Skip to main content
Erschienen in: Cluster Computing 3/2022

24.11.2021

An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things

verfasst von: Sowmya Gali, Venkatram Nidumolu

Erschienen in: Cluster Computing | Ausgabe 3/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) defines the network of physical objects, commonly used to interconnect and communicate with other devices through the internet. Security is highly essential in IoT based communication owing to the massive heterogeneity of devices involved in the network. The interlinked systems in IoT, requires the trusted model for assuring security, authenticity, authorization and confidentiality of interconnected things, irrespective of the functionalities. Considering the challenges in the provision of security in the IoT network, this paper proposes a new chaotic bumble bees mating optimization (CBBMO) algorithm for secure data transmission with trust sensing model, called CBBMOR-TSM model. The BBMO is stimulated by the mating nature of a swarm of bumble bees. To improve the convergence rate of the BBMO technique, the CBBMO model is defined by the integration of chaotic concept into the classical BBMO technique. The aim of the proposed model is to design a trust sensing model and perform secure routing using the CBMO algorithm. The proposed model initially designs a trust sensing model by incorporating indirect and direct trusts that are utilized to determine the trust values of the IoT nodes and thereby the malicious node can be identified. In addition, the secure routing process is invoked using the CMBO algorithm by using the trust sensing model to determine an optimal and secure path for data transmission. To examine the superior performance of the presented method, an extensive set of experiments are performed and the results are investigated in terms of different measures. The CBBMOR-TSM model has attained a higher average PDR of 0.931 and lower average PLR of 0.069 whereas the TRM_IOT, OSEAP_IOT and MCTAR-IOT methods have achieved a maximum PLR of 0.219, 0.161 and 0.110 respectively.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shin, D., Sharma, V., Kim, J., Kwon, S., You, I.: Secure and efficient protocol for route optimization in PMIPv6-based smart home IoT networks. IEEE Access 5, 11100–11117 (2017)CrossRef Shin, D., Sharma, V., Kim, J., Kwon, S., You, I.: Secure and efficient protocol for route optimization in PMIPv6-based smart home IoT networks. IEEE Access 5, 11100–11117 (2017)CrossRef
3.
Zurück zum Zitat Vivekanand, V., Thushara, V.T.: Ultra resource constrained adaptive multipath routing for meteorological sensor networks. In: 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1–6. IEEE (2016) Vivekanand, V., Thushara, V.T.: Ultra resource constrained adaptive multipath routing for meteorological sensor networks. In: 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1–6. IEEE (2016)
5.
Zurück zum Zitat Mohammadi, V., Rahmani, A.M., Darwesh, A.M., Sahafi, A.: Trust-based recommendation systems in Internet of Things: a systematic literature review. HCIS 9(1), 1–61 (2019) Mohammadi, V., Rahmani, A.M., Darwesh, A.M., Sahafi, A.: Trust-based recommendation systems in Internet of Things: a systematic literature review. HCIS 9(1), 1–61 (2019)
6.
Zurück zum Zitat Kobayashi, G., Quilici-Gonzalez, M.E., Broens, M.C., Quilici-Gonzalez, J.A.: The ethical impact of the Internet of Things in social relationships: technological mediation and mutual trust. IEEE Consum. Electron. Mag. 5(3), 85–89 (2016)CrossRef Kobayashi, G., Quilici-Gonzalez, M.E., Broens, M.C., Quilici-Gonzalez, J.A.: The ethical impact of the Internet of Things in social relationships: technological mediation and mutual trust. IEEE Consum. Electron. Mag. 5(3), 85–89 (2016)CrossRef
7.
Zurück zum Zitat Anand, J.G.: Trust based optimal routing in MANET's. In: 2011 International Conference on Emerging Trends in Electrical and Computer Technology (pp. 1150–1156). IEEE (2011) Anand, J.G.: Trust based optimal routing in MANET's. In: 2011 International Conference on Emerging Trends in Electrical and Computer Technology (pp. 1150–1156). IEEE (2011)
9.
Zurück zum Zitat Kamalraj, R., Neelakandan, S., Ranjith Kumar, M., Chandra Sekhar Rao, V., Anand R., Singh, H.: Interpretable filter based convolutional neural network for glucose prediction and classification using. Measurement 183, 184 (2021) Kamalraj, R., Neelakandan, S., Ranjith Kumar, M., Chandra Sekhar Rao, V., Anand R., Singh, H.: Interpretable filter based convolutional neural network for glucose prediction and classification using. Measurement 183, 184 (2021)
10.
Zurück zum Zitat Yiğit, B., Gür, G., Alagöz, F., Tellenbach, B.: Cost-aware securing of IoT systems using attack graphs. Ad Hoc Netw. 86, 23–35 (2019)CrossRef Yiğit, B., Gür, G., Alagöz, F., Tellenbach, B.: Cost-aware securing of IoT systems using attack graphs. Ad Hoc Netw. 86, 23–35 (2019)CrossRef
12.
Zurück zum Zitat Almobaideen, W., Krayshan, R., Allan, M., Saadeh, M.: Internet of Things: geographical routing based on healthcare centers vicinity for mobile smart tourism destination. Technol. Forecast. Soc. Chang. 123, 342–350 (2017)CrossRef Almobaideen, W., Krayshan, R., Allan, M., Saadeh, M.: Internet of Things: geographical routing based on healthcare centers vicinity for mobile smart tourism destination. Technol. Forecast. Soc. Chang. 123, 342–350 (2017)CrossRef
14.
Zurück zum Zitat Malchi, S.K., Kallam, S., Al-Turjman, F., Patan, R.: A trust-based fuzzy neural network for smart data fusion in internet of things. Comput. Electr. Eng. 89, 106901 (2021)CrossRef Malchi, S.K., Kallam, S., Al-Turjman, F., Patan, R.: A trust-based fuzzy neural network for smart data fusion in internet of things. Comput. Electr. Eng. 89, 106901 (2021)CrossRef
15.
Zurück zum Zitat Seyfollahi, A., Ghaffari, A.: Reliable data dissemination for the Internet of Things using Harris hawks optimization. Peer-to-Peer Netw. Appl. 13(6), 1886–1902 (2020)CrossRef Seyfollahi, A., Ghaffari, A.: Reliable data dissemination for the Internet of Things using Harris hawks optimization. Peer-to-Peer Netw. Appl. 13(6), 1886–1902 (2020)CrossRef
16.
Zurück zum Zitat Wang, Y., Zhang, M., Shu, W.: An emerging intelligent optimization algorithm based on trust sensing model for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2018(1), 1–10 (2018)CrossRef Wang, Y., Zhang, M., Shu, W.: An emerging intelligent optimization algorithm based on trust sensing model for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2018(1), 1–10 (2018)CrossRef
17.
Zurück zum Zitat Gali, S., Nidumolu, V.: Multi-context trust aware routing for internet of things. Int. J. Intell. Eng. Syst. 12(1), 189–200 (2018) Gali, S., Nidumolu, V.: Multi-context trust aware routing for internet of things. Int. J. Intell. Eng. Syst. 12(1), 189–200 (2018)
18.
Zurück zum Zitat Mabodi, K., Yusefi, M., Zandiyan, S., Irankhah, L., Fotohi, R.: Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. J. Supercomput. 76, 7081–7106 (2020) Mabodi, K., Yusefi, M., Zandiyan, S., Irankhah, L., Fotohi, R.: Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. J. Supercomput. 76, 7081–7106 (2020)
19.
Zurück zum Zitat Mo, W., Wang, T., Zhang, S., Zhang, J.: An active and verifiable trust evaluation approach for edge computing. J. Cloud Comput. 9(1), 1–19 (2020)CrossRef Mo, W., Wang, T., Zhang, S., Zhang, J.: An active and verifiable trust evaluation approach for edge computing. J. Cloud Comput. 9(1), 1–19 (2020)CrossRef
20.
Zurück zum Zitat Djedjig, N., Tandjaoui, D., Medjek, F., Romdhani, I.: Trust-aware and cooperative routing protocol for IoT security. J. Inf. Secur. Appl. 52, 102467 (2020) Djedjig, N., Tandjaoui, D., Medjek, F., Romdhani, I.: Trust-aware and cooperative routing protocol for IoT security. J. Inf. Secur. Appl. 52, 102467 (2020)
21.
Zurück zum Zitat Tandon, A., Srivastava, P.: Trust-based enhanced secure routing against rank and sybil attacks in IoT. In: 2019 Twelfth International Conference on Contemporary Computing (IC3), pp. 1–7. IEEE (2019). Tandon, A., Srivastava, P.: Trust-based enhanced secure routing against rank and sybil attacks in IoT. In: 2019 Twelfth International Conference on Contemporary Computing (IC3), pp. 1–7. IEEE (2019).
24.
Zurück zum Zitat Etemadi, M., Ghobaei-Arani, M., Shahidinejad, A.: A cost-efficient auto-scaling mechanism for IoT applications in fog computing environment: a deep learning-based approach. Clust. Comput. 24, 3277–3292 (2021)CrossRef Etemadi, M., Ghobaei-Arani, M., Shahidinejad, A.: A cost-efficient auto-scaling mechanism for IoT applications in fog computing environment: a deep learning-based approach. Clust. Comput. 24, 3277–3292 (2021)CrossRef
25.
Zurück zum Zitat Denko, M.K., Sun, T., Woungang, I.: Trust management in ubiquitous computing: a Bayesian approach. Comput. Commun. 34(3), 398–406 (2011)CrossRef Denko, M.K., Sun, T., Woungang, I.: Trust management in ubiquitous computing: a Bayesian approach. Comput. Commun. 34(3), 398–406 (2011)CrossRef
Metadaten
Titel
An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things
verfasst von
Sowmya Gali
Venkatram Nidumolu
Publikationsdatum
24.11.2021
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 3/2022
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-021-03473-3

Weitere Artikel der Ausgabe 3/2022

Cluster Computing 3/2022 Zur Ausgabe

Premium Partner