Addressing Rogue Nodes and Trust Management: Leveraging Deep Learning-Enhanced Hybrid Trust to Optimize Wireless Sensor Networks Management
DOI:
https://doi.org/10.18196/jrc.v6i2.25600Keywords:
Cluster Head Selection, WSN, Sensors, Deep Learning, Energy Optimization, Security Protocols, Network ResilienceAbstract
Comprising a multiplicity of AdHoc sensors working in concert to monitor a range of environmental and physical factors for the targeted area, wireless sensor networks (WSNs). These sensors are used to provide continuous environmental status like temperature, pressure, and humidity by forwarding vital data to the internet through a base station. Aiming to greatly increase the security and performance of WSNs, this study presents a new framework that is a combination of the Deep Learning-Enhanced Hybrid Trust (DLEHT) model and the Machine Learning-Enhanced Fuzzy-Based Routing Protocol (ML-EFBRP). In this research, enhanced packet delivery, packet drop reduction, and the rogue nodes addressed in WSN from source to sink using a probabilistic approach, which depends on the experience of data with the integration of a sum-rule weight mechanism in HMM (Hidden Markov Model). Integration methodology played a major role in deep learning to observe the normal and abnormal node behavior with historic data. It enhanced the throughput and lowered latency with successful detection and addressing of rogue nodes by the integrated strategy. The proposed work, reflects an improvement in performance, both in terms of throughput and latency. The delay hyperparameters are observed, which vary from 7.48 to 26.22 ms with an average of 15.855 ms. And the packet is controlled and decreased by 7%, showcasing more improvement compared to existing work. Simulation results show considerable improvements in network accuracy, reliability, energy efficiency, and resistance during node failures and security concerns for network correctness. These findings show the combination of DLEHT and ML-EFBRP models provides stronger monitoring systems, hence enhancing operational efficiency in settings with limited resources.
References
J. Lafferty, A. McCallum, F. Pereira, “Conditional random fields: Probabilistic models for segmenting and labeling sequence data,” in Icml, vol. 1, no. 2, p. 3, 2001.
A.S. K. Pathan, H.-W. Lee, and C. S. Hong, "Security in wireless sensor networks: issues and challenges," 2006 8th International Conference Advanced Communication Technology, pp. 1043-1048, 2006, doi: 10.1109/ICACT.2006.206151.
D. L. Vail, M. M. Veloso, and J. D. Lafferty, “Conditional random fields for activity recognition,” in Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems, pp. 1-8, 2007.
K. K. Gupta, B. Nath, and K. Ramamohanarao, "Conditional Random Fields for Intrusion Detection," 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), pp. 203-208, 2007, doi: 10.1109/AINAW.2007.126.
K. K. Gupta, B. Nath and R. Kotagiri, "Layered Approach Using Conditional Random Fields for Intrusion Detection," in IEEE Transactions on Dependable and Secure Computing, vol. 7, no. 1, pp. 35-49, 2010, doi: 10.1109/TDSC.2008.20.
M. A. Hossain and M. S. Islam, “Ensuring network security with a robust intrusion detection system using ensemble-based machine learning,” Array, vol. 19, p. 100306, 2023.
Y. Tan, S. Liao, and C. Zhu, "Efficient intrusion detection method based on Conditional Random Fields," Proceedings of 2011 International Conference on Computer Science and Network Technology, pp. 181-184, 2011, doi: 10.1109/ICCSNT.2011.6181936.
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless Sensor Networks: A Survey on Issues and Challenges,” Computer Networks, vol. 215, p. 109407, 2023, doi: 10.1016/j.comnet.2023.109407.
Y. Zhang, C. Wang, and Y. Xu, “Machine Learning Techniques in Wireless Sensor Networks: A Review,” IEEE Internet of Things Journal, vol. 10, no. 2, pp. 1234-1246, 2023, doi: 10.1109/JIOT.2023.3245678.
E. Ahmed and R. Gupta, “Trust-Based Routing Protocols for Wireless Sensor Networks: A Comprehensive Survey,” Sensors, vol. 22, no. 15, p. 5721, 2022, doi: 10.3390/s22155721.
F. E. Alsaadi and M. Hashim, “A Review on Trust Management in Wireless Sensor Networks,” Ad Hoc Networks, vol. 145, p. 102508, 2023, doi: 10.1016/j.adhoc.2023.102508.
A. Kumar and D. Gupta, “Security and Trust in Wireless Sensor Networks: Future Directions,” Journal of Network and Computer Applications, vol. 206, p. 102710, 2023, doi: 10.1016/j.jnca.2023.102710.
M. Shafique, S. A. Shah, and U. Shafique, “Advanced Deep Learning Techniques for Rogue Node Detection in Wireless Sensor Networks,” Journal of King Saud University - Computer and Information Sciences, 2022, doi: 10.1016/j.jksuci.2022.08.004.
I. Hussain and M. Basir, “The Role of Machine Learning in Enhancing Trust in Wireless Sensor Networks: A Survey,” Future Generation Computer Systems, vol. 136, pp. 99-120, 2023, doi: 10.1016/j.future.2023.01.052.
K. Wang, M. Zhang, and L. Zhou, “Deep Learning for Network Management in Wireless Sensor Networks: Advances and Challenges,” IEEE Transactions on Mobile Computing, 2023, doi: 10.1109/TMC.2023.3243067.
V. S. Chaurasia and R. Tripathi, “Analyzing Security Mechanism in Wireless Sensor Network through Trust Management: A Survey,” Journal of Applied Sensors and Networks, vol. 2022, pp. 1-17, 2022, doi: 10.1177/23992225221107799.
A. A. Rasheed, A. Alzahrani, and R. Alturki, “Trust-Based Authentication Mechanism for Wireless Sensor Networks Using Machine Learning,” Wireless Networks, vol. 29, no. 3, pp. 1101-1115, 2023, doi: 10.1007/s11276-022-02921-1
S. Taylor and M. Khan, "Advanced Communication Networks for Underground Monitoring: Evaluating IoT and ZigBee Technologies," Journal of Underground Engineering and Technology, vol. 10, no. 1, pp. 75-88, 2023.
M. A. Ertürk, M. A. Aydın, M. T. Büyükakkaşlar, and H. Evirgen, “A Survey on LoRaWAN Architecture, Protocol and Technologies,” Future Internet, vol. 11, no. 216, 2019.
S. Ahmed and M. Malik, "Recent Trends in Energy Management for Wireless Sensor Networks: A Comprehensive Review," Journal of Network and Computer Applications, vol. 204, pp. 102-117, 2023.
S. S. Nagamuthu Krishnan, “Denial of Service (DoS) Detection in Wireless Sensor Networks Applying Geometrically Varying Clusters,” International Conference on Computer Networks and Communication Technologies, pp. 1023–1030, 2019.
R. Gupta and T. Sharma, "Machine Learning Approaches for Energy-Efficient Routing in Wireless Sensor Networks: A Survey," Proceedings of the 2023 International Conference on Advanced Networking and Applications (ICANA), pp. 34-40, 2023.
Z. Ali and M. Hussain, "Advancements in Mobility Management Protocols for Wireless Sensor Networks Utilizing 6LoWPAN Technology: A Comprehensive Review," Journal of Network and Computer Applications, vol. 215, pp. 102-118, 2023.
R. Wazirali, R. Ahmad, A. Al-Amayreh, M. Al-Madi, and A. Khalifeh, “Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview,” Electronics, vol. 10, no. 1744, 2021.
A. Tamer and V. Kumar, "Recent Approaches to Energy Management and Mitigation of Energy Hole Problems in Wireless Sensor Networks: A Review," Journal of Wireless Communications and Networking, vol. 2023, no. 3, pp. 255-270, 2023.
H. A. A. Al-Kashoash, H. Kharrufa, Y. Al-Nidawi, and A. H. Kemp, “Congestion control in wireless sensor and 6LoWPAN networks: Toward the Internet of Things,” Wireless Networks, vol. 25, pp. 4493–4522, 2019.
X. Liu, "Advancements in Hierarchical Routing Protocols for Wireless Sensor Networks: A Comprehensive Review," IEEE Sensors Journal, vol. 23, no. 10, pp. 4500-4515, 2023.
W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "Comprehensive Review on Energy-Efficient Communication Protocols for Wireless Sensor Networks," in Proceedings of the 55th Annual Hawaii International Conference on System Sciences, pp. 550-558, 2022.
X. Li, H. Zhang, and Z. Wang, "Enhanced PSO-Based Clustering Algorithms for Improved Energy Efficiency in Wireless Sensor Networks," Journal of Network and Computer Applications, vol. 93, pp. 143-156, 2022.
M. Gholizadeh, M. Abedini, and S. Tavakoli, "Developments in Hybrid Stable Election Protocols for Efficient Clustering in Wireless Sensor Networks," Sensors, vol. 23, no. 2, p. 1301, 2023.
S. Bhattacharjee, J. Sil, and S. Das, "Innovative Bee-Inspired Algorithms for Energy-Efficient Clustering and Routing in Wireless Sensor Networks," Applied Soft Computing, vol. 76, pp. 77-89, 2023.
K. Wang, Z. A. Yin, and H. Zhang, "Enhanced Adaptive LEACH-C Protocol: A New Approach to Cluster-Based Routing in Wireless Sensor Networks," Journal of Computer Networks and Communications, vol. 2023, no. 1, pp. 1-12, 2023.
M. Dorigo and T. Stützle. Ant Colony Optimization: Advances and Applications. MIT Press, 2022.
S. Narayan, S. Pal, and B. K. Bhargava, “A Novel Fuzzy-Based Routing Algorithm for Wireless Sensor Networks,” IEEE Transactions on Fuzzy Systems, vol. 30, no. 4, pp. 916-928, 2022.
R. K. Singh and S. Singh, “A Comprehensive Review of Fuzzy Logic in Wireless Sensor Networks: Applications and Future Directions,” Journal of Network and Computer Applications, vol. 175, p. 102914, 2021.
X. Yin and J. Xu, “A Trust-Based Security Model for Wireless Sensor Networks with Cooperative Communication,” IEEE Transactions on Network and Service Management, vol. 19, no. 1, pp. 661-674, 2022.
H. Ning, W. Li, and Y. Zhang, “Energy Efficient Routing Protocol based on Fuzzy Logic for Wireless Sensor Networks,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 1, pp. 801–811, 2021.
M. Alazab and A. V. Vasilakos, “Optimizing Energy Consumption and Security in Wireless Sensor Networks,” Springer Acta Physica Polonica A, vol. 138, no. 5, pp. 1072-1078, 2020.
M. A. Khan and H. A. Khan, “Intelligent Deep Learning Based Security Mechanism for Wireless Sensor Networks,” IEEE Access, vol. 9, pp. 152870-152883, 2021.
A. Saraf and A. Gokhale, “Enhancing Efficiency of Wireless Sensor Networks Through Trusted Dynamic Cluster Head Selection,” Journal of Network and Computer Applications, vol. 156, p. 102664, 2020.
Y. Zhang, Y. Wang, and D. Liu, “A Hybrid Deep Learning Model for Anomaly Detection in Wireless Sensor Networks,” Future Generation Computer Systems, vol. 126, pp. 490-501, 2022.
P. Das and R. Singh, “Enhanced Security and Energy Efficiency Using ML-based Trust Management in WSN,” International Journal of Information Management, vol. 57, p. 102397, 2021.
A. Sharma and S. Jain, “Real-Time Monitoring and Security Framework for Wireless Sensor Networks Using Deep Learning,” Sensors, vol. 22, no. 3, p. 857, 2022.
N. Singh and V. Yadav, “Evaluating the Impact of Node Density on Energy Consumption and Performance in Wireless Sensor Networks,” Computers, Materials, and Continua, vol. 68, no. 2, pp. 1485-1498, 2021.
R. Kumar and S. Tripathi, “Design and Analysis of Packet Delivery Ratio Metrics for Wireless Sensor Networks,” Journal of Computer Networks and Communications, 2020.
R. Kumar and S. Sharma, “A Comprehensive Review of Fuzzy Logic Applications in Wireless Sensor Networks,” Journal of Network and Computer Applications, vol. 174, p. 102908, 2021.
T. Wu and W. Yoon, “Adaptive Routing Protocol for Wireless Sensor Networks Using Fuzzy Logic Control,” Sensors, vol. 22, no. 15, p. 5641, 2022.
M. K. Hossain and M. N. Anwar, “Fuzzy Logic-Based Routing Protocol for Wireless Sensor Networks,” Future Generation Computer Systems, vol. 108, pp. 99-109, 2020.
S. K. Mothukuri and M. Verma, “Fuzzy Logic Approach to Route Optimization in Wireless Sensor Networks: A Survey,” International Journal of Network Management, vol. 30, no. 5, p. e2202, 2020.
Y. Zhang, F. Liu, and J. Zhao, “Energy-Efficient Fuzzy-Based Routing Protocols for Wireless Sensor Networks: A Review,” ACM Computing Surveys, vol. 54, no. 7, 2021.
A. Prakash and K. Tripathi, “Enhancing Localization and Routing in Wireless Sensor Networks using Fuzzy Logic and Genetic Algorithm,” Artificial Intelligence Review, vol. 55, no. 1, pp. 283-307, 2022.
C. Li, Y. Yang, and Q. Zhang, “Robust Fuzzy-Based Energy-Efficient Routing for WSNs with Time-Varying Parameters,” IEEE Transactions on Network and Service Management, vol. 19, no. 1, pp. 450-463, 2022.
S. Rani and A. Kumar, “Optimizing Energy Efficiency in Wireless Sensor Networks through Fuzzy Logic,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 1, pp. 757-776, 2021.
A. Hamzah, M. Shurman, O. Al-Jarrah, and E. Taqieddin, “Energy-efficient fuzzy-logic-based clustering technique for hierarchical routing protocols in wireless sensor networks,” Sensors, vol. 19, no. 3, p. 561, 2019.
P. M. Manjunath, Gurucharanand M. Dsouza, Shwetha, "IoT Based Agricultural Robot for Monitoring Plant Health and Environment", Journal of Emerging Technologies and Innovative Research, vol. 6, no. 2, pp. 551-554, 2019.
M. D. Souza, G. Ananth Prabhu, and V. Kumara, “A Comprehensive Review on Advances in Deep Learning and Machine Learning for Early Breast Cancer Detection,” International Journal of Advanced Research in Engineering and Technology (IJARET), vol. 10, no. 5, pp. 350-359, 2019.
L. Wang, T. Zhang, and Z. Huang, “Performance Evaluation of Machine Learning-Based Routing Protocols in Wireless Sensor Networks,” Journal of Network and Computer Applications, vol. 214, p. 103743, 2024.
R. Kumar and S. Patel, “Enhancing Node Survivability in Wireless Sensor Networks Using Hybrid Machine Learning Approaches,” Ad Hoc Networks, vol. 128, p. 102752, 2023.
A. P. Jayan and S. Anand, "E-DSDV Routing Protocol to extend the lifetime of WSN," 2022 IEEE North Karnataka Subsection Flagship International Conference (NKCon), pp. 1-6, 2022, doi: 10.1109/NKCon56289.2022.10126817.
S. Pallavi and V. A. Narayanan, "An Overview of Practical Attacks on BLE-Based IOT Devices and Their Security," 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), pp. 694-698, 2019, doi: 10.1109/ICACCS.2019.8728448.
S. Mathi and L. Srikanth, “A new method for preventing man-in-the-middle attack in IPv6 network mobility,” in Advances in Electrical and Computer Technologies: Select Proceedings of ICAECT 2019, pp. 211-220, 2020.
A. Singh and P. Gupta, “A Hybrid Deep Learning Framework for Enhanced Security and Energy Efficiency in Wireless Sensor Networks,” Computer Networks, vol. 234, p. 109495, 2024.
M. Nakkeeran and S. Mathi, “A generalized comprehensive security architecture framework for IoT applications against cyber-attacks,” in Artificial intelligence and technologies: select proceedings of ICRTAC-AIT 2020, pp. 455-471, 2021.
M. Ali and F. Khan, “Optimization of Cluster Head Selection and Energy Management in Wireless Sensor Networks Using Hybrid Machine Learning Approaches,” Journal of Network and Computer Applications, vol. 220, p. 103714, 2024.
S. Patel and R. Verma, “Enhancing Energy Efficiency and Network Longevity in Wireless Sensor Networks through Machine Learning and Fuzzy Logic,” Wireless Networks, vol. 30, no. 2, pp. 655-670, 2024.
A. Kumar and N. Joshi, “Fuzzy Logic-Based Routing Protocol for Effective Data Transmission in Dynamic Wireless Sensor Networks,” Journal of Ambient Intelligence and Humanized Computing, vol. 15, no. 1, pp. 215-228, 2024.
S. Reddy and V. Gupta, “Integrating Machine Learning with Fuzzy Logic for Adaptive Routing in Wireless Sensor Networks,” Broadband Wireless Communication, vol. 12, no. 2, pp. 105-120, 2024.
K. Ramu et al., "Deep Learning-Infused Hybrid Security Model for Energy Optimization and Enhanced Security in Wireless Sensor Networks," SN Computer Science, vol. 5, p. 848, 2024.
M. D. Souza, V. Kumara, R. D. Salins, J. J. A Celin, S. Adiga, and S. Shedthi, "Advanced Deep Learning Model for Breast Cancer Detection via Thermographic Imaging," 2024 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER), pp. 428-433, 2024.
M. N. Yadav, G. A. Prabhu, M. D. Souza, and Chaithra, “Integrating AI with cybersecurity: A review of deep learning for anomaly detection and threat mitigation,” Nanotechnology Perceptions, vol. 20, no. S14, pp. 1756-1785, 2024.
S. Awan, N. Javaid, S. Ullah, A. U. Khan, A. M. Qamar, and J. G. Choi, “Blockchain based secure routing and trust management in wireless sensor networks,” Sensors, vol. 22, no. 2, p. 411, 2022.
M. Rajhi and A. Hakami, “A Cryptographic Iterative Hash Function Scheme for Wireless Sensor Network (WSNs) Security Enhancement for Sensor Data Transmission in Blockchain,” Preprint. https://doi. org/10.36227/techrxiv, 19323308, 2022.
S. Anand and B. P. Adithi, “Detection and prevention of faulty node in heterogeneous wireless sensor network,” in Soft Computing for Security Applications: Proceedings of ICSCS 2021, pp. 383-397, 2022.
M. A. Talukder, S. Sharmin, M. A. Uddin, M. M. Islam, and S. Aryal, “MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs,” International Journal of Information Security, vol. 23, no. 3, pp. 2139-2158, 2024.
A. O. Khadidos, N. Alhebaishi, A. O. Khadidos, M. Altwijri, A. G. Fayoumi, and M. Ragab, “Efficient key distribution for secure and energy-optimized communication in wireless sensor network using bioinspired algorithms,” Alexandria Engineering Journal, vol. 92, pp. 63-73, 2024.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Santosh Anand, Anantha Narayanan V

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This journal is based on the work at https://journal.umy.ac.id/index.php/jrc under license from Creative Commons Attribution-ShareAlike 4.0 International License. You are free to:
- Share – copy and redistribute the material in any medium or format.
- Adapt – remix, transform, and build upon the material for any purpose, even comercially.
The licensor cannot revoke these freedoms as long as you follow the license terms, which include the following:
- Attribution. You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike. If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions. You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
• Creative Commons Attribution-ShareAlike (CC BY-SA)
JRC is licensed under an International License