Have a personal or library account? Click to login
Adaptive trust-based secure routing protocol with reinforced anomaly detection for IoT networks Cover

Adaptive trust-based secure routing protocol with reinforced anomaly detection for IoT networks

Open Access
|Jul 2025

Figures & Tables

Figure 1:

PDR analysis. ATBSRP, adaptive trust-based secure routing protocol; PDR, packet delivery ratio.
PDR analysis. ATBSRP, adaptive trust-based secure routing protocol; PDR, packet delivery ratio.

Figure 2:

Delay analysis. ATBSRP, adaptive trust-based secure routing protocol.
Delay analysis. ATBSRP, adaptive trust-based secure routing protocol.

Figure 3:

Throughput analysis. ATBSRP, adaptive trust-based secure routing protocol.
Throughput analysis. ATBSRP, adaptive trust-based secure routing protocol.

Figure 4:

Accuracy analysis. ATBSRP, adaptive trust-based secure routing protocol.
Accuracy analysis. ATBSRP, adaptive trust-based secure routing protocol.

ECC performance evaluation

Key size (bits)Encryption time (ms)Decryption time (ms)Key generation time (ms)
1601.21.13.4
1921.61.44.1
2242.11.85.0
2562.72.36.2

Comparison of end-to-end delay (ms) with increasing malicious nodes

No. of malicious nodesProposedMuzammal et al. (2022) [2]Bang and Rao (2022) [3]Singh et al. (2024) [4]Jiang and Liu (2022) [5]
018.722.523.021.822.1
1020.425.726.324.525.0
2022.130.428.726.927.3
3024.634.932.530.831.2
4028.238.736.134.435.0

Comparison of PDR with increasing malicious nodes

No. of malicious nodesProposedMuzammal et al. (2022) [2]Bang and Rao (2022) [3]Singh et al. (2024) [4]Jiang and Liu (2022) [5]
098.295.194.396.094.8
1095.690.888.992.389.7
2092.885.483.988.286.7
3089.781.678.283.580.9
4086.376.272.579.075.6

Comparison of throughput (kbps) with increasing malicious nodes

No. of malicious nodesATBSRP—proposedMuzammal et al. (2022) [2]Bang and Rao (2022) [3]Singh et al. (2024) [4]Jiang and Liu (2022) [5]
0540510500520505
10530480470495485
20512450438470460
30489420410440430
40460390375405395

Simulation parameters

ParameterValue
Simulation toolNS-3
Simulation area1,000 m × 1,000 m
Number of nodes100–500
Traffic typeCBR
Transmission range250 m
MAC protocolIEEE 802.15.4
Mobility modelRandom waypoint
Attack types simulatedBlackhole, Sybil, rank, wormhole
Trust evaluation methodDirect & indirect trust, trust decay mechanism
Cryptographic securityECC, one-time hash chains
Detection algorithmGMM, decision tree

Comparison of detection accuracy (%) with increasing malicious nodes

No. of malicious nodesProposedMuzammal et al. (2022) [2]Bang and Rao (2022) [3]Singh et al. (2024) [4]Jiang and Liu (2022) [5]
1098.392.490.194.591.3
2096.590.287.891.589.3
3094.286.783.988.185.6
4091.782.379.484.781.2

Comparative analysis

MetricATBSRP (proposed)Muzammal et al. (2022a) [2]Bang and Rao (2022) [3]Singh et al. (2024) [4]Jiang and Liu (2022) [5]
PDR (%)92.885.483.988.286.7
End-to-end delay (ms)22.130.428.726.927.3
Throughput (kbps)512450438470460
Routing overhead (%)12.318.219.615.817.4
Detection accuracy (%)96.590.287.891.589.3
Language: English
Submitted on: Jan 10, 2025
Published on: Jul 14, 2025
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2025 K. Sangeetha, K. Arulanandam, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.