Have a personal or library account? Click to login
A Novel Scalable Trust-Aware Deep Reinforcement Learning Algorithm for Energy-Efficient and Secure Routing in Software-Defined Wireless Sensor Networks for IoT Cover

A Novel Scalable Trust-Aware Deep Reinforcement Learning Algorithm for Energy-Efficient and Secure Routing in Software-Defined Wireless Sensor Networks for IoT

Open Access
|Dec 2025

References

  1. Narwaria, A., Mazumdar, A. P. (2023). Software-defined wireless sensor network: A comprehensive survey. Journal of Network and Computer Applications, 215, 103755. https://doi.org/10.1016/j.jnca.2023.103636
  2. Muthu, T., Kalimuthu, V. K. (2023). Seagull optimization-based feature selection with optimal extreme learning machine for intrusion detection in fog assisted WSN. Technical Gazette, 30 (5), 1547–1553. https://doi.org/10.17559/TV-20230130000295
  3. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17 (4), 2347–2376. https://doi.org/10.1109/COMST.2015.2444095
  4. Ammar, M., Russello, G., Crispo, B. (2018). Internet of things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, 8–27. https://doi.org/10.1016/j.jisa.2017.11.002
  5. Seyyedabbasi, A., Kiani, F., Allahviranloo, T., Fernandez-Gamiz, U., Noeiaghdam, S. (2023). Optimal data transmission and pathfinding for WSN and decentralized IoT systems using I-GWO and Ex-GWO algorithms. Alexandria Engineering Journal, 63, 339–357. https://doi.org/10.1016/j.aej.2022.08.009
  6. Oladipupo, E. T., Abikoye, O. C., Imoize, A. L., Awotunde, J. B., Chang, T.-Y., Lee, C.-C., Do, D.-T. (2023). An efficient authenticated elliptic curve cryptography scheme for multicore wireless sensor networks. IEEE Access, 11, 1306–1323. https://doi.org/10.1109/ACCESS.2022.3233632
  7. Ramachandran, S., Prabakaran, D. (2024). A novel deep reinforcement learning (DRL) method for detecting evasion attack in IoT environment. In 2024 International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE. https://doi.org/10.1109/ICICACS60521.2024.10498632
  8. Singh, J., Deepika, J., Zaheeruddin, Bhat, J. S., Kumararaja, V., Vikram, R., Amalraj, J. J., Saravanan, V., Sakthivel, S. (2022). Energy-efficient clustering and routing algorithm using hybrid fuzzy with grey wolf optimization in wireless sensor networks. Security and Communication Networks. https://doi.org/10.1155/2022/9846601
  9. Haseeb, K., Almustafa, K. M., Jan, Z., Saba, T., Tariq, U. (2020). Secure and energy-aware heuristic routing protocol for WSN. IEEE Access, 8, 163962–163974. https://doi.org/10.1109/ACCESS.2020.3022285
  10. Haseeb, K., Islam, N., Almogren, A., Ud Din, I., Almajed, H. N., Guizani, N. (2019). Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs. IEEE Access, 7, 79980–79988. https://doi.org/10.1109/ACCESS.2019.2922971
  11. Navaneethan, S., Arun, A. (2025). A comprehensive integrated security model with advanced access control for enhancing WSN computing in IoT frameworks. Technical Gazette, 32 (3), 1040–1046. https://doi.org/10.17559/TV-20240822001935
  12. Alotibi, M. (2021). Improved blowfish algorithm-based secure routing technique in IoT-based WSN. IEEE Access, 9, 159187–159197. https://doi.org/10.1109/ACCESS.2021.3130005
  13. Conti, M., Kaliyar, P., Rabbani, M. M., Ranise, S. (2020). Attestation-enabled secure and scalable routing protocol for IoT networks. Ad Hoc Networks, 98, 102054. https://doi.org/10.1016/j.adhoc.2019.102054
  14. Mishra, M., Sen Gupta, G., Gui, X. (2021). Network lifetime improvement through energy-efficient hybrid routing protocol for IoT applications. Sensors, 21 (22), 7439. https://doi.org/10.3390/s21227439
  15. Maheshwari, P., Sharma, A. K., Verma, K. (2021). Energy efficient cluster based routing protocol for WSN using butterfly optimization algorithm and ant colony optimization. Ad Hoc Networks, 110, 102317. https://doi.org/10.1016/j.adhoc.2020.102317
  16. Ramteke, R., Singh, S., Malik, A. (2022). Optimized routing technique for IoT enabled software-defined heterogeneous WSNs using genetic mutation based PSO. Computer Standards & Interfaces, 79, 103548. https://doi.org/10.1016/j.csi.2021.103548
  17. Balakrishnan, S., Vinoth Kumar, K. (2023). Hybrid sine-cosine Black Widow Spider optimization based route selection protocol for multihop communication in IoT assisted WSN. Technical Gazette, 30 (4), 1159–1165. https://doi.org/10.17559/TV-20230201000306
  18. Sharmin, S., Ahmedy, I., Noor, R. M. (2023). An energy-efficient data aggregation clustering algorithm for wireless sensor networks using hybrid PSO. Energies, 16 (5), 2487. https://doi.org/10.3390/en16052487
  19. Pandian, I., Thirugnasambantham, S., Balasubramaniam, K., Ravichandran, K. (2025). Improving IoT network longevity with attack repellent energy (SARE) algorithm for energy-efficient and secure routing. Technical Gazette, 32 (3), 876–882. https://doi.org/10.17559/TV-20240823001937
  20. Liu, Y., Wu, Q., Zhao, T., Tie, Y., Bai, F., Jin, M. (2019). An improved energy-efficient routing protocol for wireless sensor networks. Sensors, 19 (20), 4579. https://doi.org/10.3390/s19204579
  21. Al-Shareeda, M. A., Gaber, T., Alqarni, M. A., Alkinani, M. H., Almazroey, A. A., Almazroi, A. A. (2025). Chebyshev polynomial-based emergency conditions with authentication scheme for 5G-assisted vehicular fog computing. IEEE Transactions on Dependable and Secure Computing, 22 (5), 4795–4812. https://doi.org/10.1109/TDSC.2025.3553868
  22. Al-Shareeda, M. A., Anbar, M., Manickam, S., Khalil, A., Hasbullah, I. H. (2021). Security and privacy schemes in vehicular ad-hoc network with identity-based cryptography approach: A survey. IEEE Access, 9, 121522–121531. https://doi.org/10.1109/ACCESS.2021.3109264
  23. Shareeda, M. A., Anbar, M., Alazzawi, M. A., Manickam, S., Hasbullah, I. H. (2021). Security schemes based on conditional privacy-preserving vehicular ad hoc networks. Indonesian Journal of Electrical Engineering and Computer Science, 21 (1), 479–488. https://doi.org/10.11591/ijeecs.v21.i1.pp479-488
  24. Almazroi, A. A., Aldhahri, E. A., Al-Shareeda, M. A., Manickam, S. (2023). ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing. PLOS One, 18 (6), e0287291. https://doi.org/10.1371/journal.pone.0287291
  25. Al-Shareeda, M. A., Manickam, S., Mohammed, B. A., Al-Mekhlafi, Z. G., Qtaish, A., Alzahrani, A. J., Alshammari, G., Sallam, A. A., Almekhlafi, K. (2022). CM-CPPA: Chaotic map-based conditional privacy-preserving authentication scheme in 5G-enabled vehicular networks. Sensors, 22 (13), 5026. https://doi.org/10.3390/s22135026
  26. Abbood, A. A., Al-Shammri, F. K., Alzamili, Z. M., Al-Shareeda, M. A., Almaiah, M. A., AlAli, R. (2025). Investigating quantum-resilient security mechanisms for flying ad-hoc networks (FANETs). Journal of Robotics and Control, 6 (1), 456–469. https://doi.org/10.18196/jrc.v6i1.20559
Language: English
Page range: 358 - 365
Submitted on: Sep 21, 2024
|
Accepted on: Oct 13, 2025
|
Published on: Dec 23, 2025
In partnership with: Paradigm Publishing Services
Publication frequency: Volume open

© 2025 Jasmine Alponse, C Yaashuwanth, K Prathibanandhi, published by Slovak Academy of Sciences, Institute of Measurement Science
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.