Trust-Based Intelligent Routing Protocol with Q-Learning for Mission-Critical Wireless Sensor Networks
Abstract
:1. Introduction
1.1. Motivation
1.2. Contributions
- Design of an intelligent Q-learning based routing protocol by considering both trustworthiness and QoS (Quality of Service) requirements for MC-WSNs
- Design of a flexible threshold mechanism that contemplates link bandwidth and data usage to increase the probability of malicious node detection.
- Efficient energy management of resource-constrained sensor nodes by placing flexible weights according to the node’s status.
- Proposal of a trust evaluation method and intelligent routing protocol that meets the requirements of mission-critical applications.
2. Related Work
3. Proposed Scheme: MC-TIRP
3.1. Trusted Route Discovery Component
3.2. Trust Evaluation Component
3.2.1. Local Trust Evaluation
3.2.2. Global Trust Evaluation
3.2.3. Q-Learning Based Trust Evaluation
3.3. Trust Route Update and Maintenance Component
4. Performance Evaluation
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Gaur, A.; Singh, A.; Ashok, K.; Kulkarni, K.S.; Sayantani, L.; Kamal, K.; Vishal, S.; Anuj, K.; Subhas, C. Fire sensing technologies: A review. IEEE Sens. J. 2019, 19, 3191–3202. [Google Scholar] [CrossRef]
- Xu, F.; Ye, H.; Yang, F.; Zhao, C. Software defined mission critical wireless sensor networks: Architecture and edge offloading strategy. IEEE Access 2019, 7, 10383–10391. [Google Scholar] [CrossRef]
- Kumar, A.V.; Jeyapal, A. Self-adaptive trust based abr protocol for manets using q-learning. Sci. World J. 2014, 452362, 1–9. [Google Scholar]
- Kim, D.; Park, S. Reinforcement learning-based dynamic adaptation planning method for architecture-based self manage software, In Proceedings of the ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS ’09). Vancouver, BC, USA, 18–19 May 2009; pp. 76–85. [Google Scholar]
- Mistry, O.; Gursel, A.; Sen, S. Comparing trust mechanisms for monitoring aggregator nodes in sensor networks. In Proceedings of the 8th International Conference on Autonomous Agents and multiagent Systems 2, Budapest, Hungary, 10–15 May 2009; pp. 985–992. [Google Scholar]
- Asis, N.; Samir, R.D. On-Demand Multipath-Routing for Mobile Ad Hoc Networks. In Proceedings of the Eight International Conference on Computer Communications and Networks, Boston, MA, USA, 11–13 October 1999; pp. 64–70. [Google Scholar]
- Li, X.; Jia, Z.; Zhang, P.; Zhang, R.; Wang, H. Trust-based on demand multipath routing in mobile ad-hoc networks. IET Inf. Secur. 2010, 4, 212–232. [Google Scholar] [CrossRef] [Green Version]
- Marina, M.K.; Das, S.R. Ad-hoc on-demand multipath distance vector routing. Wirel. Commun. Mob. Comput. 2006, 6, 969–988. [Google Scholar] [CrossRef]
- Wang, B.; Chen, X.; Chang, W. A light-weight trust-based qos routing algorithm for ad-hoc networks. Pervasive Mob. Comput. 2014, 13, 164–180. [Google Scholar] [CrossRef]
- Tajeddine, A.; Kayssi, A.; Chehab, A.; Elhajj, I.; Itani, W. CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks. Sensors 2015, 15, 3299–3333. [Google Scholar] [CrossRef] [Green Version]
- Kalidoss, T.; Rajasekaran, L.; Kanagasabai, K.; Sannasi, S.; Kannan, A. QoS Aware Trust Based Routing Algorithm for Wireless Sensor Networks. Wirel. Pers. Commun. 2020, 110, 1637–1658. [Google Scholar] [CrossRef]
- Bangotra, D.K.; Singh, Y.; Selwal, A.; Kumar, N.; Singh, P.K. A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks. Wirel. Pers. Commun. 2021, 221–233. [Google Scholar] [CrossRef]
- Khalid, N.A.; Bai, Q.; Al-Anbuky, A. Adaptive trust-based routing protocol for large scale wsns. IEEE Access 2019, 7, 143539–143549. [Google Scholar] [CrossRef]
- Keum, D.; Lim, J.; Ko, Y.-B. Trust based multipath qos routing protocol for mission-critical data transmission in tactical adhoc networks. Sensors 2020, 20, 3330. [Google Scholar] [CrossRef] [PubMed]
- Draves, R.; Padhye, J.; Zill, B. Routing in multi-radio, multihop wireless mesh networks. In Proceedings of the MobiCom04, Philadelphia, PA, USA, 26 September–1 October 2004; pp. 114–128. [Google Scholar]
- Schulz, P.; Matthe, M.; Klessig, H.; Simsek, M.; Fettweis, G.J.; Ansari, S.; Ashraf, A.; Almeroth, B.; Voigt, J.; Riedel, I. Latency critical iot applications in 5 g: Perspective on the design of radio interface and network architecture. IEEE Commun. Mag. 2017, 55, 70–78. [Google Scholar] [CrossRef]
- Blohm, G.W. Army Uc Reference Architecture (ra), Version 1.0. cio/g-6 Reference Architecture Series. October 2013. Available online: https://docplayer.net/2665571-U-s-army-unifiedcapabilities-uc-reference-architecturera-version-1-0-11-october-2013.html (accessed on 16 October 2013).
- Teresa, M. Unified Capabilities Requirements 2013 (Ucr 2013); Department of Defense: Washington, DC, USA, 2013. [Google Scholar]
- Adnan, A.; Kamalrulnizam, A.B.; Muhammad, I.C.; Khalid, H.; Abdul, W.K. TERP: A Trust and Energy Aware Routing Protocol for Wireless Sensor Network. IEEE Sens. J. 2015, 15, 6962–6972. [Google Scholar]
- Duan, J.; Yang, D.; Zhu, H.; Zhao, J. Tsrf: A trustaware secure routing framework in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2014, 3, 1–14. [Google Scholar] [CrossRef] [Green Version]
- Govindan, K.; Mohapatra, P. Trust computations and trust dynamics in mobile ad hoc networks: A survey. IEEE Commun. Surv. Tutor. 2012, 14, 279–298. [Google Scholar] [CrossRef]
- Mitchell, T. Machine Learning; WCB/McGraw-Hill: New York, NY, USA, 1997. [Google Scholar]
- Maivizhi, R.; Yogesh, P. Q-learning based routing for in-network aggregation in wireless sensor networks. Wirel. Netw. 2021, 27, 2231–2250. [Google Scholar] [CrossRef]
- Chae, Y.; DiPippo, L.C.; Sun, Y.L. Trust management for defending on-off attacks. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 1178–1191. [Google Scholar] [CrossRef]
- Gurung, S.; Chauhan, S. A dynamic threshold based approach for mitigating black-hole attack in MANET. Wirel. Netw. 2018, 24, 2957–2971. [Google Scholar]
- Zheng, D.E.; Carter, W.A. Leveraging the Internet of Things for a More Efficient and Effective Military; Technology Report; Center for Strategic International Studies CSIS: Washington, DC, USA, 2015. [Google Scholar]
- Muralidharan, S.; Roy, A.; Saxena, N. Mdp-iot: Mdp based interest forwarding for heterogeneous traffic in iot-ndn environment. Future Gener. Comput. Syst. 2018, 79, 892–908. [Google Scholar] [CrossRef]
- Keum, D.; Kim, D.; Ko, Y.-B. Trust Guaranteed Multi-Path Routing Protocol by Considering Mission-Critical IoT Data. J. Korean Inst. Commun. Inf. Sci. 2018, 43, 995–1004. [Google Scholar] [CrossRef]
- Keum, D.; Lim, J.; Ko, Y.-B. A trusted low-latency multipath routing for mission-critical tactical data transfer. J. Korean Inst. Commun. Inf. Sci. 2020, 45, 391–399. [Google Scholar]
- Marwick, M.S.; Kramer, C.M.; Laprade, E.J. Analysis of Soldier Radio Waveform Performance in Operational Test; Technology Report; Institute for Defense Analyses: Alexandria, VA, USA, 2015. [Google Scholar]
Notation | Description |
---|---|
B | The bandwidth (raw data rate) of the link |
The initial energy of node i | |
EQTV | Energy-based QoS and Trust Value |
The residual energy of node i | |
ETT | Expected Transmission Time |
ETX | Expected Transmission Count |
The number forwarded by node j | |
MC-TIRP | Mission-Critical Trust based Intelligent Routing Protocol |
PFR | Packet Forwarding Ratio |
PTV | Path Trust Value |
The number of packets sent by node i to node j | |
Weight factor | |
X | The size of the packet |
Learning rate | |
Decay factor |
Parameters | Values |
---|---|
Simulator | OPNET 18.0 |
Simulation time(s) | 500 |
Routing | MC-TIRP, ATRP, TQR, AOTDV |
Number of nodes | 100 |
Percentage of malicious nodes | 0–40% |
Attack model | Gray hole attack, On-Off attack Denial of Service attack |
Traffic Type (Avg. Packet Size) | VoIP G. 723.1 (24 bytes) |
Fire alarm, Chat (100 bytes) | |
Health, Temperature, Humidity Sensors (120 bytes) | |
Security, Smart Meter (200 bytes) | |
Bulk Data, CCTV Camera (2000 bytes) | |
MAC | CSMA/CA |
PHY | 802.11b |
0.5 | |
0.9 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Keum, D.; Ko, Y.-B. Trust-Based Intelligent Routing Protocol with Q-Learning for Mission-Critical Wireless Sensor Networks. Sensors 2022, 22, 3975. https://doi.org/10.3390/s22113975
Keum D, Ko Y-B. Trust-Based Intelligent Routing Protocol with Q-Learning for Mission-Critical Wireless Sensor Networks. Sensors. 2022; 22(11):3975. https://doi.org/10.3390/s22113975
Chicago/Turabian StyleKeum, DooHo, and Young-Bae Ko. 2022. "Trust-Based Intelligent Routing Protocol with Q-Learning for Mission-Critical Wireless Sensor Networks" Sensors 22, no. 11: 3975. https://doi.org/10.3390/s22113975
APA StyleKeum, D., & Ko, Y. -B. (2022). Trust-Based Intelligent Routing Protocol with Q-Learning for Mission-Critical Wireless Sensor Networks. Sensors, 22(11), 3975. https://doi.org/10.3390/s22113975