An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things

被引:0
|
作者
Sowmya Gali
Venkatram Nidumolu
机构
[1] Koneru Lakshmaiah Education Foundation,Department of ECE
[2] Koneru Lakshmaiah Education Foundation,undefined
来源
Cluster Computing | 2022年 / 25卷
关键词
IoT; Routing protocol; Metaheuristics; Trust sensing scheme; Chaotic optimization; Malicious node;
D O I
暂无
中图分类号
学科分类号
摘要
The Internet of Things (IoT) defines the network of physical objects, commonly used to interconnect and communicate with other devices through the internet. Security is highly essential in IoT based communication owing to the massive heterogeneity of devices involved in the network. The interlinked systems in IoT, requires the trusted model for assuring security, authenticity, authorization and confidentiality of interconnected things, irrespective of the functionalities. Considering the challenges in the provision of security in the IoT network, this paper proposes a new chaotic bumble bees mating optimization (CBBMO) algorithm for secure data transmission with trust sensing model, called CBBMOR-TSM model. The BBMO is stimulated by the mating nature of a swarm of bumble bees. To improve the convergence rate of the BBMO technique, the CBBMO model is defined by the integration of chaotic concept into the classical BBMO technique. The aim of the proposed model is to design a trust sensing model and perform secure routing using the CBMO algorithm. The proposed model initially designs a trust sensing model by incorporating indirect and direct trusts that are utilized to determine the trust values of the IoT nodes and thereby the malicious node can be identified. In addition, the secure routing process is invoked using the CMBO algorithm by using the trust sensing model to determine an optimal and secure path for data transmission. To examine the superior performance of the presented method, an extensive set of experiments are performed and the results are investigated in terms of different measures. The CBBMOR-TSM model has attained a higher average PDR of 0.931 and lower average PLR of 0.069 whereas the TRM_IOT, OSEAP_IOT and MCTAR-IOT methods have achieved a maximum PLR of 0.219, 0.161 and 0.110 respectively.
引用
收藏
页码:1779 / 1789
页数:10
相关论文
共 50 条
  • [41] A Secure Routing for MANET using Internet of Things
    Thapar, Shruti
    Rao, M. Venu Gopala
    Jain, Babita
    Kaushik, Rajkumar
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (05) : 2957 - 2965
  • [42] A Secure Access Scheme for Internet of Things Devices Based on Blockchain
    Li, Wenzheng
    Ying, JiYue
    PROCEEDINGS OF 2021 IEEE 12TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2021, : 65 - 71
  • [43] Secure Transfer Protocol Research and Design Based on the Internet of Things
    Zhong, Jing
    Liu, Wei
    Wang, Ying Kai
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 619 - +
  • [44] DTLS based secure group communication scheme for Internet of Things
    Choudhury, Bikramjit
    Nag, Amitava
    Nandi, Sukumar
    2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), 2020, : 156 - 164
  • [45] Secure Access Scheme Research and Design Based on the Internet of Things
    Liu, Wei
    Zhong, Jing
    Lin, Jun
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1818 - +
  • [46] Revolutionary of secure lightweight energy efficient routing protocol for internet of medical things: a review
    Dev, B. Padma Vijetha
    Prasad, K. Venkata
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (13) : 37247 - 37274
  • [47] Revolutionary of secure lightweight energy efficient routing protocol for internet of medical things: a review
    Padma Vijetha Dev. B
    K. Venkata Prasad
    Multimedia Tools and Applications, 2024, 83 : 37247 - 37274
  • [48] Fuzzy sets based cluster routing protocol for internet of things
    Sankar S.
    Srinivasan P.
    International Journal of Fuzzy System Applications, 2019, 8 (03) : 70 - 93
  • [49] A Novel Trust-Based Secure Data Aggregation for Internet of Things
    Liu, Yanbing
    Gong, Xuehong
    Xing, Congcong
    2014 PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2014), 2014, : 435 - 439
  • [50] A Trust-Third-Party Based Key Management Protocol for Secure Mobile RFID Service Based on the Internet of Things
    Yan, Tao
    Wen, Qiaoyan
    KNOWLEDGE DISCOVERY AND DATA MINING, 2012, 135 : 201 - 208