Context-Aware Trust Prediction for Optimal Routing in Opportunistic IoT Systems
Abstract
1. Introduction
- We propose a novel trust-aware routing framework for SO-IoT that integrates social compatibility and behavioral reliability into a unified trust-level computation model.
- A comprehensive trust evaluation mechanism is developed using Bayesian inference and Jeffrey’s conditioning to dynamically assess node behavior in uncertain environments.
- The proposed model is validated through scenario-based simulations using synthetic datasets, demonstrating its adaptability across varied network conditions.
- A large-scale NS-3 simulation is conducted to benchmark the proposed method against traditional and AI-based routing schemes, highlighting its superior performance in delivery ratio, latency, energy consumption, routing overhead, and trust accuracy.
- The results confirm the scalability, efficiency, and robustness of our approach, making it suitable for deployment in dynamic, resource-constrained SO-IoT systems.
2. Related Work
3. System Model
- Input Acquisition: Each intermediate node maintains logs of its interactions, including successful and failed message exchanges and contextually similar service records.
- Social Compatibility Estimation: The semantic alignment of nodes is computed using a social interest model based on a beta distribution.
- Reliability Estimation: Behavioral consistency is derived from the node’s message-forwarding history using Bayesian methods.
- Trust Integration: Social compatibility and reliability are combined to compute a composite trust level.
- Optimal Node Selection: The node with the highest trust level is selected for secure data transfer.
- = total successful requests related to from n to m;
- = total failed requests related to .
Algorithm 1 Enhanced Trust-Based Intermediate Node Selection |
|
3.1. Resilience to Adversarial Trust Manipulation
3.2. Toward Multi-Hop Trust Routing
4. Simulation and Results
4.1. Scenario-Based Evaluation
4.1.1. Scenario 1: Trust Evaluation with Five Intermediate Nodes
4.1.2. Scenario 2: Trust Evaluation with Six Intermediate Nodes
4.1.3. Scenario 3: Trust Evaluation with Nine Intermediate Nodes
4.2. Comparative Evaluation with Benchmark Routing Schemes
4.2.1. Impact of Simulation Runs on Statistical Stability
4.2.2. Scalability and Computational Overhead
5. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Glossary
References
- Dubey, A.K.; Kumar, A.; Kumar, S.R.; Gayathri, N.; Das, P. AI and IoT-Based Intelligent Automation in Robotics; John Wiley & Sons: Hoboken, NJ, USA, 2021. [Google Scholar]
- Ding, J.; Nemati, M.; Ranaweera, C.; Choi, J. IoT connectivity technologies and applications: A survey. IEEE Access 2020, 8, 67646–67673. [Google Scholar] [CrossRef]
- Valsalan, P.; Baomar, T.A.B.; Baabood, A.H.O. IoT based health monitoring system. J. Crit. Rev. 2020, 7, 739–743. [Google Scholar]
- Bathla, G.; Bhadane, K.; Singh, R.K.; Kumar, R.; Aluvalu, R.; Krishnamurthi, R.; Kumar, A.; Thakur, R.; Basheer, S. Autonomous vehicles and intelligent automation: Applications, challenges, and opportunities. Mob. Inf. Syst. 2022, 2022, 7632892. [Google Scholar] [CrossRef]
- Bahashwan, A.A.; Anbar, M.; Abdullah, N.; Al-Hadhrami, T.; Hanshi, S.M. Review on common IoT communication technologies for both long-range network (LPWAN) and short-range network. In Advances on Smart and Soft Computing; Springer: Singapore, 2021; pp. 341–353. [Google Scholar]
- Iqbal, A.; Shakeel, A.; Rashid, A.; Kim, S.W. IoT and M2M Applications in Satellite Networks. In Integrated Terrestrial and Non-Terrestrial Networks; Springer: Cham, Switzerland, 2024; pp. 17–45. [Google Scholar]
- Rashmi, M.; Raj, C.V. A review on trust models of social Internet of Things. In Emerging Research in Electronics, Computer Science and Technology; Springer: Singapore, 2019; pp. 203–209. [Google Scholar]
- Guo, B.; Yu, Z.; Zhou, X.; Zhang, D. Opportunistic IoT: Exploring the social side of the internet of things. In Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Wuhan, China, 23–25 May 2012; pp. 925–929. [Google Scholar]
- Nigam, R.; Kumar Sharma, D.; Jain, S.; Krishna Bhardwaj, K.; Banyal, S. AI-enabled trust-based routing protocol for social opportunistic IoT networks. Trans. Emerg. Telecommun. Technol. 2024, 35, e4330. [Google Scholar] [CrossRef]
- Winter, T.; Thubert, P.; Brandt, A.; Hui, J.; Kelsey, R.; Levis, P.; Pister, K.; Struik, R.; Vasseur, J.P.; Alexander, R. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550, IETF. 2012. Available online: https://datatracker.ietf.org/doc/html/rfc6550 (accessed on 2 June 2025).
- Muzammal, S.M.; Murugesan, R.K.; Jhanjhi, N.Z. A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches. IEEE Internet Things J. 2020, 8, 4186–4210. [Google Scholar] [CrossRef]
- Airehrour, D.; Gutierrez, J.A.; Ray, S.K. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Gener. Comput. Syst. 2019, 93, 860–876. [Google Scholar] [CrossRef]
- Qiu, T.; Chen, B.; Sangaiah, A.K.; Ma, J.; Huang, R. A survey of mobile social networks: Applications, social characteristics, and challenges. IEEE Syst. J. 2017, 12, 3932–3947. [Google Scholar] [CrossRef]
- Singh, J.; Dhurandher, S.K.; Woungang, I.; Chao, H.C. Context-Aware Trust and Reputation Routing Protocol for Opportunistic IoT Networks. Sensors 2024, 24, 7650. [Google Scholar] [CrossRef]
- Box, G.E.; Tiao, G.C. Bayesian Inference in Statistical Analysis; John Wiley & Sons: Hoboken, NJ, USA, 2011. [Google Scholar]
- Tetteh, A.; Archival, S.J.; Ceniza-Canillo, A.M. A Comprehensive Review of Security Threats and Malicious Node Detection in Opportunistic IoT Environments. In Proceedings of the 2024 IEEE Region 10 Symposium (TENSYMP), New Delhi, India, 27–29 September 2024; pp. 1–6. [Google Scholar]
- Shafer, G. Jeffrey’s rule of conditioning. Philos. Sci. 1981, 48, 337–362. [Google Scholar] [CrossRef]
- Yu, L.; Xu, G.; Wang, Z.; Zhang, N.; Wei, F. A hybrid opportunistic IoT secure routing strategy based on node intimacy and trust value. Secur. Commun. Netw. 2022, 2022, 6343764. [Google Scholar] [CrossRef]
- Malik, A. A social relationship-based energy efficient routing scheme for Opportunistic Internet of Things. ICT Express 2023, 9, 697–705. [Google Scholar]
- Kumar, P.; Chauhan, N.; Chaurasia, N.; Agarwal, K.K.; Vidyarthi, A.; Gupta, D. Benevolence Behavior Based Message Forwarding Scheme for Consumer-Centric IoT Opportunistic Networks. IEEE Trans. Consum. Electron. 2024, 70, 6892–6900. [Google Scholar] [CrossRef]
- Cauteruccio, F.; Cinelli, L.; Fortino, G.; Savaglio, C.; Terracina, G.; Ursino, D.; Virgili, L. An approach to compute the scope of a social object in a Multi-IoT scenario. Pervasive Mob. Comput. 2020, 67, 101223. [Google Scholar] [CrossRef]
- Zhou, H.; Wang, H.; Wang, N.; Li, D.; Cao, Y.; Li, X.; Wu, J. Exploiting mobile social networks from temporal perspective: A survey. IEEE Access 2019, 7, 180818–180834. [Google Scholar] [CrossRef]
- El Hajji, F.; Leghris, C.; Douzi, K. Adaptive routing protocol for lifetime maximization in multi-constraint wireless sensor networks. J. Commun. Inf. Netw. 2018, 3, 67–83. [Google Scholar] [CrossRef]
- Muzammal, S.M.; Murugesan, R.K.; Jhanjhi, N.Z.; Humayun, M.; Ibrahim, A.O.; Abdelmaboud, A. A trust-based model for secure routing against RPL attacks in internet of things. Sensors 2022, 22, 7052. [Google Scholar] [CrossRef]
- Cai, X.; Shi, K.; Sun, Y.; Cao, J.; Wen, S.; Qiao, C.; Tian, Z. Stability analysis of networked control systems under DoS attacks and security controller design with mini-batch machine learning supervision. IEEE Trans. Inf. Forensics Secur. 2023, 19, 3857–3865. [Google Scholar] [CrossRef]
- Cai, X.; Shi, K.; Sun, Y.; Cao, J.; Kwon, O.M.; Qiao, C.; Tian, Z. Design of intelligent control under machine learning supervision and signal compression mechanism design for NCSs under DoS attacks. IEEE Trans. Intell. Transp. Syst. 2024, 25, 15116–15121. [Google Scholar] [CrossRef]
- Cai, X.; Shi, K.; Sun, Y.; Cao, J.; Wen, S.; Tian, Z. Intelligent event-triggered control supervised by mini-batch machine learning and data compression mechanism for TS fuzzy NCSs under DoS attacks. IEEE Trans. Fuzzy Syst. 2023, 32, 804–815. [Google Scholar] [CrossRef]
- Servetto, S.D.; Barrenechea, G. Constrained random walks on random graphs: Routing algorithms for large scale wireless sensor networks. In Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, GA, USA, 28 September 2002; pp. 12–21. [Google Scholar]
- Hao, S.; Hong, Y.; He, Y. An energy-efficient routing algorithm based on greedy strategy for energy harvesting wireless sensor networks. Sensors 2022, 22, 1645. [Google Scholar] [CrossRef]
- Kumar, N.; Vidyarthi, D.P. A green routing algorithm for IoT-enabled software defined wireless sensor network. IEEE Sensors J. 2018, 18, 9449–9460. [Google Scholar] [CrossRef]
- IEEE Std 802.15.4-2020; IEEE Standard for Low-Rate Wireless Networks. IEEE Standards Association: Piscataway, NJ, USA, 2020. Available online: https://standards.ieee.org/standard/802_15_4-2020.html (accessed on 8 June 2025).
Protocol | Trust Basis and Methodology | Main Contributions/Results |
---|---|---|
HIRouter [18] | Node intimacy + trust value from encounters | Balances efficiency and security; improves delivery rate and reduces overhead in dense Opp IoT settings |
SEER [19] | Social ties + resource awareness | Enhances network lifetime and delivery performance using well-connected, energy-rich nodes |
TBRP [9] | Contextual trust metrics + NSGA-II optimization | Combines AI and trust for robust routing; highest delivery rates among tested schemes |
CATR [14] | Bayesian trust modeling with context factors | Reduces latency and message drops by dynamically adapting trust |
BeRout [20] | Benevolence-based scoring + buffer policy | Rewards cooperative nodes; optimizes delivery in constrained environments |
SOScope [21] | Social object scope modeling in Multi-IoT | Enhances service discovery and collaboration using object-level social context |
TMSN-Survey [22] | Temporal behavior in mobile social networks | Informs trust evolution and routing through dynamic user interaction patterns |
ACRP [23] | Adaptive routing under multiple constraints | Maximizes network lifetime with lightweight and efficient trust-routing strategies |
Parameter | Value | Description |
---|---|---|
Simulation Time | 3600 s | Duration of each simulation run |
Number of Nodes | 200–500 | IoT devices deployed randomly |
Deployment Area | 1000 m × 1000 m | 2D environment for node mobility |
Mobility Model | Random Waypoint | Nodes move with random speed and direction |
Communication Range | 100 m | Range of IEEE 802.15.4 communication |
MAC Protocol | IEEE 802.15.4 | Low-power communication standard |
Packet Size | 512 bytes | Fixed size for transmitted packets |
Traffic Type | CBR (Constant Bit Rate) | Steady data generation |
Trust Update Interval | 5 s | Frequency of local trust computation and updates |
Number of Runs | 10/100/1000/10,000 | Total independent simulation repetitions for statistical averaging |
Performance Metrics Measured | Delivery Ratio, Latency, Energy, Routing Overhead, Trust Accuracy | Evaluated across all runs for robustness |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hasan, A.A.; Fang, X.; Latif, S.; Iqbal, A. Context-Aware Trust Prediction for Optimal Routing in Opportunistic IoT Systems. Sensors 2025, 25, 3672. https://doi.org/10.3390/s25123672
Hasan AA, Fang X, Latif S, Iqbal A. Context-Aware Trust Prediction for Optimal Routing in Opportunistic IoT Systems. Sensors. 2025; 25(12):3672. https://doi.org/10.3390/s25123672
Chicago/Turabian StyleHasan, Abdulkadir Abdulahi, Xianwen Fang, Sohaib Latif, and Adeel Iqbal. 2025. "Context-Aware Trust Prediction for Optimal Routing in Opportunistic IoT Systems" Sensors 25, no. 12: 3672. https://doi.org/10.3390/s25123672
APA StyleHasan, A. A., Fang, X., Latif, S., & Iqbal, A. (2025). Context-Aware Trust Prediction for Optimal Routing in Opportunistic IoT Systems. Sensors, 25(12), 3672. https://doi.org/10.3390/s25123672