A Secure Routing Protocol in Heterogeneous Networks for Internet of Things

被引:0
|
作者
Jerbi, Wassim [1 ]
Guermazi, Abderrahmen [1 ]
Trabelsi, Hafedh [1 ]
机构
[1] Higher Inst Technol Studies, CES Lab Res, Sfax, Tunisia
关键词
Wireless Sensor Networks; Internet of Things; Routing Protocol; Security; Crypto-IoT; Authentication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Technologies have become more reliable, more optimal, and less costly in terms of calculation, storage and energy consumption. However, despite this success, due to the threat of cyber attacks, the security of Internet of Things (IoT) remains one of the major problems hampering the evolution and rapid deployment of this technology. This article consists of the creation of a security system to ensure the authentication services of connected objects, the integrity of the data exchanged between them and the confidentiality of information. This approach must take into account the constraints of the objects and communication technologies used. We have created a protocol which authenticates the object when it is associated and which protects the integrity of the data exchanged in unicast mode and subsequently improved in Broadcast mode. We try to design a secure multicast routing protocol Crypto-IoT that takes into account the constraints of the WSN and IoT. We evaluate the efficacy of our protocol with a real implementation using Telosb sensors and compared its performance to two other protocols: KDSR and LEAP. The performance results confirm Crypto-IoT is robust and efficient, provides a less consumption energy, fast calculation time, a good key connectivity and a good resilience compared to earlier work.
引用
收藏
页码:571 / 576
页数:6
相关论文
共 50 条
  • [1] A secure routing protocol based on RPL for Internet of Things
    Glissa, Ghada
    Rachedi, Abderrezak
    Meddeb, Aref
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [2] BSI: Blockchain to secure routing protocol in Internet of Things
    Jerbi, Wassim
    Cheikhrouhou, Omar
    Guermazi, Abderrahmen
    Baz, Mohamed
    Trabelsi, Hafedh
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (10):
  • [3] Optimization of Heterogeneous Clustering Routing Protocol for Internet of Things in Wireless Sensor Networks
    Yang, Shun
    Long, Xian'ai
    Peng, Hao
    Gao, Haibo
    JOURNAL OF SENSORS, 2022, 2022
  • [4] A Secure Routing Protocol for Heterogeneous Sensor Networks
    Du, Xiaojiang
    Guizani, Sghaier
    Xiao, Yang
    Chen, Hsiao-Hwa
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [5] SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things
    Conti, Mauro
    Kaliyar, Pallavi
    Rabbani, Md Masoom
    Ranise, Silvio
    2018 14TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB 2018), 2018,
  • [6] An AGV Mechanism Based Secure Routing Protocol for Internet of Things
    Xia, Youhua
    Lin, Hui
    Xu, Li
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 662 - 666
  • [7] Robust Routing for Secure Communication in Internet of Things Enabled Networks
    Thigale, Somnath B.
    Pandey, Rahul
    Dhotre, Virendrakumar A.
    TECHNO-SOCIETAL 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SOCIETAL APPLICATIONS - VOL 2, 2020, : 79 - 86
  • [8] Trust and Mobility-Based Protocol for Secure Routing in Internet of Things
    Muzammal, Syeda Mariam
    Murugesan, Raja Kumar
    Jhanjhi, N. Z.
    Hossain, M. Shamim
    Yassine, Abdulsalam
    SENSORS, 2022, 22 (16)
  • [9] Proposing a Secure RPL based Internet of Things Routing Protocol: A Review
    Almusaylim, Zahrah A.
    Alhumam, Abdulaziz
    Jhanjhi, N. Z.
    AD HOC NETWORKS, 2020, 101
  • [10] Secure routing for internet of things: A survey
    Airehrour, David
    Gutierrez, Jairo
    Ray, Sayan Kumar
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 : 198 - 213