Security in IoT Mesh Networks Based on Trust Similarity

被引:13
|
作者
Kavitha, Athota [1 ]
Reddy, Vijender Busi [2 ]
Singh, Ninni [3 ]
Gunjan, Vinit Kumar [3 ]
Lakshmanna, Kuruva [4 ]
Khan, Arfat Ahmad [5 ]
Wechtaisong, Chitapong [6 ]
机构
[1] JNTU Univ, JNTUH Coll Engn, Hyderabad 500090, Telangana, India
[2] Adv Data Proc Res Inst, Secunderabad 500090, Telangana, India
[3] CMR Inst Technol, Hyderabad 500008, Telangana, India
[4] VIT, Sch Informat Technol & Engn, Vellore 632014, India
[5] Khon Kaen Univ, Coll Comp, Dept Comp Sci, Khon Kaen 40002, Thailand
[6] Suranaree Univ Technol, Sch Telecommun Engn, Nakhon Ratchasima 30000, Thailand
关键词
Sustainable network; mesh networks; IoT; trust; similarity; recommendation based trust; WIRELESS SENSOR NETWORKS; INTERNET; SCHEME; COMMUNICATION; MANAGEMENT; EVOLUTION;
D O I
10.1109/ACCESS.2022.3220678
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) Mesh networks are becoming very popular to enable IoT devices to communicate without relying on dedicated PC services. The Internet of Things (IoT) implicitly uses mesh networks. IoT connectivity to cloud and edge computing is in vogue. A Wireless Mesh Network (WMN) is a multi-hop and distributed wireless network with mesh routers and mesh clients. Data originating from mesh clients are forwarded to destinations through mesh routers. In IoT Mesh networks, mesh clients are IoT devices. The crucial security issue with these networks is the lack of a trusted third party for validation. However, trust between nodes is required for the proper functioning of the network. WMNs are particularly vulnerable as they rely upon cooperative forwarding. In this research work, a secure and sustainable novel trust mechanism framework is proposed. This framework identifies the malicious nodes in WMNs and improves the nodes' cooperation. The proposed framework or model differentiates between legitimate and malicious nodes using direct trust and indirect trust. Direct trust is computed based on the packet-forwarding behavior of a node. Mesh routers have multi-radios, so the promiscuous mode may not work. A new two-hop mechanism is proposed to observe the neighbors' packet forwarding behavior. Indirect trust is computed by aggregating the recommendations using the weighted D-S theory, where weight is computed using a novel similarity mechanism that correlates the recommendations received from different neighbors. Dynamic weight computation calculates the overall trust by using several interactions. We present the evaluations to show the effectiveness of the proposed approach in the presence of packet drop/modification attacks, bad-mouthing attacks, on- off attacks, and collusion attacks by using the ns-2 simulator.
引用
收藏
页码:121712 / 121724
页数:13
相关论文
共 50 条
  • [1] A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks
    Thulasiraman, Preetha
    Wang, Yizhong
    2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,
  • [2] An Authenticated Trust Based Security Mechanism for Video Transmission in Wireless Mesh Networks
    Loret, J. B. Shajilin
    Kumar, T. Ganesh
    JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (04): : 757 - 764
  • [3] Security similarity based trust in cyber space
    Bahtiyar, Serif
    Caglayan, Mehmet Ufuk
    KNOWLEDGE-BASED SYSTEMS, 2013, 52 : 290 - 301
  • [4] Comparative Study of Trust and Reputation Security Models in IoT Networks
    Salunke, Abhijeet
    Bhambar, Soni
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 830 - 835
  • [5] TAS-IoT: Trust-based Adaptive Security in the IoT
    Hellaoui, Hamed
    Bouabdallah, Abdelmadjid
    Koudil, Mouloud
    2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2016, : 599 - 602
  • [6] IoT Security and Consumer Trust
    Badran, Hosein F.
    PROCEEDINGS OF THE 20TH ANNUAL INTERNATIONAL CONFERENCE ON DIGITAL GOVERNMENT RESEARCH (DGO2019): GOVERNANCE IN THE AGE OF ARTIFICIAL INTELLIGENCE, 2019, : 133 - 140
  • [7] Fuzzy Logic based security trust evaluation for IoT environments
    Khalil, Ahmad
    Mbarek, Nader
    Togni, Olivier
    2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [8] ComplexIoT: Behavior-Based Trust For IoT Networks
    Haefner, Kyle
    Ray, Indrakshi
    2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 56 - 65
  • [9] Wireless Mesh Networks in IoT Networks A new soultion for IoT Networks
    Liu, Yu
    Tong, Kin-Fai
    Qiu, Xiangdong
    Liu, Ying
    Ding, Xuyang
    2017 INTERNATIONAL WORKSHOP ON ELECTROMAGNETICS: APPLICATIONS AND STUDENT INNOVATION COMPETITION (IEEE IWEM 2017), 2017, : 183 - 185
  • [10] Enabling Trust and Security TIPPSS for IoT
    Hudson, Florence D.
    Laplante, Phillip A.
    Amaba, Ben
    IT PROFESSIONAL, 2018, 20 (02) : 15 - 18