An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things

被引:9
|
作者
Gali, Sowmya [1 ]
Nidumolu, Venkatram [2 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept ECE, Guntur, Andhra Pradesh, India
[2] Koneru Lakshmaiah Educ Fdn, Guntur, Andhra Pradesh, India
关键词
IoT; Routing protocol; Metaheuristics; Trust sensing scheme; Chaotic optimization; Malicious node;
D O I
10.1007/s10586-021-03473-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) defines the network of physical objects, commonly used to interconnect and communicate with other devices through the internet. Security is highly essential in IoT based communication owing to the massive heterogeneity of devices involved in the network. The interlinked systems in IoT, requires the trusted model for assuring security, authenticity, authorization and confidentiality of interconnected things, irrespective of the functionalities. Considering the challenges in the provision of security in the IoT network, this paper proposes a new chaotic bumble bees mating optimization (CBBMO) algorithm for secure data transmission with trust sensing model, called CBBMOR-TSM model. The BBMO is stimulated by the mating nature of a swarm of bumble bees. To improve the convergence rate of the BBMO technique, the CBBMO model is defined by the integration of chaotic concept into the classical BBMO technique. The aim of the proposed model is to design a trust sensing model and perform secure routing using the CBMO algorithm. The proposed model initially designs a trust sensing model by incorporating indirect and direct trusts that are utilized to determine the trust values of the IoT nodes and thereby the malicious node can be identified. In addition, the secure routing process is invoked using the CMBO algorithm by using the trust sensing model to determine an optimal and secure path for data transmission. To examine the superior performance of the presented method, an extensive set of experiments are performed and the results are investigated in terms of different measures. The CBBMOR-TSM model has attained a higher average PDR of 0.931 and lower average PLR of 0.069 whereas the TRM_IOT, OSEAP_IOT and MCTAR-IOT methods have achieved a maximum PLR of 0.219, 0.161 and 0.110 respectively.
引用
收藏
页码:1779 / 1789
页数:11
相关论文
共 50 条
  • [21] Secure routing for internet of things: A survey
    Airehrour, David
    Gutierrez, Jairo
    Ray, Sayan Kumar
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 : 198 - 213
  • [22] An Efficient Compressive Sensing Routing Scheme for Internet of Things Based Wireless Sensor Networks
    Aziz, Ahmed
    Singh, Karan
    Osamy, Walid
    Khedr, Ahmed M.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (03) : 1905 - 1925
  • [23] An Efficient Compressive Sensing Routing Scheme for Internet of Things Based Wireless Sensor Networks
    Ahmed Aziz
    Karan Singh
    Walid Osamy
    Ahmed M. Khedr
    [J]. Wireless Personal Communications, 2020, 114 : 1905 - 1925
  • [24] Secret Dynamic Key Authentication and Decision Trust Secure Routing Framework for Internet of Things Based WSN
    Meena, Uma
    Sharma, Promila
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 125 (02) : 1753 - 1781
  • [25] Secret Dynamic Key Authentication and Decision Trust Secure Routing Framework for Internet of Things Based WSN
    Uma Meena
    Promila Sharma
    [J]. Wireless Personal Communications, 2022, 125 : 1753 - 1781
  • [26] A Security Routing Protocol for Internet of Things Based on RPL
    Ma, Guojun
    Li, Xing
    Pei, Qingqi
    Li, Zi
    [J]. 2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 209 - 213
  • [27] The Congestion Control Based on Routing Protocol in the Internet of Things
    Wei, Ying
    [J]. INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND INTELLECTUALIZATION (ICEITI 2016), 2016, : 699 - 705
  • [28] A Trust-based Resilient Routing Mechanism for the Internet of Things
    Khan, Zeeshan Ali
    Ullrich, Johanna
    Voyiatzis, Artemios G.
    Herrmann, Peter
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [29] A secure authentication scheme for Internet of Things
    Wang, King-Hang
    Chen, Chien-Ming
    Fang, Weicheng
    Wu, Tsu-Yang
    [J]. PERVASIVE AND MOBILE COMPUTING, 2017, 42 : 15 - 26
  • [30] An Efficient Secure and Adaptive Routing Protocol Based on GMM-HMM-LSTM for Internet of Underwater Things
    Zhu, Rongxin
    Boukerche, Azzedine
    Yang, Qiuling
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09): : 16491 - 16504