Trust-based Enhanced ACO Algorithm for Secure Routing in IoT
Abstract
Keywords
References
REFERENCES
F. Pereira, R. Correia, P. Pinho, S. I. Lopes, and N.B. Carvalho, “Challenges in resource-constrained IoT devices: Energy and communication as critical success factors for future IoT deployment”, Sensors (Basel) 2020, 20, 6420.
J. Granjal, E. Monteiro, J. Sa Silva, “Security for the internet of things: A survey of existing protocols and open research issues,” IEEE Communications Surveys and Tutorials, vol. 17(3), pp. 1294–1312, 2015.
S. Ganeriwal and M. B. Srivastava, “Reputation-based framework for high integrity sensor networks,” in SASN’04: Proceedings of the 2nd ACM workshop on security of Ad hoc and sensor networks, New York: ACM, pp. 66–77, 2004.
S. Hamrioui and P. Lorenz, “Bio inspired routing algorithm and efficient communications within IoT,” IEEE Network, vol. 31(5), pp. 74-79, 2017.
H. Xia, Z. Jia, and E. H.-M. Sha, ‘‘Research of trust model based on fuzzy theory in mobile ad hoc networks,’’ IET Inf. Secur., vol. 8 (2), pp. 88–103, March 2014.
A. Gladkov, E. Shiriaev, A. Tchernykh, M. Deryabin, M. Babenko, S. Nesmachnow, “DT-RRNS: Routing protocol design for secure and reliable distributed smart sensors communication systems,” Sensors (Basel), vol. 23(7), p. 3738, 2023.
I. Kenji, T. Matsunaga, K. Toyoda, I. Sasase, “Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network,” IEICE Communications Express, pp. 299–303, 2015.
S. S. Solapure and H. H. Kenchannavar, “Design and analysis of RPL objective functions using variant routing metrics for IoT applications,” Wireless Networks, vol. 26, pp. 4637-4656, 2020.
G. Glissa, A. Rachedi, and A. Meddeb, “A Secure Routing Protocol Based on RPL for Internet of Things," in 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1-7, 2016.
X. Liu, J. Yu, K. Yu, G. Wang, and X. Feng, “Trust secure data aggregation in WSN-based IIoT with single mobile sink”, Ad Hoc Netw. 2022, 136, 102956.
R. Stephen, L. Arockiam, “E2V: Techniques for Detecting and Mitigating Rank Inconsistency Attack (RInA) in RPL based Internet of Things,” in Journal of Physics: Conference Series, 1142(1), 012009, 2018.
R. Yamamoto, S. Nishibu, T. Yamazaki, Y. Okamura, Y. Tanaka, “ACO-inspired energy-aware routing algorithm for wireless sensor networks,” Journal of Telecommunications and Information Technology, 2019.
A. Sharmin, F. Anwar, S.M.A. Motakabber, A.H.A. Hashim, “Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT,” in Proceedings of the 8th International Conference on Computer and Communication Engineering, ICCCE 2021, pp. 190-195, 2021.
A. Sharmin, F. Anwar, S.M.A. Motakabber, A.H.A. Hashim, “A Trust Aware Secure Ant Colony Optimization Based Routing Algorithm for Internet of Things,” In 2023 IEEE 9th International Conference on Computer and Communication Engineering, ICCCE 2023, pp. 58-63, 2023.
W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,” IEEE Transactions on Wireless Communications, vol. 1(4), pp. 660-670, 2002.
W. Fang, X. Zhang, Z. Shi, Y. Sun, and L. Shan, ‘‘Binomial-based trust management system in wireless sensor networks,’’ Chin. J. Sens. Actuators, vol. 28, no. 5, pp. 703–708, 2017.
J. Vasseur, M. Kim, K. Pister, N. Dejean, D. Barthel, “Routing metrics used for path calculation in low power and lossy networks,” Draft-Ietf-Roll-Routing-Metrics, 2011.
Winter T. Ed. and Thubert P. Ed., “RPL: IPv6 Routing Protocol for Low power and Lossy Networks,” IETF Internet-Draft, 2010.
S. M. Muzammal, R. K. Murugesan, N. Z. Jhanjhi, M. S. Hossain, and A. Yassine, “Trust and mobility-based protocol for secure routing in Internet of Things”, Sensors (Basel) 2022.
M. Tanveer, G. Abbas, Z. H. Abbas, M. Waqas, F. Muhammad, and S. Kim, “S6AE: Securing 6LoWPAN using authenticated encryption scheme”, Sensors (Basel) 2020.
K. Nichols, V. Jacobson, and R. King, “Defined-Trust Transport (DeftT) Protocol for Limited Domains”, Available online: https://datatracker.ietf.org/doc/draft-nichols-iotops-defined-trust-transport/ (accessed on 5 March 2023).
J. Granjal, J. M. Silva, and N. Lourenço, “Intrusion detection and prevention in CoAP wireless sensor networks using anomaly detection”, Sensors (Basel) 2018.
G. Shafer, “A mathematical theory of evidence,” Princeton university press, vol. 42, 1976.
D. R. Dodds, “Fuzziness in knowledge-based robotics systems. Fuzzy sets and systems,” vol. 26(2), pp. 179-193, 1988.
A. Josang, and R. Ismail, “The beta reputation system,” In Proceedings of the 15th bled electronic commerce conference, vol. 5, pp. 2502-2511, June 2002.
Refbacks
- There are currently no refbacks.
Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN 2089-3272
This work is licensed under a Creative Commons Attribution 4.0 International License.