A Communication-Efficient Secure Routing Protocol for IoT Networks

被引:2
|
作者
Shibasaki, Yuma [1 ]
Iwamura, Keiichi [1 ]
Sato, Koya [2 ]
机构
[1] Tokyo Univ Sci, Dept Elect Engn, Tokyo 1258585, Japan
[2] Univ Electrocommun, Artificial Intelligence eXplorat Res Ctr, Tokyo 1828585, Japan
关键词
Internet of Things (IoT); communication efficiency; secure routing; authentication;
D O I
10.3390/s22197503
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
This paper proposes a secure routing protocol based on an ad hoc on-demand distance vector to simultaneously achieve communication efficiency and security. Many studies have discussed secure protocols. However, conventional protocols tend to exhibit low communication efficiencies owing to the long packets required by digital signatures, specifically in large-scale networks. Hence, our proposed method aims to allow the intermediate node to initiate a route reply (RREP), which is prohibited in conventional protocols because of digital signature restrictions. Based on an ID-based signature, the proposed protocol allows each intermediate node to hold a packet received from a specific node in the past. Each node then appends it to the route request of another node and generates its own signed RREP. This procedure guarantees that a third party holds the route to the destination. Theoretical evaluations demonstrate that the proposed method outperforms the communication efficiency of conventional secure protocols. We measured the time required for routing (i.e., the sum of communication and cryptographic calculation times) using a Raspberry Pi with C language. We show that the proposed protocol can improve the average routing time by more than 3x compared with conventional methods when 30 relay nodes are randomly distributed in a 300-square meter area.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] An AODV-Based Communication-Efficient Secure Routing Protocol for Large Scale Ad-Hoc Networks
    Shibasaki, Yuma
    Sato, Koya
    Iwamura, Keiichi
    2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [2] An Energy-Efficient Multilevel Secure Routing Protocol in IoT Networks
    Zhang, Yinghui
    Ren, Qin
    Song, Kun
    Liu, Yang
    Zhang, Tiankui
    Qian, Yi
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) : 10539 - 10553
  • [3] Communication-Efficient Semihierarchical Federated Analytics in IoT Networks
    Zhao, Liang
    Valero, Maria
    Pouriyeh, Seyedamin
    Li, Lei
    Sheng, Quan Z.
    IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14) : 12614 - 12627
  • [4] An Energy Efficient Secure routing Scheme using LEACH protocol in WSN for IoT networks
    Suresh B.
    Shyama Chandra Prasad G.
    Measurement: Sensors, 2023, 30
  • [5] A multipath routing protocol for secure energy efficient communication in Wireless Sensor Networks
    Biswas, Kamanashis
    Muthukkumarasamy, Vallipuram
    Chowdhury, Mohammad Jabed Morshed
    Wu, Xin-Wen
    Singh, Kalvinder
    COMPUTER NETWORKS, 2023, 232
  • [6] REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks
    Conti, Mauro
    Kaliyar, Pallavi
    Lal, Chhagan
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [7] Communication-Efficient Secure Logistic Regression
    Agarwal, Amit
    Peceny, Stanislav
    Raykova, Mariana
    Schoppmann, Phillipp
    Seth, Karn
    9TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P 2024, 2024, : 440 - 467
  • [8] Efficient and Secure Routing Protocol for Wireless Sensor Networks
    Subramanian, Ganesh
    Amutha, R.
    2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 631 - 637
  • [9] A secure and efficient communication resume protocol for secure wireless networks
    Kim, K
    Hong, J
    Lim, J
    DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, 2005, 3543 : 157 - 168
  • [10] A communication-efficient key agreement protocol in Ad hoc Networks
    Shi, HS
    He, MX
    2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, COMMUNICATIONS AND MOBILE COMPUTING, VOLS 1 AND 2, 2005, : 285 - 291