A Hybrid Probabilistic Trust Model for Dynamic Path Planning in Wireless Sensor Networks
Received: 13 February 2025 | Revised: 16 March 2025 and 25 March 2025 | Accepted: 28 March 2025 | Online: 4 June 2025
Corresponding author: Seshagiri Rao Ganta
Abstract
Wireless Sensor Networks (WSNs) are vital for real-time applications, but their effectiveness hinges on node reliability, secure connections, and overall trustworthiness. Crucially, data privacy, secure path planning, and data integrity are paramount for efficient and reliable WSN operation. Traditional path planning often neglects integrity and trust, limiting privacy and robustness in large networks. To overcome these limitations, a novel hybrid model for dynamic WSNs has been developed. This model integrates trust-based node integrity verification with privacy preservation. It employs a hybrid link prediction method, a dynamic trust evaluation system, and a hybrid ant colony optimization approach for route construction. This combination addresses the challenges of dynamic network conditions and malicious actors. Experimental results showcase the superiority of this hybrid model over conventional techniques. The proposed approach demonstrably improves performance by minimizing route overhead, maximizing packet delivery ratio, reducing delay, and increasing throughput, ultimately leading to a more secure and efficient WSN.
Keywords:
dynamic sensor initialization, trust probability, node trustiness, path planningDownloads
References
M. B. Taha, C. Talhi, and H. Ould-Slimanec, "A Cluster of CP-ABE Microservices for WSN," Procedia Computer Science, vol. 155, pp. 441–448, Jan. 2019.
H. Shahwani, S. A. Shah, M. Ashraf, M. Akram, J. P. Jeong, and J. Shin, "A comprehensive survey on data dissemination in Vehicular Ad Hoc Networks," Vehicular Communications, vol. 34, Apr. 2022, Art. no. 100420.
F. Z. Bousbaa, N. Lagraa, C. A. Kerrache, F. Zhou, M. B. Yagoubi, and R. Hussain, "A distributed time-limited multicast algorithm for VANETs using incremental power strategy," Computer Networks, vol. 145, pp. 141–155, Nov. 2018.
K. Ozera, K. Bylykbashi, Y. Liu, and L. Barolli, "A fuzzy-based approach for cluster management in WSNs: Performance evaluation for two fuzzy-based systems," Internet of Things, vol. 3–4, pp. 120–133, Oct. 2018.
P. Shah and T. Kasbe, "A review on specification evaluation of broadcasting routing protocols in VANET," Computer Science Review, vol. 41, Aug. 2021, Art. no. 100418.
S. Kudva, S. Badsha, S. Sengupta, H. La, I. Khalil, and M. Atiquzzaman, "A scalable blockchain based trust management in VANET routing protocol," Journal of Parallel and Distributed Computing, vol. 152, pp. 144–156, Jun. 2021.
S. Sharma and A. Kaul, "A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud," Vehicular Communications, vol. 12, pp. 138–164, Apr. 2018.
M. Arif, G. Wang, M. Z. A. Bhuiyan, T. Wang, and J. Chen, "A survey on security attacks in VANETs: Communication, applications and challenges," Vehicular Communications, vol. 19, Oct. 2019, Art. no. 100179.
K. Deepa Thilak and A. Amuthan, "Cellular Automata-based Improved Ant Colony-based Optimization Algorithm for mitigating DDoS attacks in VANETs," Future Generation Computer Systems, vol. 82, pp. 304–314, May 2018.
B. Yu, C.-Z. Xu, and B. Xiao, "Detecting Sybil attacks in VANETs," Journal of Parallel and Distributed Computing, vol. 73, no. 6, pp. 746–756, Jun. 2013.
K. Bylykbashi, D. Elmazi, K. Matsuo, M. Ikeda, and L. Barolli, "Effect of security and trustworthiness for a fuzzy cluster management system in VANETs," Cognitive Systems Research, vol. 55, pp. 153–163, Jun. 2019.
A. Paranjothi, M. S. Khan, S. Zeadally, A. Pawar, and D. Hicks, "GSTR: Secure multi-hop message dissemination in connected vehicles using social trust model," Internet of Things, vol. 7, Sep. 2019, Art. no. 100071.
R. Riebl, M. Monz, S. Varga, L. Maglaras, H. Janicke, A. H. Al-Bayatti, and C. Facchi, "Improved Security Performance for VANET Simulations," IFAC-PapersOnLine, vol. 49, no. 30, pp. 233–238, Nov. 2016.
S. Zhang, M. Lagutkina, K. O. Akpinar, and M. Akpinar, "Improving performance and data transmission security in VANETs," Computer Communications, vol. 180, pp. 126–133, Dec. 2021.
A. Harbouche, D. Djabour, and A. Saiah, "Z-MSP: Zonal-Max Stable Protocol for Wireless Sensor Networks," Engineering, Technology & Applied Science Research, vol. 14, no. 6, pp. 18036–18041, Dec. 2024.
R. Hussain, F. Hussain, and S. Zeadally, "Integration of WSN and 5G Security: A review of design and implementation issues," Future Generation Computer Systems, vol. 101, pp. 843–864, Dec. 2019.
J. M. A. Jaleel, M. A. Khan, T. Mazhar, J. Khan, S. K. uz Zaman, U. F. Khattak, and S. Batool, "An energy-efficient hybrid LEACH protocol that enhances the lifetime of wireless sensor networks," Engineering, Technology & Applied Science Research, vol. 15, no. 1, pp. 19364–19369, Feb. 2025.
M. R. Maganti and K. R. Rao, "Optimising the EPMIPv6 protocol for the analysis of advanced sensor networks," Ingénierie des Systèmes d’Information, vol. 29, no. 2, pp. 543–549, Apr. 2024.
Downloads
How to Cite
License
Copyright (c) 2025 Seshagiri Rao Ganta, N. Naga Malleswara Rao

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.