An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things

被引:0
|
作者
Sowmya Gali
Venkatram Nidumolu
机构
[1] Koneru Lakshmaiah Education Foundation,Department of ECE
[2] Koneru Lakshmaiah Education Foundation,undefined
来源
Cluster Computing | 2022年 / 25卷
关键词
IoT; Routing protocol; Metaheuristics; Trust sensing scheme; Chaotic optimization; Malicious node;
D O I
暂无
中图分类号
学科分类号
摘要
The Internet of Things (IoT) defines the network of physical objects, commonly used to interconnect and communicate with other devices through the internet. Security is highly essential in IoT based communication owing to the massive heterogeneity of devices involved in the network. The interlinked systems in IoT, requires the trusted model for assuring security, authenticity, authorization and confidentiality of interconnected things, irrespective of the functionalities. Considering the challenges in the provision of security in the IoT network, this paper proposes a new chaotic bumble bees mating optimization (CBBMO) algorithm for secure data transmission with trust sensing model, called CBBMOR-TSM model. The BBMO is stimulated by the mating nature of a swarm of bumble bees. To improve the convergence rate of the BBMO technique, the CBBMO model is defined by the integration of chaotic concept into the classical BBMO technique. The aim of the proposed model is to design a trust sensing model and perform secure routing using the CBMO algorithm. The proposed model initially designs a trust sensing model by incorporating indirect and direct trusts that are utilized to determine the trust values of the IoT nodes and thereby the malicious node can be identified. In addition, the secure routing process is invoked using the CMBO algorithm by using the trust sensing model to determine an optimal and secure path for data transmission. To examine the superior performance of the presented method, an extensive set of experiments are performed and the results are investigated in terms of different measures. The CBBMOR-TSM model has attained a higher average PDR of 0.931 and lower average PLR of 0.069 whereas the TRM_IOT, OSEAP_IOT and MCTAR-IOT methods have achieved a maximum PLR of 0.219, 0.161 and 0.110 respectively.
引用
收藏
页码:1779 / 1789
页数:10
相关论文
共 50 条
  • [31] A secure authentication scheme for Internet of Things
    Wang, King-Hang
    Chen, Chien-Ming
    Fang, Weicheng
    Wu, Tsu-Yang
    PERVASIVE AND MOBILE COMPUTING, 2017, 42 : 15 - 26
  • [32] An Efficient Secure and Adaptive Routing Protocol Based on GMM-HMM-LSTM for Internet of Underwater Things
    Zhu, Rongxin
    Boukerche, Azzedine
    Yang, Qiuling
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09): : 16491 - 16504
  • [33] Trust-based energy-efficient routing protocol for Internet of things-based sensor networks
    Ilyas, Muhammad
    Ullah, Zahid
    Khan, Fakhri Alam
    Chaudary, Muhammad Hasanain
    Malik, Muhammad Sheraz Arshed
    Zaheer, Zafar
    Durrani, Hamood Ur Rehman
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (10):
  • [34] A trust-based secure AODV routing scheme for MANET
    Wahi, Charu
    Chakraverty, Shampa
    Bhattacherjee, Vandana
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2021, 38 (04) : 231 - 247
  • [35] Secure routing protocol based trust for ad hoc networks
    Liu, Zhiyuan
    Lu, Shejie
    Yan, Jun
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 279 - +
  • [36] Trust Based Secure on Demand Routing Protocol (TSDRP) for MANETs
    Aggarwal, Akshai
    Gandhi, Savita
    Chaubey, Nirbhay
    Jani, Keyurbhai A.
    2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014), 2014, : 432 - +
  • [37] RIoT: A Routing Protocol for the Internet of Things
    Farooq, Muhammad Omer
    COMPUTER JOURNAL, 2020, 63 (06): : 958 - 973
  • [38] Trust but Verify: Auditing the Secure Internet of Things
    Wilson, Judson
    Wahby, Riad S.
    Corrigan-Gibbs, Henry
    Boneh, Dan
    Levis, Philip
    Winstein, Keith
    MOBISYS'17: PROCEEDINGS OF THE 15TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2017, : 464 - 474
  • [39] A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things
    Wazid, Mohammad
    Das, Ashok Kumar
    Shetty, Sachin
    Jo, Minho
    IEEE ACCESS, 2020, 8 : 88700 - 88716
  • [40] CTrust-RPL: A control layer-based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks-based Internet of Things applications
    ul Hassan, Temur
    Asim, Muhammad
    Baker, Thar
    Hassan, Jawad
    Tariq, Noshina
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (03)