Secure multi-path routing for Internet of Things based on trust evaluation

被引:0
|
作者
Xiao J. [1 ]
Chang C. [1 ]
Ma Y. [2 ]
Yang C. [1 ]
Yuan L. [1 ]
机构
[1] Information Engineering University of the Army Strategic Support Force, Zhengzhou
[2] Zhengzhou University of Technology, Henan, Zhengzhou
关键词
IoT security; multi-path routing; packet security verification; path scoring; software-defined networking;
D O I
10.3934/mbe.2024148
中图分类号
学科分类号
摘要
In the realm of the Internet of Things (IoT), ensuring the security of communication links and evaluating the safety of nodes within these links remains a significant challenge. The continuous threat of anomalous links, harboring malicious switch nodes, poses risks to data transmission between edge nodes and between edge nodes and cloud data centers. To address this critical issue, we propose a novel trust evaluation based secure multi-path routing (TESM) approach for IoT. Leveraging the software-defined networking (SDN) architecture in the data transmission process between edge nodes, TESM incorporates a controller comprising a security verification module, a multi-path routing module, and an anomaly handling module. The security verification module ensures the ongoing security validation of data packets, deriving trust scores for nodes. Subsequently, the multi-path routing module employs multi-objective reinforcement learning to dynamically generate secure multiple paths based on node trust scores. The anomaly handling module is tasked with handling malicious switch nodes and anomalous paths. Our proposed solution is validated through simulation using the Ryu controller and P4 switches in an SDN environment constructed with Mininet. The results affirm that TESM excels in achieving secure data forwarding, malicious node localization, and the secure selection and updating of transmission paths. Notably, TESM introduces a minimal 12.4% additional forwarding delay and a 5.46% throughput loss compared to traditional networks, establishing itself as a lightweight yet robust IoT security defense solution. © 2024 American Institute of Mathematical Sciences. All rights reserved.
引用
收藏
页码:3335 / 3363
页数:28
相关论文
共 50 条
  • [21] Performance Evaluation of Multi-Path Routing in Reservation-Based Wireless Networks
    Nissler, Mattias
    Gotzhein, Reinhard
    [J]. MSWIM09; PROCEEDINGS OF THE 12TH ACM INTERNATIONAL CONFERENCE ON MODELING, ANALYSIS, AND SYSTEMS, 2009, : 268 - 273
  • [22] Secure routing for internet of things: A survey
    Airehrour, David
    Gutierrez, Jairo
    Ray, Sayan Kumar
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 : 198 - 213
  • [23] A Load Balancing Multi-path Secure Routing Scheme for Wireless Sensor Networks
    Zhang, Jianmin
    Li, Hao
    Cui, Qingmin
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (06): : 247 - 256
  • [24] An approach for optimal-secure multi-path routing and intrusion detection in MANET
    Neenavath Veeraiah
    B. T. Krishna
    [J]. Evolutionary Intelligence, 2022, 15 : 1313 - 1327
  • [25] Secret Dynamic Key Authentication and Decision Trust Secure Routing Framework for Internet of Things Based WSN
    Meena, Uma
    Sharma, Promila
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 125 (02) : 1753 - 1781
  • [26] Secret Dynamic Key Authentication and Decision Trust Secure Routing Framework for Internet of Things Based WSN
    Uma Meena
    Promila Sharma
    [J]. Wireless Personal Communications, 2022, 125 : 1753 - 1781
  • [27] Secure Data Communications in Wireless Networks Using Multi-Path Avoidance Routing
    Sakai, Kazuya
    Sun, Min-Te
    Ku, Wei-Shinn
    Wu, Jie
    Lai, Ten H.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (10) : 4753 - 4767
  • [28] MHRP: A secure multi-path hybrid routing protocol for wireless mesh network
    Siddiqui, Muhammad Shoaib
    Amin, Syed Obaid
    Kim, Jin Ho
    Hong, Choong Seon
    [J]. 2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 2696 - 2702
  • [29] A reliable and secure multi-path routing strategy for underwater acoustic sensor networks
    Uyan, Osman Gokhan
    Akbas, Ayhan
    Gungor, Vehbi Cagri
    [J]. COMPUTER NETWORKS, 2022, 212
  • [30] An approach for optimal-secure multi-path routing and intrusion detection in MANET
    Veeraiah, Neenavath
    Krishna, B. T.
    [J]. EVOLUTIONARY INTELLIGENCE, 2022, 15 (02) : 1313 - 1327