A Trust Management-based Energy Efficient Message Scheduling Algorithm in the Internet of Things System

Authors

  • Shanza Ijaz Department of Computer Science and Information Technology, Islamia University of Bahawalpur, Punjab Author
  • Muhammad Talah Zubair Department of Computer Science, National College of Business Administration & Economics (NCBAE), Multan Author

Keywords:

Internet of Things, Wireless Sensor Network, Scheduling, Energy Efficient, Message Scheduling, Trust Management

Abstract

Internet of Things (IoT) is an emerging concept in internet development that connects diverse objects by transmitting information from there to a central hub for interpretation. Though much work has been done individually either on message scheduling or provisioning of a secure environment to assure data accuracy in IoT systems, this paper focuses on a Trust Management-Based Scheme to defend against internal attacks while parallel handling Message Scheduling to improve overall IoT system efficiency. Choosing, secure cluster heads based on residual energy and node density to balance the network load through a trust-value scheme and operating the message scheduler on cluster heads to decide the transmission of messages is a salient feature of the proposed system. Managing traffic intensity for scheduling messages in a secure environment made the proposed algorithm more reliable against malicious attacks and energy consumption. 

In this IoT environment, things/nodes are placed into subgroups with a trusted cluster head responsible for successful message delivery from the group to the receiver of the sensed data. The simulation results show the effectiveness and efficiency of the proposed algorithm.

REFERENCES

  • Abdullah, M. N. Asghar, M. Ashraf, and N. Abbas, "An energy-efficient message scheduling algorithm with joint routing mechanism at network layer in Internet of Things environment," Wireless Personal Communications, vol. 111, no. 3, pp. 1821–1835, 2020, doi: 10.1007/s11277-019-06959-x.
  • Abdullah and K. Yang, "An energy-efficient message scheduling algorithm in Internet of Things environment," in Proc. 2013 9th Int. Wireless Commun. Mobile Comput. Conf. (IWCMC), 2013, pp. 311–316, doi: 10.1109/IWCMC.2013.6583578.
  • O. Abu Salem and N. Shudifat, "Enhanced LEACH protocol for increasing a lifetime of WSNs," Personal and Ubiquitous Computing, vol. 23, no. 5-6, pp. 901–907, 2019, doi: 10.1007/s00779-019-01205-4.
  • Ali et al., "An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 16, no. 6, 2020, doi: 10.1177/1550147720925772.
  • Almobaideen, M. Qatawneh, and O. Abualghanam, "Virtual Node Schedule for Supporting QoS in Wireless Sensor Network," in Proc. IEEE Jordan Int. Joint Conf. Elect. Eng. Inf. Technol. (JEEIT), 2019, pp. 281–285, doi: 10.1109/JEEIT.2019.8717465.
  • Amjad et al., "Blockchain Based Authentication and Cluster Head Selection Using DDR-LEACH in Internet of Sensor Things," Sensors, vol. 22, no. 5, 2022, doi: 10.3390/s22051972.
  • B. D. and F. Al-Turjman, "A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks," Ad Hoc Networks, vol. 97, 2020, doi: 10.1016/j.adhoc.2019.102022.
  • Cheng, C. Xu, X. Liu, J. Li, and J. Zhang, "LEACH Protocol Optimization Based on Weighting Strategy and the Improved Ant Colony Algorithm," Frontiers in Neurorobotics, vol. 16, 2022, doi: 10.3389/fnbot.2022.840332.
  • Fang et al., "FETMS: Fast and Efficient Trust Management Scheme for Information-Centric Networking in Internet of Things," IEEE Access, vol. 7, pp. 13476–13485, 2019, doi: 10.1109/ACCESS.2019.2892712.
  • Fang, W. Zhang, W. Yang, Z. Li, W. Gao, and Y. Yang, "Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks," Digital Communications and Networks, vol. 7, no. 4, pp. 470–478, 2021, doi: 10.1016/j.dcan.2021.03.005.
  • Fotohi, S. Firoozi Bari, and M. Yusefi, "Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol," International Journal of Communication Systems, vol. 33, no. 4, pp. 1–25, 2020, doi: 10.1002/dac.4234.
  • Ganeriwal, L. K. Balzano, and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," ACM Transactions on Sensor Networks, vol. 4, no. 3, pp. 1–37, 2008, doi: 10.1145/1362542.1362546.
  • Shaheen, "The Internet of Things (IoT): A Comprehensive Review of Technologies, Applications, Challenges, and Future Trends," Journal of Engineering and Computational Intelligence Review, vol. 2, no. 1, pp. 1-8, 2024.
  • Gulen and S. Baktir, "Elliptic curve cryptography for wireless sensor networks using the number theoretic transform," Sensors, vol. 20, no. 5, 2020, doi: 10.3390/s20051507.
  • B. Gupta and M. Quamara, "An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols," Concurrency and Computation: Practice and Experience, vol. 32, no. 21, 2020, doi: 10.1002/cpe.4946.
  • K. Khan and A. Ullah, "Implication of IoT and its impact on library services: An overview," Inverge Journal of Social Sciences, vol. 3, no. 2, pp. 63-72, 2024.
  • B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "An application-specific protocol architecture for wireless microsensor networks," IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 660–670, 2002, doi: 10.1109/TWC.2002.804190.
  • Ji, L. Li, and W. Zhou, "Design and implementation of a RFID Reader/Router in RFID-WSN hybrid system," Future Internet, vol. 10, no. 11, 2018, doi: 10.3390/fi10110106.
  • Museera and H. Khan, "Internet of Things in Food Supply Chains: Enhancing Quality and Safety through Smart Technologies," Journal of Engineering and Computational Intelligence Review, vol. 1, no. 1, pp. 1-6, 2023.
  • Kanchana Devi and R. Ganesan, "Trust-based selfish node detection mechanism using beta distribution in wireless sensor network," Journal of ICT Research and Applications, vol. 13, no. 1, pp. 79–92, 2019, doi: 10.5614/itbj.ict.res.appl.2019.13.1.6.
  • A. Khalid, Q. Bai, and A. Al-Anbuky, "Adaptive Trust-Based Routing Protocol for Large Scale WSNs," IEEE Access, vol. 7, pp. 143539–143549, 2019, doi: 10.1109/ACCESS.2019.2944648.
  • K. Khan et al., "Hierarchical Routing Protocols for Wireless Sensor Networks: Functional and Performance Analysis," Journal of Sensors, vol. 2021, 2021, doi: 10.1155/2021/7459368.
  • N. Khan et al., "Improving energy efficiency with content-based adaptive and dynamic scheduling in wireless sensor networks," IEEE Access, vol. 8, pp. 176495–176520, 2020, doi: 10.1109/ACCESS.2020.3026939.
  • Natarajan and S. Subramanian, "A cross-layer design: energy efficient multilevel dynamic feedback scheduling in wireless sensor networks using deadline aware active time quantum for environmental monitoring," International Journal of Electronics, vol. 106, no. 1, pp. 87–108, 2019, doi: 10.1080/00207217.2018.1501615.
  • Asif, “The complexities of bioterrorism: Challenges and considerations,” International Journal of Contemporary Issues in Social Sciences, vol. 3, no. 3, pp. 2175–2184, 2024. [Online]. Available: https://ijciss.org/index.php/ijciss/article/view/1391
  • Aurangzeb, D., & Asif, M. (2021). Role of leadership in digital transformation: A case of Pakistani SMEs. In Fourth International Conference on Emerging Trends in Engineering, Management and Sciences (ICETEMS-2021)(4 (1), 219-229).
  •  

Author Biographies

  • Shanza Ijaz, Department of Computer Science and Information Technology, Islamia University of Bahawalpur, Punjab

    Department of Computer Science and Information Technology,

    Islamia University of Bahawalpur, Punjab

    shanzamalik092@gmail.com

  • Muhammad Talah Zubair, Department of Computer Science, National College of Business Administration & Economics (NCBAE), Multan

    Department of Computer Science,

    National College of Business Administration & Economics (NCBAE), Multan

    talhazubair009@gmail.com

Downloads

Published

09-11-2025

How to Cite

A Trust Management-based Energy Efficient Message Scheduling Algorithm in the Internet of Things System. (2025). Journal of Engineering and Computational Intelligence Review, 3(2), 51-67. https://jecir.com/index.php/jecir/article/view/26

Share

Similar Articles

1-10 of 28

You may also start an advanced similarity search for this article.