. Netw. 2022, in press. [CrossRef]
- Abdalzaher, M.S.; Muta, O. A game-theoretic approach for enhancing security and data trustworthiness in IoT applications. IEEE Internet Things J. 2020, 7, 11250–11261. [Google Scholar] [CrossRef]
- Kumar, D.P.; Amgoth, T.; Annavarapu, C.S.R. Machine learning algorithms for wireless sensor networks: A survey. Inf. Fusion 2019, 49, 1–25. [Google Scholar] [CrossRef]
- Lin, H.; Garg, S.; Hu, J.; Wang, X.; Piran, M.J.; Hossain, M.S. Data fusion and transfer learning empowered granular trust evaluation for Internet of Things. Inf. Fusion 2022, 78, 149–157. [Google Scholar] [CrossRef]
- Donta, P.K.; Amgoth, T.; Annavarapu, C.S.R. Delay-aware data fusion in duty-cycled wireless sensor networks: A Q-learning approach. Sustain. Comput. Inform. Syst. 2022, 33, 100642. [Google Scholar] [CrossRef]
- Donta, P.K.; Amgoth, T.; Rao, A.C.S. Congestion-aware data acquisition with q-learning for wireless sensor networks. In Proceedings of the 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Vancouver, BC, Canada, 9–12 September 2020; pp. 1–6. [Google Scholar]
- Makkar, A.; Ghosh, U.; Sharma, P.K. Artificial intelligence and edge computing-enabled web spam detection for next generation IoT applications. IEEE Sens. J. 2021, 21, 25352–25361. [Google Scholar] [CrossRef]
- Zhang, J.; Bhuiyan, M.Z.A.; Yang, X.; Singh, A.K.; Hsu, D.F.; Luo, E. Trustworthy Target Tracking With Collaborative Deep Reinforcement Learning in EdgeAI-Aided IoT. IEEE Trans. Ind. Inform. 2022, 18, 1301–1309. [Google Scholar] [CrossRef]
- Mo, W.; Wang, T.; Zhang, S.; Zhang, J. An active and verifiable trust evaluation approach for edge computing. J. Cloud Comput. 2020, 9, 1–19. [Google Scholar] [CrossRef]
- Wang, T.; Qiu, L.; Sangaiah, A.K.; Liu, A.; Bhuiyan, M.Z.A.; Ma, Y. Edge-computing-based trustworthy data collection model in the internet of things. IEEE Internet Things J. 2020, 7, 4218–4227. [Google Scholar] [CrossRef]
- Anwar, R.W.; Zainal, A.; Outay, F.; Yasar, A.; Iqbal, S. BTEM: Belief based trust evaluation mechanism for wireless sensor networks. Future Gener. Comput. Syst. 2019, 96, 605–616. [Google Scholar] [CrossRef]
- Sah, D.K.; Nguyen, T.N.; Kandulna, M.; Cengiz, K.; Amgoth, T. 3D Localization and Error Minimization in Underwater Sensor Networks. ACM Trans. Sens. Netw. (TOSN) 2022. [Google Scholar] [CrossRef]
- Ouyang, Y.; Liu, W.; Yang, Q.; Mao, X.; Li, F. Trust based task offloading scheme in UAV-enhanced edge computing network. Peer-Netw. Appl. 2021, 14, 3268–3290. [Google Scholar] [CrossRef]
- Sah, D.K.; Amgoth, T.; Cengiz, K. Energy efficient medium access control protocol for data collection in wireless sensor network: A Q-learning approach. Sustain. Energy Technol. Assess. 2022, 53, 102530. [Google Scholar] [CrossRef]
- Kaushik, A.; Indu, S.; Gupta, D. A grey wolf optimization approach for improving the performance of wireless sensor networks. Wirel. Pers. Commun. 2019, 106, 1429–1449. [Google Scholar] [CrossRef]
- Wang, T.; Wang, P.; Cai, S.; Zheng, X.; Ma, Y.; Jia, W.; Wang, G. Mobile edge-enabled trust evaluation for the Internet of Things. Inf. Fusion 2021, 75, 90–100. [Google Scholar] [CrossRef]
- Hu, H.; Han, Y.; Yao, M.; Song, X. Trust based secure and energy efficient routing protocol for wireless sensor networks. IEEE Access 2021, 10, 10585–10596. [Google Scholar] [CrossRef]
- Yang, L.; Yu, K.; Yang, S.X.; Chakraborty, C.; Lu, Y.; Guo, T. An intelligent trust cloud management method for secure clustering in 5G enabled internet of medical things. IEEE Trans. Ind. Inform. 2021, 18, 8864–8875. [Google Scholar] [CrossRef]
- Kammoun, N.; Abassi, R.; Guemara, S. Towards a new clustering algorithm based on trust management and edge computing for IoT. In Proceedings of the 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, 24–28 June 2019; pp. 1570–1575. [Google Scholar]
- Qureshi, K.N.; Iftikhar, A.; Bhatti, S.N.; Piccialli, F.; Giampaolo, F.; Jeon, G. Trust management and evaluation for edge intelligence in the Internet of Things. Eng. Appl. Artif. Intell. 2020, 94, 103756. [Google Scholar] [CrossRef]
- Haseeb, K.; Din, I.U.; Almogren, A.; Ahmed, I.; Guizani, M. Intelligent and secure edge-enabled computing model for sustainable cities using green internet of things. Sustain. Cities Soc. 2021, 68, 102779. [Google Scholar] [CrossRef]
- Majhi, S.K.; Biswal, S. Optimal cluster analysis using hybrid K-Means and Ant Lion Optimizer. Karbala Int. J. Mod. Sci. 2018, 4, 347–360. [Google Scholar] [CrossRef]
- Das, P.; Das, D.K.; Dey, S. A modified Bee Colony Optimization (MBCO) and its hybridization with k-means for an application to data clustering. Appl. Soft Comput. 2018, 70, 590–603. [Google Scholar] [CrossRef]
- Khan, F.; Jan, M.A.; ur Rehman, A.; Mastorakis, S.; Alazab, M.; Watters, P. A secured and intelligent communication scheme for IIoT-enabled pervasive edge computing. IEEE Trans. Ind. Inform. 2020, 17, 5128–5137. [Google Scholar] [CrossRef] [PubMed]
- Kumar, P.; Amgoth, T.; Annavarapu, C.S.R. ACO-based mobile sink path determination for wireless sensor networks under non-uniform data constraints. Appl. Soft Comput. 2018, 69, 528–540. [Google Scholar]
- Rm, S.P.; Maddikunta, P.K.R.; Parimala, M.; Koppu, S.; Gadekallu, T.R.; Chowdhary, C.L.; Alazab, M. An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Comput. Commun. 2020, 160, 139–149. [Google Scholar]
- Iwendi, C.; Maddikunta, P.K.R.; Gadekallu, T.R.; Lakshmanna, K.; Bashir, A.K.; Piran, M.J. A metaheuristic optimization approach for energy efficiency in the IoT networks. Softw. Pract. Exp. 2021, 51, 2558–2571. [Google Scholar] [CrossRef]
- Zhao, Y.; Yang, J.; Bao, Y.; Song, H. Trustworthy authorization method for security in Industrial Internet of Things. Ad Hoc Netw. 2021, 121, 102607. [Google Scholar] [CrossRef]
- Vaiyapuri, T.; Parvathy, V.S.; Manikandan, V.; Krishnaraj, N.; Gupta, D.; Shankar, K. A novel hybrid optimization for cluster-based routing protocol in information-centric wireless sensor networks for IoT based mobile edge computing. Wirel. Pers. Commun. 2021, 1–24. [Google Scholar] [CrossRef]
- Pincheira, M.; Vecchio, M.; Giaffreda, R.; Kanhere, S.S. Cost-effective IoT devices as trustworthy data sources for a blockchain-based water management system in precision agriculture. Comput. Electron. Agric. 2021, 180, 105889. [Google Scholar] [CrossRef]
- Suhail, S.; Hussain, R.; Jurdak, R.; Hong, C.S. Trustworthy Digital Twins in the Industrial Internet of Things with Blockchain. IEEE Internet Comput. 2021, 26, 58–67. [Google Scholar] [CrossRef]
- Wang, Z.; Ding, H.; Li, B.; Bao, L.; Yang, Z. An energy efficient routing protocol based on improved artificial bee colony algorithm for wireless sensor networks. IEEE Access 2020, 8, 133577–133596. [Google Scholar] [CrossRef]
- Hriez, S.; Almajali, S.; Elgala, H.; Ayyash, M.; Salameh, H.B. A novel trust-aware and energy-aware clustering method that uses stochastic fractal search in IoT-enabled wireless sensor networks. IEEE Syst. J. 2021, 16, 2693–2704. [Google Scholar] [CrossRef]
- Sah, D.K.; Cengiz, K.; Donta, P.K.; Inukollu, V.N.; Amgoth, T. EDGF: Empirical dataset generation framework for wireless sensor networks. Comput. Commun. 2021, 180, 48–56. [Google Scholar] [CrossRef]
- Rathore, R.S.; Sangwan, S.; Prakash, S.; Adhikari, K.; Kharel, R.; Cao, Y. Hybrid WGWO: Whale grey wolf optimization-based novel energy-efficient clustering for EH-WSNs. EURASIP J. Wirel. Commun. Netw. 2020, 2020, 101. [Google Scholar] [CrossRef]
- Gates, G. The reduced nearest neighbor rule (corresp.). IEEE Trans. Inf. Theory 1972, 18, 431–433. [Google Scholar] [CrossRef]
- Raymer, M.L.; Doom, T.E.; Kuhn, L.A.; Punch, W.F. Knowledge discovery in medical and biological datasets using a hybrid Bayes classifier/evolutionary algorithm. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 2003, 33, 802–813. [Google Scholar] [CrossRef] [PubMed]
- Mohammadi, M.; Al-Fuqaha, A.; Guizani, M.; Oh, J.S. Semisupervised deep reinforcement learning in support of IoT and smart city services. IEEE Internet Things J. 2017, 5, 624–635. [Google Scholar] [CrossRef]
- Koklu, M.; Ozkan, I.A. Multiclass classification of dry beans using computer vision and machine learning techniques. Comput. Electron. Agric. 2020, 174, 105507. [Google Scholar] [CrossRef]
- De Vito, S.; Massera, E.; Piga, M.; Martinotto, L.; Di Francia, G. On field calibration of an electronic nose for benzene estimation in an urban pollution monitoring scenario. Sens. Actuators B Chem. 2008, 129, 750–757. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).