An Efficient and Secure Data Forwarding Mechanism for Opportunistic IoT

被引:0
|
作者
Nisha Kandhoul
Sanjay K. Dhurandher
机构
[1] University of Delhi,Division of Information Technology, NSIT
[2] Netaji Subhas University of Technology,Department of Information Technology
来源
关键词
Opportunistic IoT; Black hole attack; Packet fabrication attack; Message encryption; Energy efficiency;
D O I
暂无
中图分类号
学科分类号
摘要
Internet of Things (IoT) is a heterogeneous network of interconnected things where users, smart devices and wireless technologies, collude for providing services. It is expected that a great deal of devices will get connected to the Internet in the near future. Opportunistic networks(OppNet) are a class of disruption tolerant networks characterized by uncertain topology and intermittent connectivity between the nodes. Opportunistic Internet of Things(OppIoT) is an amalgamation of the OppNet and IoT exploiting the communication between the IoT devices and the communities formed by humans. The data is exposed to a wide unfamiliar audience and the message delivery is dependent on the residual battery of the node, as most of the energy is spent on node discovery and message transmission. In such a scenario where a huge number of devices are accommodated, a scalable, adaptable, inter-operable, energy-efficient and secure network architecture is required. This paper proposes a novel defense mechanism against black hole and packet fabrication attacks for OppIoT, GFRSA, A Green Forwarding ratio and RSA (Rivest, Shamir and Adleman) based secure routing protocol. The selection of the next hop is based on node’s forwarding behavior, current energy level and its predicted message delivery probability. For further enhancing the security provided by the protocol, the messages are encrypted using asymmetric cryptography before transmission. Simulations performed using opportunistic network environment (ONE) simulator convey that GFRSA provides message security, saves energy and outperforms the existing protocols, LPRF-MC (Location Prediction-based Forwarding for Routing using Markov Chain) and RSASec (Asymmetric RSA-based security approach) in terms of correct packet delivery by 27.37%, message delivery probability is higher by 34.51%, number of messages dropped are reduced by 15.17% and the residual node energy is higher by 14.08%.
引用
下载
收藏
页码:217 / 237
页数:20
相关论文
共 50 条
  • [1] An Efficient and Secure Data Forwarding Mechanism for Opportunistic IoT
    Kandhoul, Nisha
    Dhurandher, Sanjay K.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 118 (01) : 217 - 237
  • [2] A Secure and Efficient Scheduling Mechanism for Emergency Data Transmission in IOT
    Rao, Subba
    Sarma, N. S. Murti
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (01): : 432 - 443
  • [3] Secure and Efficient Data Sharing for IoT Based on Blockchain and Reputation Mechanism
    Yang, Wei
    Hou, Chengqi
    Zhang, Zhiming
    Wang, Xinlong
    Chen, Shaolong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (11): : 20631 - 20647
  • [4] Secure and efficient data forwarding in untrusted cloud environment
    Ramachandran, Balamanigandan
    Subramaniam, Kamalraj
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : S3727 - S3735
  • [5] Secure and efficient data forwarding in untrusted cloud environment
    Balamanigandan Ramachandran
    Kamalraj Subramaniam
    Cluster Computing, 2019, 22 : 3727 - 3735
  • [6] Opportunistic data gathering in IoT networks using an energy-efficient data aggregation mechanism
    Afonso, Edvar
    Campista, Miguel Elias M.
    ANNALS OF TELECOMMUNICATIONS, 2024,
  • [7] Delivery probability aware data forwarding mechanism in Opportunistic Networks
    Liu Qiao-shou
    Liu Jia
    Wang Yan-yan
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 151 - 155
  • [8] Data forwarding control mechanism with fuzzy controller in opportunistic network
    Yang J.
    Gong L.-L.
    Yang Z.-C.
    Xie Y.
    Xie J.-F.
    Wang R.-Y.
    1600, Chinese Institute of Electronics (38): : 392 - 399
  • [9] Data forwarding in opportunistic networks
    Liu L.
    Chen Z.
    Information Technology Journal, 2010, 9 (02) : 215 - 223
  • [10] Efficient and Transparent Use of personal device storage in opportunistic data forwarding
    Hoseini, Sayed Amir
    Fotouhi, Azade
    Hassan, Mahbub
    Chou, Chun Tung
    Ammar, Mostafa H.
    COMPUTER COMMUNICATIONS, 2016, 73 : 47 - 55