You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

16 December 2025

ATAW-TM: An Adaptive, Threshold-Free, and Automatically Weighted Trust Model for Mitigating Multiple Types of Denial-of-Service Attacks in Software-Defined Wireless Sensor Networks

,
and
School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland 1010, New Zealand
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Computer Networking Security and Privacy

Abstract

Wireless sensor networks (WSNs), including Software-Defined Wireless Sensors, are particularly vulnerable to Denial-of-Service (DoS) attacks. Trust models are widely acknowledged as an effective strategy to mitigate the threat of successful DoS attacks in WSNs. However, existing trust models commonly rely on threshold configurations that are based on the network administrator’s experience and leave the challenging task of weight allocation for various trust metrics to network users. This limits the widespread application of trust models as a WSN defence mechanism. To address that issue, this study proposes and theoretically analyses an Adaptive, Threshold-Free, and Automatically Weighted Trust Model (ATAW-TM) for SDWSNs. The model architecture is aligned with the layered centralized management architecture of SDWSNs, which makes it flexible and enhances its responsiveness. The proposed model does not require manual threshold configuration and weight allocation and allows for rapid trust system recovery. It has significant advantages compared to existing trust models and is potentially more feasible to implement on a large scale.

1. Introduction

A wireless sensor network (WSN) comprises spatially distributed sensor nodes, which include sensing, data processing, and communication components [1]. These nodes self-organize to create a multi-hop wireless network. The sensors can be used to detect and collect environmental or physical data, such as humidity, sound, and temperature [2]. These data are transmitted through the network to a centralized hub (a base station or a sink node) and subsequently forwarded to an Internet-based server for analysis and processing [3,4]. WSNs are widely used in a large variety of applications including military, environmental monitoring, smart homes, agriculture, animal husbandry, and health monitoring.
With Internet of Things (IoT) technology continuously evolving, WSNs have become more widely used. At the same time, their various limitations have become increasingly clear, such as when applications require the WSNs to be tailored to meet unique functional and performance requirements, and the nodes are self-configuring distributed management. These limitations create challenges in terms of dynamic network management, scalability, and node recycling. Incorporating the concept of Software-Defined Networking (SDN) (which facilitates more dynamic and manageable network operations through the functional separation of the control and the forwarding planes) into WSNs has helped meet these challenges and given rise to a new type of WSN: Software-Defined Wireless Sensor Networks (SDWSNs) [5].

1.1. Operational Features and Characteristics of SDWSNs

SDWSNs incorporate a centralized controller that maintains a global view of the network and dynamically configures sensor nodes through southbound interfaces, similar to OpenFlow. Figure 1 presents the basic structure of an SDWSN, which includes a data plane, an application plane, and a central controller [6].
Figure 1. The basic structure of an SDWSN.
Unlike conventional WSNs, where decisions are distributed and often rigid, SDWSNs support the following operational features [5,6]:
  • Control–data plane separation:
    The control plane houses the network intelligence, makes global decisions, and manages data plane behaviour. The controller builds global network views, calculates optimal paths and policies. The data plane is responsible for actual packet processing, forwarding, and data transmission based on predefined rules.
2.
Flow table-based forwarding:
The controller installs flow rules in data plane devices’ flow tables. These store matching rules and actions. The nodes process packets based on installed flow rules.
SDWSNs combine the flexibility of SDNs with the specific features of WSNs, which makes SDWSNs suitable for a broad range of applications. Compared to WSNs, SDWSNs have the following advantaged characteristics [6,7]:
1.
Flexibility and Programmability
SDWSNs provide increased flexibility and programmability by segregating control plane activities from the data plane. The decoupling supports network adjustments and optimization in response to real-time requirements.
2.
Centralized Management
SDWSNs enable centralized management, including network configuration. The behaviour and data flow of sensor nodes are coordinated by SDN controllers, which improves network management efficiency.
3.
Dynamic Optimization
The control layer enables SDWSNs to dynamically optimize the use of network resources and to adjust data routing strategies. This improves network performance and reliability.
4.
Enhanced Scalability
The entire set of sensor nodes across the data plane is visible to the central controller, which facilitates efficient network management. This is especially beneficial in the case of large-scale network expansion.

1.2. Application Scenarios of SDWSNs

Due to these advantages, SDWSNs are increasingly considered for mission-critical and dynamic application domains [8,9], such as the following:
  • Industrial Internet of Things (IIoT), where a rapid reconfiguration and reliability are crucial.
  • Environmental and structural health monitoring, requiring adaptive routing in large-scale deployments.
  • Emergency and disaster response, where nodes may be mobile and the network topology frequently changes.
  • Military and tactical sensing, which demand centralized coordination and strict security controls.
These scenarios highlight the necessity of an architecture capable of handling dynamic conditions and enforcing fine-grained and flexible security policies.

1.3. Security Challenges and DoS Vulnerabilities in SDWSNs

Despite their advantages, SDWSNs introduce unique security risks. The centralized controller, while improving coordination, also becomes a prime target for Denial-of-Service (DoS) attacks [10]. Attackers may overwhelm the controller with excessive requests, inject false control messages, manipulate routing rules, or exploit multi-hop wireless communication to generate traffic flooding.
Furthermore, traditional cryptographic mechanisms alone cannot defend against insider nodes that behave maliciously yet possess valid keys [11]. This limitation is particularly problematic in SDWSNs, where compromised nodes can exploit controller–node interactions to degrade network performance or disrupt global routing operations.

1.4. Necessity of Trust-Based DoS Mitigation in SDWSNs

Trust models, which establish a network of trust among entities by evaluating and predicting their behaviour based on observed interactions [11], can provide effective defence against DoS attacks under uncertain conditions. These models consider the node behaviour and reputation when making decisions about trustworthiness (like how trust and reputation are established in the context of human behaviour, through continuous interaction and observation). Trust-based mechanisms can differentiate legitimate nodes from misbehaving or compromised ones, thereby achieving the following [10,12,13]:
  • Detecting internal DoS behaviours that cryptography cannot address;
  • Protecting the controller from unnecessary or malicious traffic;
  • Supporting adaptive responses through flow rule adjustments issued by the controller.
Thus, integrating trust evaluation with the SDWSN architecture is a natural and necessary solution for mitigating DoS threats.

1.5. Target Scenario of This Study

This study focuses on a typical SDWSN deployment consisting of a central controller and multiple static sensor nodes operating in a multi-hop wireless topology. Nodes forward sensing data toward the controller, and the controller manages routing through flow table updates. The network is assumed to face internal DoS threats, such as flooding attacks, blackhole attacks, and vampire attacks caused by compromised nodes.
Our work investigates how a trust-based mechanism can be integrated into this SDWSN architecture to detect and mitigate the 14 types of DoS attacks in SDWSNs [14], ensuring stable communication.
Trust models in WSNs have gained increasing recognition and have been widely studied. Numerous trust models have been proposed, with some specifically addressing the challenges of DoS attacks. However, trust models in WSNs are still new and have not set any standards yet [15,16]. There has been extensive research on mechanisms leveraging trust evaluation to defend against DoS threats in traditional WSN environments [11,14], especially in addressing threshold limitations in trust evaluation [10,17], the assignment of weights to trust metrics [18,19,20,21], and the loss of trust information [10,22,23,24,25].

1.6. Contributions

This study addresses the research gaps above in the context of SDWSNs. It explores the design of innovative trust mechanisms applicable to SDWSNs and proposes a solution to mitigate all the 14 types of DoS attacks identified. This study makes the following research contributions:
  • A three-layer trust framework (node, cluster head, and controller) to address a wide range of DoS attacks in SDWSNs.
  • A combined method of outlier detection and the Bayesian Beta approach to calculate direct trust values within the layered architecture of SDWSNs’ trust model. This approach eliminates the dependency on threshold-setting algorithms that rely on network administrators’ prior knowledge of specific SDWSNs.
  • A method for integrating reciprocal weighting and entropy-based weighting to automatically assign adaptive weights to various trust metrics across the control and data planes of SDWSNs. This approach eliminates the inaccuracies in combined trust value calculations caused by fixed weights and the difficulties users face in assigning weights.
  • A method for referencing the logistic function that converts the difference between historical combined trust values and current combined trust values into an aging factor. Within the centralized control framework of SDWSNs, this allows for dynamic automatic adjustment of the aging factor. Consequently, when a node exhibits malicious behaviour, its trust value decreases rapidly, and when it returns to normal behaviour, its trust value increases slowly.
  • A trust information retrieval mechanism tailored for SDWSNs’ hierarchical structure that enables both member nodes and cluster head (CH) nodes to quickly recover lost trust information from the controller or cluster level. This feature leverages the centralized control and global visibility of SDWSNs to ensure the robustness and resilience of the trust management system after information loss.
The structure of the remainder of this paper is as follows: Section 2 provides an overview of related work. Section 3 presents the proposed trust model (ATAW-TM). Section 4 analyses ATAW-TM within the context of the existing literature, highlighting its contributions. Section 5 discusses the results and concludes the paper; directions for future research are also outlined.

3. Materials and Methods

The proposed Adaptive, Threshold-Free, and Automatically Weighted Trust Model (ATAW-TM) is a trust model specifically designed for SDWSNs to detect DoS attacks within these networks. It eliminates the reliance on human prior knowledge during application, enhancing its usability, and incorporates trust information backup and rapid recovery mechanisms to improve stability. The model is implemented using SDN-WISE as the underlying architecture, with the SDN controller embedded within the sink node to simplify network design and reduce overheads.
ATAW-TM adopts a three-tier hierarchical architecture, comprising the node level, cluster head (CH) level, and controller level. Each level contributes to a layered and cooperative trust evaluation and decision-making process. An overview of the ATAW-TM is presented in Figure 2.
Figure 2. Overview of the ATAW-TM. Different colours in the figure represent distinct functional categories in the trust management process: blue blocks denote different sources of trust evidence; dark blue blocks represent initial trust evaluation inputs such as link quality and timer operations; green blocks indicate trust com-putation and aggregation procedures; yellow blocks represent reporting or forwarding operations, such as transmitting local trust values; and orange blocks denote security-related decision actions, specifically identifying and isolating malicious nodes and adjusting flow rules.
At the node level, each sensor node performs its own node-level evaluation process. First, start a timer for trust evaluation to perform periodic trust assessments. Second, nodes are tasked with extracting trust evidence and performing direct trust computation locally. At the beginning of each trust evaluation, assess the link quality between the node and its neighbouring nodes. If the link quality is good, continue with the evaluation process; if the communication link becomes unstable or weak, wait for the next evaluation round. During the evaluation, nodes extract trust evidence and compute the direct trust value locally. Trust evidence encompasses communication, energy, and data indicators. Communication-related trust indicators include metrics such as the transmission and reception rates of both data and control packets, as well as their respective forwarding rates. These indicators were identified in [14] as the eight types of trust evidence, including the data packet sending rate (DSR), control packet sending rate (CSR), data packet receiving rate (DRR), control packet receiving rate (CRR), data packet forwarding rate (DFR), control packet forwarding rate (CFR), energy consumption rate (ECR), and data accuracy (DA).
Next, each direct trust value corresponding to these metrics is then employed to calculate the combined trust value through an automatic weighting algorithm that integrates the direct trust values derived from individual metrics. The historical and current trust metrics are weighed using an aging factor to reflect temporal relevance, resulting in the local trust value. Finally, nodes periodically send their local trust value to the CH of its respective cluster.
The CH is responsible for collecting the local trust value reported by each node and forwarding the report message to the controller. It calculates the aggregated trust value by weighted averaging of the local trust values received from each node using its own calculated local trust value, and it relays trust values to the controller. The CH uses the aggregated trust value to recognize node maliciousness. Subsequently, it halts forwarding any messages to and from malicious nodes, thus segregating detected malicious nodes.
The controller, positioned within the sink node, gathers trust values from all nodes and computes their aggregated trust values from a global perspective. It identifies malicious nodes according to their aggregated trust scores. It then adjusts the flow rules to isolate the identified malicious nodes.

3.1. Node-Level Operations: Extracting Trust Evidence

3.1.1. Assessing Link Quality

Before each trust evaluation, it assesses the quality of connections linking the node with its neighbouring nodes to avoid a low link quality affecting the trustworthiness scores of legitimate nodes. Because of the openness of WSNs’ wireless communication, the links between sensor nodes are unstable and can be influenced by the environment. With low-quality links, the communication capability decreases, causing reductions in the rates of packet transmission, reception, and forwarding, thus resulting in a lower calculated trust value.
In ATAW-TM, we use the method proposed in [19] to evaluate the link quality, which relies on the Link Quality Indicator (LQI). In the widely adopted CC2420 ratio, the LQI is calculated from the first eight symbols of a received packet, ranging between 0 and 255. The proposed method involves the evaluation node collecting LQI data over a specific period of time, followed by the calculation of the mean value. If the calculated mean surpasses the threshold, such as 220, the link is considered normal, and the evaluation process continues. If the mean value is below the threshold, the link is considered unstable, and the assessment is temporarily halted and resumed in the next cycle to re-evaluate the link quality.
To prevent attackers from intentionally manipulating link quality indicators (LQIs) to evade trust evaluation, we use a robustness mechanism. This conducts neighbour consistency checks by comparing LQI patterns across adjacent nodes. If a single node’s LQI decreases while most of its neighbours (more than a threshold θ) remain normal, the node’s degraded LQI is treated as suspicious, and it continues to undergo trust evaluation. In contrast, if LQI degradation is observed across most nodes in the neighbourhood, the drop is likely caused by environmental interference, and trust evaluation for all nodes in that neighbourhood is suspended. This prevents attackers from exploiting LQI manipulation to bypass detection.

3.1.2. Extracting Trust Evidence

Figure 3 below illustrates the trust evidence included in our trust model, along with the corresponding extraction methods.
Figure 3. Trust evidence and the corresponding extraction methods.
The rates at which data and control packets are sent and received are extracted using the sensor node’s promiscuous receiving mode. When this mode is enabled, any packet within the node’s receiving range (whether intended for it or another node) is processed. The packet count for a given node is raised by one whenever a data or control packet from that node is identified. Additionally, by examining each incoming packet’s destination address and type, the system determines the target node and updates its associated count.
The forwarding rates for data and control packets are determined using listening methods as follows. Promiscuous receiving mode is activated on the sensor node to allow the capture of all surrounding traffic. Once the node is ready to monitor forwarding behaviour, it transmits a packet and starts a watchdog timer. During this monitoring window, the node observes the actions of the intended recipient. Successful forwarding is recorded if the target recipient relays the packet prior to the expiration of the timer; otherwise, failed relaying is logged. Furthermore, to assess the control packet forwarding rate, the ACK-based mechanism can be employed as a supplementary technique alongside the listening method. Forwarding is considered successful if the forwarded packet or its corresponding ACK message is detected.
Using the remaining energy information embedded in beacon messages, the ECR of a node is calculated. This rate is then compared to the ECRs of other nodes to identify any differences.
For data trust evidence, the sensor node collects readings from all its neighbouring nodes using the open receiving mode. It then determines whether there is data deviation by comparing these readings with the neighbourhood data references.

3.2. Node-Level Operations: Calculating, Updating, and Reporting Trust Values

3.2.1. The Process of Direct Trust Value Calculation

To overcome the obstacle of threshold setting in the threshold limitation approach that relies on the network administrator’s a priori knowledge of the particular network, we assign a cooperation probability to each value through the outlier detection method when calculating the direct trust values for DSR, CSR, DRR, CRR, ECR, and DA, and then we use the Bayesian Beta method to derive the direct trust values.
In contrast, the forwarding-related metrics, DFR and CFR, represent fundamentally different types of evidence. Forwarding is not a continuous measure but a discrete binary event: a packet is either forwarded successfully or it is not. Consequently, it is neither meaningful nor necessary to compute a probabilistic cooperation value based on distributional assumptions. Instead, forwarding trust is modelled using a binary assignment, where successful forwarding (observed through listening or ACK mechanisms) is assigned a cooperation value of 1 and unsuccessful forwarding is assigned a value of 0. These binary outcomes are then directly incorporated into the Bayesian Beta method. The processes of direct trust value calculation are shown in Figure 4.
Figure 4. The processes of direct trust value calculation.
The evaluation is conducted over a defined period of time using the following framework for each metric. At the start of an evaluation period, we initialize the Beta distribution parameters for each metric: the count of cooperative interactions (α) and the count of non-cooperative interactions ( β ). These two parameters form the basis for calculating trust values. The initial state for all nodes and all metrics is set to zero ( α  = 0, β = 0), indicating no prior history.
Next, the node collects trust metric datasets for each metric. The cooperation probability ( p ) is calculated using a Gaussian distribution model based on the collected trust metric datasets. This allows the node to determine the likelihood that its neighbours are behaving cooperatively. It is used to update the α and β parameters. The direct trust value ( T ) is computed from α and β as the expected value of the Beta distribution at the end of the period, representing the trustworthiness of a node in a specific metric.

3.2.2. The Method of Cooperation Probability Calculation

Multiple studies, through experiments or simulations, have verified that in WSNs where node behaviour is independent, homogeneous, and static, the traffic of nodes and the collected sample data approximately follow a Gaussian distribution when the number of nodes is large enough [37,38,39]. Therefore, we adopt a cooperation probability calculation method based on a Gaussian distribution.
The packet size is a common feature in traffic analysis and intrusion detection [40]. However, it is not included in the proposed trust model because DoS attacks typically manifest through abnormal transmission rates and forwarding behaviours rather than size anomalies [14]. This design choice reduces the computational overhead while maintaining detection effectiveness. Let us assume that the evaluation node is node i , and the set of all n neighbouring nodes being evaluated is represented as j   =   1 ,   2 ,   3 ,   ,   n . In an evaluation period, node i monitors its neighbours to build datasets for calculating the cooperation probabilities. The specific data collected for each metric is outlined in Table 1.
Table 1. Dataset for each metric.
This method assumes that the data follows a Gaussian distribution, meaning most data points are concentrated around the mean, and the probability of data points appearing decreases as they deviate further from the mean. Assume the data sample set collected by the sensor node is X = x 1 ,   x 2 ,   ,   x n . First, it is necessary to calculate the mean μ and standard deviation σ of the dataset as shown in Equations (1) and (2),
μ = 1 n i = 1 n x i
σ = 1 n i = 1 n x i μ 2
which are the basic parameters required for calculating the Gaussian distribution. For each data point x , the probability density value P x can be calculated using the Gaussian distribution probability density function as shown in Equation (3):
P x =   1 σ 2 π exp x   μ 2 2 σ 2
where 1 σ 2 π   is the normalization constant of the Gaussian distribution, ensuring the total probability is 1, and exp x   μ 2 2 σ 2   is the probability density value for each data point, reflecting the degree of deviation of the data point from the mean. P x is not the actual probability but the probability density value, indicating the relative frequency of occurrence near that point. The higher the density, the closer the data point is to the center (mean), and the higher the probability of occurrence; the lower the density, the further it is from the mean, possibly indicating an outlier. The curve of a Gaussian distribution probability density function is shown in Figure 5. In this figure, the mean (μ) is 50 and the standard deviation (σ) is 10.
Figure 5. Gaussian distribution PDF curve.
Then, we define the cooperation probability of a data point as the ratio between its probability density and that of the mean, as shown in Equation (4),
P C o x = P x P μ = exp x μ 2 2 σ 2
where P C o x   represents the cooperation probability of x . The function curve of our cooperation probability is shown in Figure 6. In this figure, the values of paraments μ and σ are the same as in Figure 5.
Figure 6. Cooperation probability function curve.
From this figure, we can see the range of the cooperation probability is from 0 to 1. The closer the value is to the mean, the closer its cooperation probability is to 1; the further away from the mean, the closer its cooperation probability is to 0.
Since a single node j sends multiple data packets ( m packets, where m varies per node), a unique method is used to compute its overall DA cooperation probability. The final P C o _ i j d a for a node is the arithmetic mean of the cooperation probabilities calculated for each individual data packet it sent during the period, as shown in Equation (5),
P C o _ i j d a = k = 1 m P C o _ i j _ k d a m
where P C o _ i j d a represents the DA cooperation probability of node j , P C o _ i j _ k d a represents the cooperation probability of the DA for the kth data transmitted by node j , and m represents the total number of items sent by node j during the evaluation period.

3.2.3. The Method of Direct Trust Value Calculation

The direct trust value is then computed using the classical Bayesian Beta approach. Ganeriwal et al. [11,41] provided a detailed investigation into how Bayesian formulations and Beta distributions can be applied to trust modelling within WSNs. They extended the cooperation metric from a binary rating to an interval rating, meaning it is no longer simply cooperative or non-cooperative but is a probability. They applied the Dirichlet process and derived that the parameter update formulas for binary ratings are similarly applicable to interval ratings. After a single transaction, if the assigned cooperation probability is P C o _ j , the Beta parameters are updated as shown as Equation (6).
α i j n e w = α i j + P C o _ i j β i j n e w = β i j + 1 P C o _ i j
From the viewpoint of node i , the parameters α i j and β i j characterize the cooperative and non-cooperative behaviours observed between nodes i and j at the initiation of a transaction. Similarly, α i j n e w and β i j n e w characterize the cooperative and non-cooperative behaviours of nodes i and j as observed by node i upon the completion of a single transaction. The trust score of node j computed from node i ’s perspective is the expected value of the beta distributions, which can be easily computed, as shown in Equation (7).
T i j = E B e t a α i j , β i j = α i j α i j + β i j
We consider the behaviour of sending or receiving packets within an evaluation period as a single transaction. By substituting Equation (6) into Equation (7), we can derive the method for calculating the direct trust values for DSR, CSR, DRR, CRR, ECR, and DA at the end of an evaluation period, as shown in Equation (8),
T i j d s = α i j d s + P C o _ i j d s α i j d s + β i j d s + 1 T i j c s = α i j c s + P C o _ i j c s α i j c s + β i j c s + 1   T i j d r = α i j d r + P C o _ i j d r α i j d r + β i j d r + 1 T i j c r = α i j c r + P C o _ i j c r α i j c r + β i j c r + 1 T i j e c = α i j e c + P C o i j e c α i j e c + β i j e c + 1 T i j d a = α i j d a + P C o _ i j d a α i j d a + β i j d a + 1
for each metric X , where X represents six behavioural metrics (DSR, CSR, DRR, CRR, ECR, and DA), respectively. α i j X and β i j X represent the count of cooperative interactions and the count of noncooperative interactions of metric X of node j . P C o _ i j X represents the assigned cooperation probability for node j with metric X . This probability is calculated based on observed behaviours. It is used to update the α i j X and β i j X parameters. T i j X represents the direct trust value of node j in metric X . This value is computed from α i j X and β i j X at the end of the period. The relationship between these parameters for all six metrics is summarized in Table 2.
Table 2. The relationship between these parameters for all six metrics.

3.2.4. The Specific Case of DFR and CFR

The direct trust values for DFR and CFR are also calculated using the classical Bayesian Beta method, as shown in Equation (5). However, unlike other trust metrics, there is no need to calculate the cooperation probability of the dataset. Instead, the cooperation probability is defined as a binary number, either 1 or 0, as in Equation (4), where P C o _ i j is 1 or 0. When it is confirmed through monitoring or ACK methods that node j has successfully forwarded a packet, P C o _ i j is assigned a value of 1; otherwise, it is assigned a value of 0. At the end of the evaluation period, the Beta parameters are updated, as shown in Equation (9),
α i j n e w = α i j + m P C o _ i j ¯ β i j n e w = β i j + m   m P C o _ i j ¯
where m represents the total number of data or control packets that node j either successfully forwarded or failed to forward during the evaluation period. For each forwarding action, a cooperation rating is assigned: 1 if the packet was forwarded successfully, and   0 otherwise. These ratings form the set: P C o _ i j = { P C o _ i j _ 1 , P C o _ i j _ 2 , P C o _ i j _ 3 , …, P C o _ i j _ m } ∈ {0, 1}. By substituting Equation (9) into Equation (5), the formula for the direct trust values of DFR and CFR at the end of an evaluation period is obtained, as in Equation (10),
T i j d f = α i j d f + m P C o _ i j d f ¯ α i j d f + β i j d f + m T i j c f = α i j c f + m P C o _ i j c f ¯ α i j c f + β i j c f + m
where T i j d f and T i j c f represent the direct trust values of DFR and CFR for node j , respectively. The parameters α i j d f , β i j d f , α i j c f , and β i j c f represent the counts of cooperative and non-cooperative forwarding actions for data and control packets, respectively, at the beginning of an evaluation period. For initialization, all Beta parameters are set to zero.

3.2.5. Calculating the Combined Trust Value

When calculating the combined trust value, we use a method that combines the reciprocal method and entropy-based method [42] to assign weights to the direct trust values of each trust metric.
By taking the reciprocal of the direct trust values, we assign higher weights to lower trust values, accelerating the decline of combined trust for anomalous nodes. This helps achieve the goal of quickly identifying malicious nodes. We form a dataset of all direct trust values, organized according to the trust metrics in the sequence: T i j d s , T i j c s , T i j d r , T i j c r , T i j e c , T i j d a , T i j d f , T i j c f represented as T i j 1 ,   T i j 2 ,   T i j 3 ,   T i j 4 ,   T i j 5 ,   T i j 6 ,   T i j 7 ,   T i j 8 . The weighting scheme for each trust metric, illustrated in Equation (11),
ρ i j r = 1 T i j r + ϵ  
is derived by applying the reciprocal function to each trust value. ρ i j r represents the weighting factor assigned to the direct trust value from node i to node j for the rth trust metric. The values of r ranges from 1 to 8. ϵ is a very small number serving to prevent division by zero.
Building on the reciprocal method, we further use the entropy-based method to adjust the final weights. Entropy-based weighting is often interpreted as reducing the weight of highly uncertain information sources. In contrast, our design adopts a security-oriented interpretation: when a specific trust metric exhibits high volatility within a neighbourhood, this volatility frequently reflects a stronger discriminative power for identifying abnormal behaviour. Thus, after reciprocal weighting penalizes low trust values, entropy is used to amplify metrics that better separate benign from malicious behaviours. By calculating the “volatility” (entropy) of each metric, we automatically identify which metrics are more important in the network scenario and accordingly increase the weights of these trust values. This allows the trust evaluation to automatically adapt to different network or attack scenarios. For example, in scenarios where the attack affects transmission rates, such as alarm systems, the trust value weights of communication metrics are automatically strengthened. In scenarios where the attack aims to affect DA, such as medical monitoring systems, the impact of DA metrics is automatically amplified.
Shannon’s information theory defines entropy as a fundamental metric for quantifying uncertainty in a system [42]. If a random variable X has a set of possible values x 1 ,   x 2 ,   ,   x n with a corresponding probability distribution p x 1 ,   p x 2 ,   ,   p x n , then the entropy H is defined as shown in Equation (12):
H X = i = 1 n p x i log b p x i
where H ( X ) represents entropy of the random variable X ; p x i represents the probability of the event x i ; and b represents the base of the logarithm, typically 2 (for bits), e (for natural entropy, in nats), or 10 . The more uniform the probability distribution, the greater the entropy, and the higher the uncertainty of the system. The choice of the logarithmic base in entropy calculation significantly affects the sensitivity and discrimination of the resulting weights. In this study, we choose base b = 2 for the entropy function, as it offers higher sensitivity to ‘probability imbalance’. To illustrate the effect of the logarithm base, consider a simple probability distribution: Let P = 0.8 ,   0.2 . Then, entropy values computed with different bases are show in Table 3.
Table 3. Entropy values computed with different bases.
Among these three entropy values, the binary entropy value is the largest, indicating that it is more sensitive to the degree of value fluctuation. Furthermore, we calculate the information entropy with bases 2 , e , and 10 for the probability distributions (0.8, 0.2), (0.6, 0.4), and (0.5, 0.5), respectively, and perform a comparative analysis, as shown in Table 4.
Table 4. Entropy values of different probability distributions computed with different bases.
From Table 4, we can see that the difference in entropy values for different probability distributions is the largest when the base is 2 . Therefore, in our trust model, when using base 2 for the entropy function, can more clearly distinguish which trust metrics are more important. For normalization, we use the factor k = 1 / log 2 n , which ensures that the entropy values are scaled to the [0, 1] interval.
First, we ‘normalize’ each trust metric to form a pseudo-probability distribution, so that it can be used as an input for information entropy to measure the fluctuation of each metric. Suppose the dataset of the rth trust metric collected by node i from all its neighbouring nodes is X i r = x i 1 r ,   x i 2 r ,   ,   x i n r . Normalize this trust metric as shown in Equation (13),
p x i j r = x i j r j = 1 n x i j r
where n denotes the count of immediate neighbours of node i . P X i r = p x i 1 r ,   p x i 2 r ,   ,   p x i n r is the pseudo-probability distribution corresponding to X i r = x i 1 r ,   x i 2 r ,   ,   x i n r , j = 1 n p x i j r = 1 .
To quantify uncertainty in the rth trust metric, we employ Equation (12) to compute its entropy and normalize it as shown in Equation (14),
θ i r = 1 log 2 n j = 1 n p x i j r log 2 p x i j r
where θ i r represents the normalized entropy of the rth metric calculated by node i within its neighbourhood. The smaller the θ i r , the greater the variation, and the more important the metric, which should be given a higher weight. The entropy weight factor calculation method is shown in Equation (15),
λ i r = 1 θ i r r = 1 8 1 θ i r
where λ i r represents the entropy weight factor for the rth metric calculated by node i within its neighbourhood.

3.2.6. Combining Reciprocal Weighting and Entropy-Based Weighting

Following the reciprocal computation, the weights are modified using the adjustment factor λ i r , and normalized to produce the final set of weights, as illustrated in Equation (16),
w i j r = ρ i j r λ i r r = 1 8 ρ i j r λ i r
where w i j r represents the weight of the rth trust metric.
Finally, to derive the combined trust score, we compute the weighted average of all trust metrics, as specified in Equation (17),
C T i j = r = 1 8 w i j r T i j r
where C T i j denotes the combined trust score assigned by node i to node j.

3.2.7. Updating the Local Trust Value at the Node

We adopt an asymmetric update strategy in which trust values drop rapidly upon detecting abnormal behaviour and recover gradually during normal operation. This design follows common principles in trust management for WSNs, where rapid decay improves responsiveness to potential attacks while slow recovery prevents malicious nodes from regaining trust too quickly [11]. Previous research showed that the unified decay–recovery strategy provides a stable performance across these behaviours without requiring attack-specific tuning [21,43].
By weighing the historical and current combined trust values with an aging factor, we derive the local trust value. To achieve a rapid decline in trust value when a node exhibits malicious behaviour and a slow recovery of trust value after the node returns to normal behaviour, we use a dynamically and automatically adjusted aging factor. Based on the logistic function [44] we perform a nonlinear transformation to convert the change from the historical to the current combined trust value into an aging factor. We introduce explicit parameters for the slope ( k ) and midpoint ( x 0 ), making the behaviour of the aging factor more transparent and tunable, as shown in Equation (18),
w i j a g e = 1 1 + exp k C T i j x 0
where t denotes the current moment, C T i j =   C T i j t C T i j t t ,   C T i j t t and C T i j t denote the combined trust values from the previous and current evaluation periods, respectively, t denotes the evaluation period, and w i j a g e denotes the aging factor.
As indicated by the formula, a higher current combined trust value relative to the historical value results in an aging factor close to 1, while a lower value leads it closer to 0.
Then, the combined trust value updated through the aging factor is used as the local trust value, as shown in Equation (19),
L T i j = w i j a g e C T i j t t + 1 w i j a g e C T i j t
where L T i j represents the value of local trust. When a node exhibits malicious behaviour, the current combined trust value decreases, the aging factor becomes smaller, and the weight of the current combined trust value increases, causing the local trust value to decline rapidly. Conversely, when the node returns to normal behaviour, the current combined trust value increases, the aging factor becomes larger, and the weight of the historical combined trust value increases, causing the local trust value to rise slowly.

3.2.8. Reporting the Local Trust Value

Each node needs to periodically send its local trust values for all its neighbours to the CH and the controller for trust aggregation. To avoid introducing an additional transmission overhead, we use the method from ETMRM [10] for reporting local trust values. Instead of generating separate trust packets, each node embeds the trust values into the SDN-WISE report messages that are sent to the controller as part of the standard control-plane operation. As in the native SDN-WISE architecture, the cluster head forwards the report messages from all nodes in the cluster to the controller, enabling centralized trust aggregation. SDN-WISE report messages use a compact binary format optimized for resource-constrained sensor nodes. Figure 7 shows the message structure used in this work.
Figure 7. The format of the SDN-WISE report message.
To ensure that trust dissemination remains lightweight, the real-valued trust scores computed in the previous section (ranging from 0 to 1 and represented as 4-byte floating-point numbers) are converted into 1-byte unsigned integers in the range of [0, 100], following the approach in ETMRM [10], as shown in Equation (20).
L T i j = 100 · L T i j
This compression significantly reduces the size of the embedded trust data and enables the inclusion of multiple trust values without increasing the overall packet size beyond SDN-WISE’s normal control-message budget. Consequently, the trust-reporting mechanism integrates seamlessly with existing SDN-WISE control-plane messages and incurs negligible communication costs.

3.3. CH-Level Operations

3.3.1. Collecting the Local Trust Values of Cluster Member Nodes

The CH node also calculates local trust values for its neighbours. After receiving the SDN-WISE report message from its cluster member nodes, the CH node reads the reported local trust values from these messages. These secondhand trust values, along with the local trust values calculated by the CH node itself, are stored in the global array of the CH in the form of a matrix, as shown in Equation (21),
L T i j = L T 11 L T 12 L T 1 n L T 21 L T 22 L T 2 n L T n 1 L T n 2 L T n n
where L T i j denotes the local trust value that node i assigns to node j , its neighbour. n is the total number of nodes within the cluster, i , j [ 1 , n ] . If node j is not within the neighbourhood of node i , then node i cannot perform a trust evaluation on node j . In this case, L T i j equals 0. Node i is not allowed to evaluate itself, so its self-trust value is set to 0.

3.3.2. Trust Aggregation at CH Level

In the trust aggregation process, we adopt the approach proposed by Bin-Yahya et al. [12], which incorporates two key metrics: score reliability and node reliability. To compute score reliability, we measure how much a local trust value deviates from the average of all local trust values assigned to the evaluated node by its neighbours. We then use this metric to calculate node reliability and to assign weights to each trust value during aggregation.
To determine node reliability, we take the arithmetic mean of the score reliability values corresponding to a node’s trust evaluations of all its neighbours. This metric enables us to identify nodes that may be engaging in trust manipulation behaviours, such as good-mouthing or bad-mouthing attacks.
To calculate the score reliability metric, we first need to compute the arithmetic mean of the local trust values of node j given by all its neighbour nodes within the cluster. We take all elements greater than 0 in the jth column of the matrix and calculate their arithmetic mean, as shown in Equation (22),
A T a v g , j = i X L T i j N X
where X represents the group of neighbouring nodes associated with node j , and N X represents the total count of node j ’s neighbours. Then, we calculate the score reliability of the local trust value assigned by node i to node j using Equation (23).
S R i j = 100 L T i j A T a v g , j
Then, to compute the node reliability metric, we use the score reliability metrics as inputs, as shown in Equation (24),
N R i = j Y S R i j N Y
where N R i represents the node reliability metric of node i , Y represents the set of neighbour nodes of node i , and N Y represents the total count of node i ’s neighbours. The node reliability metric is iteratively updated using the historical and current values according to the method in Equation (19).
To aggregate local trust values based on the score reliability metric and the node reliability metric, we set a lower threshold N R t h for the node reliability metric, and we only aggregate the local trust values given by nodes whose node reliability metric exceeds this threshold. We derive the aggregated trust value using the method outlined in Equation (25),
A T C , j = i C L T i j · S R i j i C S R i j
where C represents the group of node j ’s neighbour nodes within the cluster whose node reliability metric exceeds the threshold. L T i j is the local trust value given by node i of node j , and S R i j is the score reliability metric of that local trust value. A T C , j is the aggregated trust value of node j at the CH level.

3.3.3. Forwarding the Local Trust Values

CH periodically sends its local trust values for all its neighbours to the controller through the SDN-WISE report message. Additionally, it forwards the SDN-WISE report messages from the cluster member nodes to the controller. These messages contain the local trust values computed by each node for its immediate neighbours.

3.3.4. Identifying and Isolating Malicious Nodes at CH Level

The CH detects malicious nodes by analysing the aggregated trust values of cluster members. It then stops forwarding any messages to the malicious nodes and stops forwarding any messages from the malicious nodes.

3.4. Controller-Level Operations

3.4.1. Collecting the Local Trust Values of All Nodes in the Network

Upon receiving an SDN-WISE message from a network node, the controller extracts the local trust values of neighbouring nodes embedded in the message. These values are then organized into a matrix and stored in the controller’s global array, following the method outlined in Equation (21). This trust matrix offers a comprehensive global view of the network’s trust landscape.

3.4.2. Trust Aggregation at Controller Level

In conducting trust aggregation at the controller level, we apply the same approach as that used at the CH level. The computation is grounded in the trust matrix, which provides a global perspective, as previously introduced.

3.4.3. Identifying and Isolating Malicious Nodes at Controller Level

The controller detects malicious nodes by evaluating the aggregated trust values within the network. It then adjusts flow rules. If the detected malicious node is the CH, a new CH needs to be selected, and the network topology needs to be re-established. When a malicious node j is identified as a regular node, a control message with a drop rule is sent by the controller to the CH of the corresponding cluster. The CH then propagates the control message throughout its cluster by forwarding it to each member node. Upon receiving this control message, the member nodes modify the flow table stored locally. This modification includes inserting a drop rule <src_addr = ‘j’, action = ‘Drop’> into the flow table and removing the rule with <next_hop = ‘j’> from the flow table to avoid forwarding packets to the malicious node. In SDN-WISE, the flow table includes three parts: Matching Rules, Actions, and Statistics. Figure 8 is an example of a flow table in SDN-WISE. For specific explanations of each field, please refer to SDN-WISE [8,34].
Figure 8. An example of a flow table in SDN-WISE. Different background colours in the table represent different functional categories: the blue back-ground indicates the matching-rule fields used for packet comparison; the light blue background denotes the action fields specifying how the packet is processed; and the orange background rep-resents statistical information related to the rule, such as TTL and the packet counter.

3.5. Retrieval of Trust Information

We assume that the controller has unlimited storage resources, allowing for full backup of trust information, and the single point of failure problem of the controller is not addressed in our work. Therefore, only ordinary sensor nodes and CH nodes need to retrieve trust information after it is lost. Since the controller acts as a global repository of trust information for the entire network and each CH manages the trust data of its respective cluster, both cluster heads and ordinary nodes have the ability to recover missing trust records by accessing the controller or the CH. Therefore, we define a pair of new messages based on the existing SDN-WISE messages to request and return trust information. These messages are only exchanged when trust information is lost and do not burden normal communication. The trust information request message does not carry any payload, while the trust reply conveys either cluster-wide trust information or the trust record of the requesting node. The message structures are shown in Figure 9.
Figure 9. The format of the trust information request/reply message.
The “No. Node” field in the trust information reply message indicates the number of nodes whose trust information is included in the message. If a node requests trust information from the CH, the value of this field in the CH’s reply message is 1. When a cluster head (CH) requests trust data from the controller, the reply message contains a field specifying the number of nodes that belong to the CH’s cluster. Within the message format, “Node1 Address” identifies the address of Node 1, while “No. Neighbour” indicates how many neighbouring nodes are associated with Node 1. Following this, the reply provides the detailed addresses and trust values of each neighbouring node. Node 2’s trust information is added sequentially after Node 1’s in the same structure, and this continues until the trust records of all cluster nodes are included.
We incorporate a set of lightweight protection mechanisms suitable for the security of this recovery mechanism. First, all trust retrieval requests and replies should be authenticated by cryptography technologies [45] to prevent forgery. Second, the controller and cluster heads enforce per-node rate limiting through token-bucket mechanisms [46] to restrict excessive requests. Third, suspicious request patterns (e.g., bursts of retrieval messages) are monitored by the controller and can trigger temporary throttling or blacklist actions. These mechanisms provide protection without incurring significant overheads.

4. Results and Analysis

In this section, we present the theoretical analysis of the key algorithm in ATAW-TM. We implemented these algorithms in Python 3.13.9 and applied them to representative datasets to analyse and evaluate their performance.

4.1. Theoretical Analysis Using Cooperation Probability and Bayesian Inference

We begin by analysing the calculation of direct trust values of eight trust metrics using cooperation probabilities and Bayesian inference. We take the DSR metric as an example. Cooperation probabilities are computed using a Gaussian distribution-based formula, and trust values are subsequently calculated through Bayesian inference.

4.1.1. Arithmetic Mean and Standard Deviation Calculation

The dataset consists of data packet sending counts from 20 neighbouring nodes in one evaluation period. The values are as follows:
Data :   x i =   100 , 110 , 105 , 99 , 101 , 98 , 103 , 102 , 97 , 150 , 104 , 99 , 107 , 97 , 103 , 99 , 104 , 106 , 96 , 98
The mean ( μ ) and standard deviation ( σ ) of the dataset are calculated using Equations (1) and (2). The result is μ = 1 20 i = 1 20 x i   = 103.9 , σ = 1 20 i = 1 20 x i   103.9 2 = 11.1933 .

4.1.2. Cooperation Probability Calculation

The cooperation probability for each node is computed using Equation (4).
P C o x = exp x 103.9 2 2 11.1933 2 .

4.1.3. Using Bayesian Inference to Calculate Direct Trust Values

The Bayesian inference process is used to calculate the trust values of each node. Initially, the parameters of the Beta distribution are set to α 0 = 0 and β 0 = 0 . We use Equation (6) to update the parameters of the Beta distribution and use Equation (8) to calculate the direct trust values. The calculated direct trust values for each node are as shown in Table 5.
Table 5. Direct trust values for each node.

4.1.4. Direct Trust Value Calculation Analysis

The calculated direct trust values indicate the level of trust each node has within the network based on their observed cooperation behaviour. The number of data packets sent by Node 10 is 150, much higher than the average of 103.9, which is inconsistent with the behaviour of other nodes. The calculated direct trust value of Node 10’s DSR is close to 0. This effectively identifies Node 10 as a potential malicious node exhibiting a flooding attack. For clarity, we have plotted the data from Table 5 in Figure 10.
Figure 10. Data packet sending count vs. direct trust value in scenario 1. Different colours in the figure represent different metrics: the blue line shows the data packet sending count for each node, and the red line represents the corresponding direct trust value. The sharp deviation at Node 10 highlights the malicious node in this scenario.
To demonstrate the model’s adaptability, we applied it to a second scenario with a higher baseline data rate:
Data :   x i =   1110 ,   1000 ,   1020 ,   995 ,   1010 ,   980 ,   1040 ,   1020 ,   970 ,   1600 , 1040 ,   980 ,   1060 ,   970 ,   1040 ,   990 ,   1050 ,   960 ,   970 ,   1030 .
In this scenario, the model similarly identified the outlier (Node 10 with a count of 1600), as shown in Figure 11.
Figure 11. Data packet sending count vs. direct trust value in scenario 2. Different colours in the figure represent different metrics: the blue line shows the data packet sending count for each node, and the red line represents the corresponding direct trust value. The sharp deviation at Node 10 highlights the malicious node in this scenario.
These results demonstrate ATAW-TM’s ability to function effectively across different network conditions without manual threshold reconfiguration.

4.2. Theoretical Analysis of the Hybrid Reciprocal and Entropy-Based Weighting Strategy

This subsection analyses the hybrid weighting strategy that dynamically assigns importance to the eight-trust metrics, enabling ATAW-TM to adapt to various network conditions and attack patterns.

4.2.1. Direct Trust Value Calculations

Assume we have calculated the direct trust values for eight trust metrics (DSR, CSR, DRR, CRR, ECR, DA, DFR, CFR) for a specific node j from the perspective of node i . The trust values are as follows:
Direct   Trust   Values :   T i j r = 0.9411 ,   0.8952 ,   0.9086 ,   0.9670 ,   0.3269 ,   0.5350 ,   0.8703 ,   0.9857
where r   =   1   to   8 represent the eight trust metrics, respectively. The low ECR (0.3269) and moderate DA (0.5350) trust values suggest potential malicious activity in energy consumption and data accuracy. Other metrics’ trust values are very high.

4.2.2. Reciprocal Weighting Calculation

The reciprocal weighting factors are computed using Equation (11), where ϵ = 0.0001 to prevent division by zero. The calculated reciprocal weights are as follows:
ρ i j r = 1.062 , 1.117 , 1.100 , 1.034 , 3.058 , 1.869 , 1.149 , 1.014

4.2.3. Entropy-Based Weight Calculation

To compute entropy weights, we first collect trust metric datasets from all neighbouring nodes. Assume node i has five neighbours with the following trust values for each metric; among them, the volatility of ECR and DA is relatively high, as shown in bold:
X i 1 = 0.9411 ,   0.8620 ,   0.9952 ,   0.8002 ,   0.9099   DSR
X i 2 = 0.8952 ,   0.9780 ,   0.8870 ,   0.9920 ,   0.9030   CSR
X i 3 = 0.9086 ,   0.8950 ,   0.9120 ,   0.9510 ,   0.8880   DRR
X i 4 = 0.9670 ,   0.9540 ,   0.9020 ,   0.8610 ,   0.8580   CRR
X i 5 = 0.3269 ,   0.8950 ,   0.9120 ,   0.9010 ,   0.8880   ECR
X i 6 = 0.5350 ,   0.7150 ,   0.8980 ,   0.6560 ,   0.8740   DA
X i 7 = 0.8703 ,   0.8560 ,   0.9820 ,   0.8410 ,   0.9670   DFR
X i 8 = 0.9857 ,   0.9720 ,   0.8910 ,   0.9780 ,   0.8040   CFR
We normalize these values using Equation (13) to form pseudo-probability distributions. The normalized entropy is calculated using Equation (14). The entropy weight factors are computed using Equation (15):
λ i r = 1 θ i r r = 1 8 1 θ i r = 0.034 , 0.014 , 0.004 , 0.016 , 0.650 , 0.218 , 0.027 , 0.037

4.2.4. Combined Weight Calculation

The final weights are computed by combining reciprocal and entropy weights using Equation (16):
w i j r = ρ i j r λ i r r = 1 8 ρ i j r λ i r = 0.014 , 0.006 , 0.002 , 0.006 , 0.784 , 0.161 , 0.012 , 0.015

4.2.5. Combined Trust Value Calculation

The combined trust score is calculated using Equation (17):
C T i j =   r = 1 8 w i j r T i j r = 0.3940
The weighting analysis results are consolidated in Table 6 and Figure 12.
Table 6. Weighting analysis results.
Figure 12. Direct trust value and weight comparison.

4.2.6. Analysis

The results demonstrate the effectiveness of the hybrid weighting strategy. The ECR metric, despite having the lowest direct trust value (0.3269), receives the highest final weight (0.784) due to the combined effect of reciprocal weighting (emphasizing low values) and entropy weighting (reflecting its importance in energy-constrained scenarios). The ECR metric and DA metric have higher entropy weighting due to their higher volatility. Although the direct trust values of most metrics are very high, the combined trust value (0.3940) calculated using our weighting method accurately reflects the node’s overall malicious behaviour. Compared to fixed-weight averaging (0.8037), ATAW-TM achieved a combined trust score of 0.3940, representing a 51% increase in detection sensitivity.

4.3. Theoretical Analysis of the Dynamically Adjusted Aging Factor

Finally, we analyse the aging factor mechanism, which enables the trust model to respond rapidly to malicious behaviour while allowing for slow, stable recovery. In this subsection, we set the parameters in the aging factor calculation equation (Equation (18)) to k   =   1.0 and x 0   =   0.0 . A parameter and sensitivity analysis will be conducted in the next subsection.

4.3.1. Trust Value Inputs

Assume that for a given node j , the historical combined trust value from the previous evaluation period is C T i j t Δ t = 0.850 , and the current combined trust value is C T i j t = 0.394 . These values reflect a significant decline in trust, suggesting potential malicious activity during the current period.

4.3.2. Aging Factor Calculation

The aging factor w i j a g e is computed using Equation (18):
w i j a g e = 1 1 + exp 0.456 1 1 + 1.578 0.388  

4.3.3. Updating the Local Trust Value

The local trust value L T i j is then updated using Equation (19):
L T i j = 0.388 × 0.850 + 1 0.388 × 0.394 = 0.329 + 0.241 = 0.570
To further illustrate the behaviour of the aging factor under different scenarios, we consider two additional scenarios:
Scenario 1: Trust Improvement
If C T i j t Δ t = 0.400 and C T i j t = 0.800 , then
w i j a g e = 1 1 + exp 0.400 1 1 + 0.670 0.599
L T i j = 0.599 × 0.400 + 0.401 × 0.800 = 0.240 + 0.321 = 0.561
Scenario 2: Stable Trust
If C T i j t Δ t = 0.700 and C T i j t = 0.710 , then
w i j a g e = 1 1 + exp 0.010 1 1 + 0.990 0.502
L T i j = 0.502 × 0.700 + 0.498 × 0.710 = 0.351 + 0.354 = 0.705
The results are summarized in Table 7.
Table 7. Trust change vs. the aging factor.
We have plotted the relationship between the trust change Δ C T = C T i j t C T i j t Δ t and the aging factor w i j a g e in Figure 13.
Figure 13. Trust change vs. aging factor.

4.3.4. Parameter and Sensitivity

This subsection investigates the impact of the logistic aging parameters k and x 0 and evaluates their sensitivity.
  • Parameter interpretation:
  • Slope parameter k : A larger k increases the steepness of the logistic curve. This leads to faster trust decay when Δ C T becomes negative, improving attack responsiveness but making the model more sensitive to transient noise.
  • Midpoint parameter x 0 : This value determines the tolerance centre. A positive x 0 shifts the logistic curve so that only sufficiently large negative deviations trigger rapid trust decay.
  • Sensitivity study:
To further analyse the impact of the logistic aging parameters and justify the selection of k , x 0 , Figure 14 presents a detailed sensitivity study of the aging factor w i j a g e and its effect on the local trust update process.
Figure 14. Sensitivity analysis of the logistic aging function under different slope parameters k , midpoints x 0 , and trust update behaviours. (a) Impact of slope parameter k : Larger k makes the aging factor curve steeper and increases the sensitivity of the system to trust changes, while smaller k produces smoother transitions. (b) Impact of midpoint parameter x 0 : Shifting x 0 moves the logistic curve horizontally, adjusting the tolerance range so that small fluctuations near Δ C T   =   0 can be either emphasized or suppressed. (c) Sensitivity analysis: When ΔCT is fixed (e.g., Δ C T   =   0.2 ), increasing k leads to a monotonic decrease in the aging factor, revealing how k controls the reaction strength to a given trust change. (d) Local trust update: The updated local trust reflects the weighted combination of historical trust and new trust.
Panel (a) shows that the slope parameter k directly controls the steepness of the logistic curve. A small k results in a smooth and gradual change in w i j a g e , making the system tolerant to small fluctuations in Δ C T . As k increases, the curve becomes sharper, allowing the model to react aggressively to deviations in trust behaviour. This capability is beneficial when rapid isolation of malicious nodes is required, but it may introduce false positives in traffic with high variability.
Panel (b) illustrates how the midpoint x 0 shifts the logistic response horizontally. A positive x 0 delays the decrease in w i j a g e , providing resilience against bursty but benign traffic patterns, whereas a negative x 0 increases the sensitivity of the trust decay mechanism. For instance, when Δ CT ranges from 0.25 to 0.75 , the aging factor with x 0   =   0.10 decreases faster than that with x 0   =   0.00 . This parameter therefore allows the trust system to be tuned for different SDWSN deployments and levels of environmental noise.
Panel (c) quantitatively evaluates the sensitivity of w i j a g e with respect to k under a representative trust decrease Δ CT = 0.2 . As k increases, w i j a g e drops sharply toward zero, demonstrating how steep logistic functions accelerate the suppression of trust values after anomalous behaviour is observed. This analysis supports selecting moderate k values (e.g., k = 5 ) to maintain a balance between responsiveness and robustness.
Panel (d) shows the resulting impact on the local trust update process. When k = 5 and x 0 = 0 , the updated trust curve remains stable under small negative fluctuations but reacts more firmly when continuous negative trust evidence accumulates. This behaviour aligns with the design goal of penalizing persistent malicious behaviour while avoiding excessive punishment for normal variation. It also reflects the design goal of a quick response to malicious activity coupled with a slow, steady recovery.
Overall, Figure 14 demonstrates that the logistic aging mechanism provides tuneable flexibility. By appropriately selecting k and x 0 , the proposed model can balance responsiveness to actual attacks and robustness to transient fluctuations, ensuring reliable operation in diverse SDWSN environments.
If the deployment environment is prone to transient fluctuation or bursty traffic, smaller k values are advisable to avoid unnecessary trust oscillation. Conversely, if rapid identification of malicious nodes is critical, larger k values help accelerate trust decay.

4.3.5. Dynamic Ageing Mechanism Analysis

In terms of robustness, the results demonstrate the effectiveness of the dynamically adjusted aging factor in balancing historical and current trust values. When trust declines significantly (e.g., due to malicious behaviour), the aging factor decreases, giving more weight to the current low trust value. Conversely, when trust improves, the aging factor increases, emphasizing historical trust. Importantly, this asymmetric aging factor also can mitigate false positives during transient disturbances by incorporating historical trust values into the final trust score. For example, in the Trust Decline scenario shown in Table 7, when trust drops from 0.850 to 0.394, the adjusted final local trust value becomes 0.570, which smooths the abrupt change compared to using only the current value. This mechanism enhances the model’s robustness in dynamic SDWSN environments.
In terms of detection sensitivity, this dynamically adjusted aging factor is a crucial defence against On–Off Attacks, where a malicious node switches between good and bad behaviour to build trust and then exploit it. ATAW-TM counters this with an asymmetric response:
  • During the “Off” (malicious) phase, a sharp drop in current trust leads to a small aging factor, causing the local trust value to plummet rapidly for quick detection and isolation.
  • During the “On” (normal) phase, recovery is intentionally slow. A larger aging factor prioritizes the node’s poor history, preventing it from quickly regaining trust after brief good behaviour.
This mechanism significantly raises the cost and reduces the effectiveness of on–off attacks, thereby mitigating the associated risk.
As discussed above, this dynamic aging mechanism achieves a balance between model robustness and detection sensitivity.

4.4. Computational Complexity Analysis

A key advantage of the proposed trust model is its low computational complexity, which makes it suitable for resource-constrained SDWSNs. The local trust computation for each node is based on lightweight operations, including counting forwarding events, calculating simple deviations, and performing scalar updates of trust values. For a node with d neighbours, the complexity of local trust evaluation is O d , as each neighbour is processed once per trust update cycle.
The cooperation probability calculation also relies on basic arithmetic using pre-computed mean and deviation terms, avoiding expensive operations such as matrix computation or iterative training as required in learning-based approaches. Trust aggregation at the cluster head only involves summing or averaging trust values received from cluster members, resulting in O n c complexity, where n c is the number of nodes in the cluster.
The overall computational cost of the full trust update process is therefore linear in the number of neighbour relationships in the network and does not depend on the network size beyond local connectivity. This lightweight design ensures that the model can operate efficiently on SDWSN sensor nodes with limited CPU, memory, and energy resources, while maintaining responsiveness to DoS-related misbehaviour.

5. Discussion

The ATAW-TM model proposed above was designed specifically for SDWSNs. The model addresses key limitations of existing trust models, particularly those related to threshold configurations, weight allocation, and the loss of trust information in the presence of DoS attacks. ATAW-TM enhances the detection of DoS attacks and supports dynamic, self-adjusting trust evaluations by adopting a layered architecture with components at the node, CH, and controller levels. While the sensor nodes in the node layer evaluate their trust locally by assessing the link quality, extracting trust evidence, and calculating direct trust values, in the CH layer, these values are processed to calculate aggregated trust scores and to identify and isolate malicious nodes. IN the controller layer, the process of global trust aggregation isolates malicious nodes by adjusting flow rules.
The core principle of ATAW-TM is adaptability in response to changing node network behaviour; the depictable trust evaluation mechanism removes the need for manual threshold configuration, through outlier detection and Bayesian inference. The model automatically computes trust values and assigns weights to various trust metrics using a hybrid reciprocal and entropy-based weighting strategy. This ensures that the model can dynamically adjust its focus based on the prevailing network conditions, making it highly adaptable to different attack types. Additionally, the incorporation of a logistic function-based aging factor balances the influence of historical and current trust valueS, allowing for more accurate evaluations of node behaviour over time. The model features a trust information retrieval mechanism as well to facilitate rapid recovery when trust information is lost, ensuring the resilience and stability of the network. ATAW-TM improves reliability in dynamic SDWSN environments by integrating link quality checks and trust information retrieval mechanisms, ensuring robustness against intermittent connectivity.

5.1. Comparison with Other Models

We propose a resilient trust model for SDWSNs, designed to effectively identify various types of DoS attacks. Compared to the previous trust models designed for SDWSNs [10,12,13,33], the proposed model has the following advantages.
First, our trust model considers and addresses the issue of wireless link qualities between sensor nodes being affected by the environment, while others did not consider link qualities at all. Moreover, our trust model is comprehensively designed to account for multiple types of DoS attacks, whereas other models typically consider only a subset of these attacks.
Second, our trust model does not use thresholds for evaluating packet transmission behaviour, eliminating the need for network administrators to configure thresholds, thus making it easily applicable to various WSNs. Previous models such as the ones described in [10,12] used threshold-based algorithms, which had issues with threshold configuration. The model proposed in [13] did not use threshold-based algorithms but considered using a complex IDS module, whereas our model is more lightweight.
Third, in our trust model, the weights of various trust metrics are dynamically and automatically assigned based on their values through an algorithm when calculating the combined trust value. This prevents a malicious node’s good performance in one aspect from masking its malicious behaviour in another aspect. In previous trust models [12,33], researchers left the task of assigning weights to users, which raised a significant obstacle standing in the way of the widespread application of trust models. In [10], fixed weights were used for the metrics of the data packet forwarding rate and control packet forwarding rate, resulting in poor flexibility and accuracy. The model proposed in [13] did not involve this weight assignment issue but considered using a complex IDS module.
Furthermore, our trust model uses a dynamically adjusted aging factor in the iterative update process of historical and current trust values, effectively balancing historical and current trust values. The models described in [10,13] did not consider historical trust values, while the model introduced in [12] considered historical trust values but used a fixed aging factor, resulting in poor flexibility and accuracy.
Additionally, we designed a trust information retrieval mechanism that allows for the quick retrieval of trust information for sensor nodes and cluster head nodes after trust information is lost, enabling rapid recovery of the trust system. Previous models did not consider the issue of trust information loss.
Finally, for ATAW-TM, local trust computation yields a per-node time complexity of O d . Cluster head aggregation incurs O n c d operations for a cluster of size n c . The communication overhead is O d bytes per reporting interval due to 1-byte trust compression. ETMRM and HTM exhibit similar per-node computational costs. Compared to ETMRM and HTM, ATAW-TM introduces two additional steps, namely Gaussian collaboration and entropy weighting, while still preserving linear time complexity. Moreover, the constant factor related to exponential operations can be reduced using lookup table methods.

5.2. Limitations and Directions for Further Research

While the theoretical analysis of the ATAW-TM trust model provides insights into its practical application for evaluating node trustworthiness in SDWSNs, a major limitation of this work is that the ATAW-TM has not yet been implemented or evaluated experimentally. This limitation will be addressed in our future work, including the implementation and evaluate of ATAW-TM in real-world scenarios and conducting an in-depth analysis of its performance. The first step is to develop a prototype using the SDN-WISE platform and the Contiki operating system within the Cooja simulation environment. The second step will involve simulating various (14) attack scenarios to test the effectiveness of the proposed trust model. Following this, we will evaluate the model using performance metrics such as detection accuracy, false positive/negative rates, trust convergence speed, communication overhead, and energy efficiency. A rigorous analysis will be conducted through quantitative simulation experiments.
Furthermore, we will explore the integration of the ATAW-TM trust model with SDWSN routing protocols to improve their efficiency and expedite the network’s response to DoS attacks, ensuring stable operations even during malicious disruptions.
Additionally, future work will explore controller redundancy and failover strategies to complement ATAW-TM’s trust retrieval mechanism.
Although Gaussian modelling was selected based on prior studies demonstrating its suitability for large-scale WSN traffic patterns, many WSN applications generate bursty or event-driven traffic that may follow Poisson or heavy-tailed distributions [47,48,49]. Our future work will investigate these alternative distributions to enhance adaptability in diverse environments. We also acknowledge that Gaussian modelling may introduce false positives under highly bursty workloads, where mean–standard-deviation-based outlier detection can misclassify legitimate traffic spikes as malicious. To mitigate this risk, non-parametric outlier detection techniques will be explored in future work to relax the normality assumption and better accommodate heavy-tailed or event-driven traffic patterns.
In addition, integrating adaptive trust update strategies that adjust decay rates or penalty weights based on the detected anomaly type represents a valuable direction for future work. Such adaptive mechanisms could incorporate behaviour signatures or temporal characteristics to further improve detection accuracy and reduce false positives.

Author Contributions

Conceptualization, L.W., M.L.Y. and K.P.; methodology, L.W., M.L.Y. and K.P.; validation, M.L.Y.; formal analysis, L.W.; investigation, L.W.; resources, M.L.Y.; data curation, L.W.; writing—original draft preparation, L.W., M.L.Y. and K.P.; writing—review and editing, L.W., M.L.Y. and K.P.; visualization, L.W.; supervision, M.L.Y. and K.P.; project administration, M.L.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data supporting the conclusions of this article are available in the text.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks: A survey. Comput. Netw. 2002, 38, 393–422. [Google Scholar] [CrossRef]
  2. Bono, F.M.; Polinelli, A.; Radicioni, L.; Benedetti, L.; Castelli-Dezza, F.; Cinquemani, S.; Belloli, M. Wireless Accelerometer Architecture for Bridge SHM: From Sensor Design to System Deployment. Future Internet 2025, 17, 29. [Google Scholar] [CrossRef]
  3. Yick, J.; Mukherjee, B.; Ghosal, D. Wireless sensor network survey. Comput. Netw. 2008, 52, 2292–2330. [Google Scholar] [CrossRef]
  4. Gungor, V.C.; Hancke, G.P. Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches. IEEE Trans. Ind. Electron. 2009, 56, 4258–4265. [Google Scholar] [CrossRef]
  5. Miyazaki, T.; Yamaguchi, S.; Kobayashi, K.; Kitamichi, J.; Song, G.; Tsukahara, T.; Hayashi, T. A software defined wireless sensor network. In Proceedings of the 2014 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 3–6 February 2014; pp. 847–852. [Google Scholar]
  6. Kobo, H.I.; Abu-Mahfouz, A.M.; Hancke, G.P. A Survey on Software-Defined Wireless Sensor Networks: Challenges and Design Requirements. IEEE Access 2017, 5, 1872–1899. [Google Scholar] [CrossRef]
  7. Bukar, U.A.; Othman, M. Architectural Design, Improvement, and Challenges of Distributed Software-Defined Wireless Sensor Networks. Wirel. Pers. Commun. 2022, 122, 2395–2439. [Google Scholar] [CrossRef]
  8. Galluccio, L.; Milardo, S.; Morabito, G.; Palazzo, S. SDN-WISE: Design, prototyping and experimentation of a stateful SDN solution for WIreless SEnsor networks. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 2015; pp. 513–521. [Google Scholar]
  9. Al-Hamid, D.Z.; Karegar, P.A.; Chong, P.H.J. A novel SDWSN-based testbed for IoT smart applications. Future Internet 2023, 15, 291. [Google Scholar] [CrossRef]
  10. Wang, R.; Zhang, Z.; Zhang, Z.; Jia, Z. ETMRM: An Energy-efficient Trust Management and Routing Mechanism for SDWSNs. Comput. Netw. 2018, 139, 119–135. [Google Scholar] [CrossRef]
  11. Ganeriwal, S.; Balzano, L.K.; Srivastava, M.B. Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw. 2008, 4, 1–37. [Google Scholar] [CrossRef]
  12. Bin-Yahya, M.; Alhussein, O.; Shen, X. Securing Software-Defined WSNs Communication via Trust Management. IEEE Internet Things J. 2022, 9, 22230–22245. [Google Scholar] [CrossRef]
  13. Isong, B.; Manuel, M.; Dladlu, N.; Abu-Mahfouz, A. Trust Management Framework for Securing Software-Defined Wireless Sensor Networks. In Proceedings of the 2023 International Conference on Electrical, Computer and Energy Technologies (ICECET), Cape Town, South Africa, 16–17 November 2023; pp. 1–6. [Google Scholar]
  14. Wang, L.; Petrova, K.; Yang, M.L. Trust Models in Wireless Sensor Networks for Defending Against Denial-of-Service Attacks: A Literature Review. Appl. Sci. 2025, 15, 3075. [Google Scholar] [CrossRef]
  15. Alhandi, S.A.; Kamaludin, H.; Alduais, N.A.M. Trust Evaluation Model in IoT Environment: A Comprehensive Survey. IEEE Access 2023, 11, 11165–11182. [Google Scholar] [CrossRef]
  16. Tyagi, H.; Kumar, R.; Pandey, S.K. A detailed study on trust management techniques for security and privacy in IoT: Challenges, trends, and research directions. High-Confid. Comput. 2023, 3, 100127. [Google Scholar] [CrossRef]
  17. Usman, M.; Asghar, M.R.; Ansari, I.S.; Granelli, F.; Qaraqe, M. Trust-Based DoS Mitigation Technique for Medical Implants in Wireless Body Area Networks. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
  18. Ahmed, A.; Qureshi, K.N.; Anwar, M.; Masud, F.; Imtiaz, J.; Jeon, G. Link-based penalized trust management scheme for preemptive measures to secure the edge-based internet of things networks. Wirel. Netw. 2024, 30, 4237–4259. [Google Scholar] [CrossRef]
  19. Wu, X.; Huang, J.; Ling, J.; Shu, L. BLTM: Beta and LQI Based Trust Model for Wireless Sensor Networks. IEEE Access 2019, 7, 43679–43690. [Google Scholar] [CrossRef]
  20. Zhang, M.; Feng, R.; Zhang, H.; Su, Y. A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks. Future Gener. Comput. Syst. 2023, 145, 466–477. [Google Scholar] [CrossRef]
  21. Almutairi, A.; Carpent, X.; Furnell, S. Towards a Mobility-Aware Trust Model for the Internet of Underwater Things. In Proceedings of the ICT Systems Security and Privacy Protection, Edinburgh, UK, 26 July 2024; pp. 1–15. [Google Scholar]
  22. Anwar, R.W.; Zainal, A.; Outay, F.; Yasar, A.; Iqbal, S. BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks. Future Gener. Comput. Syst. 2019, 96, 605–616. [Google Scholar] [CrossRef]
  23. Jinhui, X.; Yang, T.; Feiyue, Y.; Leina, P.; Juan, X.; Yao, H. Intrusion Detection System for Hybrid DoS Attacks using Energy Trust in Wireless Sensor Networks. Procedia Comput. Sci. 2018, 131, 1188–1195. [Google Scholar] [CrossRef]
  24. Isaac Sajan, R.; Jasper, J. A secure routing scheme to mitigate attack in wireless adhoc sensor network. Comput. Secur. 2021, 103, 102197. [Google Scholar] [CrossRef]
  25. Rahamathullah, U.; Karthikeyan, E. A lightweight trust-based system to ensure security on the Internet of Battlefield Things (IoBT) environment. Int. J. Syst. Assur. Eng. Manag. 2021. [Google Scholar] [CrossRef]
  26. Anand, C.; Vasuki, N. Trust Based DoS Attack Detection in Wireless Sensor Networks for Reliable Data Transmission. Wirel. Pers. Commun. 2021, 121, 2911–2926. [Google Scholar] [CrossRef]
  27. Cao, Z.; Zhou, X.; Xu, M.; Chen, Z.; Hu, J.; Tang, L. Enhancing Base Station Security Against DoS Attacks in Wireless Sensor Networks. In Proceedings of the 2006 International Conference on Wireless Communications, Networking and Mobile Computing, Wuhan, China, 22–24 September 2006; pp. 1–4. [Google Scholar]
  28. Cho, Y.; Qu, G. Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs. Int. J. Distrib. Sens. Netw. 2013, 9, 205920. [Google Scholar] [CrossRef]
  29. Gautam, A.K.; Kumar, R. A Robust Trust Model for Wireless Sensor Networks. In Proceedings of the 2018 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), Gorakhpur, India, 2–4 November 2018; pp. 1–5. [Google Scholar]
  30. Han, G.; Shen, W.; Duong, T.Q.; Guizani, M.; Hara, T. A proposed security scheme against Denial of Service attacks in cluster-based wireless sensor networks. Secur. Commun. Netw. 2014, 7, 2542–2554. [Google Scholar] [CrossRef]
  31. Lyu, C.; Zhang, X.; Liu, Z.; Chi, C.H. Selective Authentication Based Geographic Opportunistic Routing in Wireless Sensor Networks for Internet of Things Against DoS Attacks. IEEE Access 2019, 7, 31068–31082. [Google Scholar] [CrossRef]
  32. Qureshi, K.N.; Iftikhar, A.; Bhatti, S.N.; Piccialli, F.; Giampaolo, F.; Jeon, G. Trust management and evaluation for edge intelligence in the Internet of Things. Eng. Appl. Artif. Intell. 2020, 94, 103756. [Google Scholar] [CrossRef]
  33. Bin-Yahya, M.; Shen, X. HTM: Hierarchical Trust Management for Software-Defined WSNs. In Proceedings of the 2019 IEEE Globecom Workshops (GC Wkshps), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
  34. Anadiotis, A.-C.; Galluccio, L.; Milardo, S.; Morabito, G.; Palazzo, S. SD-WISE: A Software-Defined WIreless SEnsor network. Comput. Netw. 2019, 159, 84–95. [Google Scholar] [CrossRef]
  35. Mitchell, R.; Chen, I.-R. A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 2014, 46, 1–29. [Google Scholar] [CrossRef]
  36. Alaba, F.A.; Othman, M.; Hashem, I.A.T.; Alotaibi, F. Internet of Things security: A survey. J. Netw. Comput. Appl. 2017, 88, 10–28. [Google Scholar] [CrossRef]
  37. Niu, R.; Varshney, P.K.; Cheng, Q. Distributed detection in a large wireless sensor network. Inf. Fusion 2006, 7, 380–394. [Google Scholar] [CrossRef]
  38. Azad, A.K.M.; Kamruzzaman, J. Energy-Balanced Transmission Policies for Wireless Sensor Networks. IEEE Trans. Mob. Comput. 2011, 10, 927–940. [Google Scholar] [CrossRef]
  39. Rabbat, M.; Nowak, R. Distributed optimization in sensor networks. In Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, CA, USA, 26–27 April 2004; pp. 20–27. [Google Scholar]
  40. Sharafaldin, I.; Lashkari, A.H.; Ghorbani, A.A. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 2018, 1, 108–116. [Google Scholar]
  41. Han, Y.; Wang, H.; Li, Y.; Zhang, L. Trust-aware and improved density peaks clustering algorithm for fast and secure models in wireless sensor networks. Pervasive Mob. Comput. 2024, 105, 101993. [Google Scholar] [CrossRef]
  42. Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef]
  43. Ye, J.; Jiang, W. Routing Protocol for Underwater Wireless Sensor Networks Based on a Trust Model and Void-Avoided Algorithm. Sensors 2024, 23, 7614. [Google Scholar] [CrossRef] [PubMed]
  44. Hastie, T.; Tibshirani, R.; Friedman, J. The elements of statistical learning; Springer: New York, NY, USA, 2009; pp. 79–127. [Google Scholar]
  45. Yang, M.L.; Al-Anbuky, A.; Liu, W. An Authenticated Key Agreement Scheme for Wireless Sensor Networks. J. Sens. Actuator Netw. 2014, 3, 181–206. [Google Scholar] [CrossRef]
  46. Fu, H.; Sun, M.; He, B.; Li, J.; Zhu, X. A survey of traffic shaping technology in internet of things. IEEE Access 2022, 11, 3794–3809. [Google Scholar] [CrossRef]
  47. Alizai, M.H.; Landsiedel, O.; Link, J.A.B.; Götz, S.; Wehrle, K. Bursty traffic over bursty links. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, Berkeley, CA, USA, 4–6 November 2009; pp. 71–84. [Google Scholar]
  48. Siam, M.A.Y.; Hasan, F.; Sharmin, S.; Saha, S. An Efficient Burst Traffic-Aware Clustering and Mobility Management model for mobile-sink based Heterogeneous Wireless Sensor Networks. In Proceedings of the 11th International Conference on Networking, Systems, and Security, Khulna, Bangladesh, 19–21 December 2024; pp. 96–103. [Google Scholar]
  49. Chiasserini, C.-F.; Garetto, M. Modeling the performance of wireless sensor networks. In Proceedings of the IEEE INFOCOM 2004, Hong Kong, China, 7–11 March 2004. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.