Trust-based Enhanced ACO Algorithm for Secure Routing in IoT

Afsah Sharmin, S. M. A. Motakabber, Aisha Hassan Abdalla Hashim

Abstract


The Internet of Things (IoT) is an expanding paradigm of object connectivity using a range of resource types and architectures to deliver ubiquitous and requested services. There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. As it is challenging to implement security in resource-constrained IoT networks, the presented model adopted bio-inspired approaches, offering an improved version of ACO towards secure data transmission cost-effectively while taking into consideration residual energy and the trust score of the sensor to be optimized. The trust evaluation system has been enhanced in the development of the proposed routing algorithm and the node trust value is evaluated, sensor node misbehavior is identified, and energy conservation is maximized. The performance evaluation is demonstrated utilizing MATLAB. In comparison to the standard bio-inspired algorithms and existing secure routing protocols, the proposed system reduces average energy consumption by nearly 50% regardless of the increase in the number of nodes and end-to-end delay of 40%, while finding the secure and optimal path in unison is designed to ensure trust in the IoT environment.

Keywords


Ant Colony Optimization; Internet of Things; Sensors; Secure Routing; Trust Evaluation; Energy efficiency

References


REFERENCES

F. Pereira, R. Correia, P. Pinho, S. I. Lopes, and N.B. Carvalho, “Challenges in resource-constrained IoT devices: Energy and communication as critical success factors for future IoT deployment”, Sensors (Basel) 2020, 20, 6420.

J. Granjal, E. Monteiro, J. Sa Silva, “Security for the internet of things: A survey of existing protocols and open research issues,” IEEE Communications Surveys and Tutorials, vol. 17(3), pp. 1294–1312, 2015.

S. Ganeriwal and M. B. Srivastava, “Reputation-based framework for high integrity sensor networks,” in SASN’04: Proceedings of the 2nd ACM workshop on security of Ad hoc and sensor networks, New York: ACM, pp. 66–77, 2004.

S. Hamrioui and P. Lorenz, “Bio inspired routing algorithm and efficient communications within IoT,” IEEE Network, vol. 31(5), pp. 74-79, 2017.

H. Xia, Z. Jia, and E. H.-M. Sha, ‘‘Research of trust model based on fuzzy theory in mobile ad hoc networks,’’ IET Inf. Secur., vol. 8 (2), pp. 88–103, March 2014.

A. Gladkov, E. Shiriaev, A. Tchernykh, M. Deryabin, M. Babenko, S. Nesmachnow, “DT-RRNS: Routing protocol design for secure and reliable distributed smart sensors communication systems,” Sensors (Basel), vol. 23(7), p. 3738, 2023.

I. Kenji, T. Matsunaga, K. Toyoda, I. Sasase, “Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network,” IEICE Communications Express, pp. 299–303, 2015.

S. S. Solapure and H. H. Kenchannavar, “Design and analysis of RPL objective functions using variant routing metrics for IoT applications,” Wireless Networks, vol. 26, pp. 4637-4656, 2020.

G. Glissa, A. Rachedi, and A. Meddeb, “A Secure Routing Protocol Based on RPL for Internet of Things," in 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1-7, 2016.

X. Liu, J. Yu, K. Yu, G. Wang, and X. Feng, “Trust secure data aggregation in WSN-based IIoT with single mobile sink”, Ad Hoc Netw. 2022, 136, 102956.

R. Stephen, L. Arockiam, “E2V: Techniques for Detecting and Mitigating Rank Inconsistency Attack (RInA) in RPL based Internet of Things,” in Journal of Physics: Conference Series, 1142(1), 012009, 2018.

R. Yamamoto, S. Nishibu, T. Yamazaki, Y. Okamura, Y. Tanaka, “ACO-inspired energy-aware routing algorithm for wireless sensor networks,” Journal of Telecommunications and Information Technology, 2019.

A. Sharmin, F. Anwar, S.M.A. Motakabber, A.H.A. Hashim, “Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT,” in Proceedings of the 8th International Conference on Computer and Communication Engineering, ICCCE 2021, pp. 190-195, 2021.

A. Sharmin, F. Anwar, S.M.A. Motakabber, A.H.A. Hashim, “A Trust Aware Secure Ant Colony Optimization Based Routing Algorithm for Internet of Things,” In 2023 IEEE 9th International Conference on Computer and Communication Engineering, ICCCE 2023, pp. 58-63, 2023.

W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,” IEEE Transactions on Wireless Communications, vol. 1(4), pp. 660-670, 2002.

W. Fang, X. Zhang, Z. Shi, Y. Sun, and L. Shan, ‘‘Binomial-based trust management system in wireless sensor networks,’’ Chin. J. Sens. Actuators, vol. 28, no. 5, pp. 703–708, 2017.

J. Vasseur, M. Kim, K. Pister, N. Dejean, D. Barthel, “Routing metrics used for path calculation in low power and lossy networks,” Draft-Ietf-Roll-Routing-Metrics, 2011.

Winter T. Ed. and Thubert P. Ed., “RPL: IPv6 Routing Protocol for Low power and Lossy Networks,” IETF Internet-Draft, 2010.

S. M. Muzammal, R. K. Murugesan, N. Z. Jhanjhi, M. S. Hossain, and A. Yassine, “Trust and mobility-based protocol for secure routing in Internet of Things”, Sensors (Basel) 2022.

M. Tanveer, G. Abbas, Z. H. Abbas, M. Waqas, F. Muhammad, and S. Kim, “S6AE: Securing 6LoWPAN using authenticated encryption scheme”, Sensors (Basel) 2020.

K. Nichols, V. Jacobson, and R. King, “Defined-Trust Transport (DeftT) Protocol for Limited Domains”, Available online: https://datatracker.ietf.org/doc/draft-nichols-iotops-defined-trust-transport/ (accessed on 5 March 2023).

J. Granjal, J. M. Silva, and N. Lourenço, “Intrusion detection and prevention in CoAP wireless sensor networks using anomaly detection”, Sensors (Basel) 2018.

G. Shafer, “A mathematical theory of evidence,” Princeton university press, vol. 42, 1976.

D. R. Dodds, “Fuzziness in knowledge-based robotics systems. Fuzzy sets and systems,” vol. 26(2), pp. 179-193, 1988.

A. Josang, and R. Ismail, “The beta reputation system,” In Proceedings of the 15th bled electronic commerce conference, vol. 5, pp. 2502-2511, June 2002.


Full Text: PDF

Refbacks

  • There are currently no refbacks.


 

Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN 2089-3272

Creative Commons Licence

This work is licensed under a Creative Commons Attribution 4.0 International License.

web analytics
View IJEEI Stats

https://journalofhealthandcaringsciences.org/pasar2/https://jlt.ac/https://jgaa.info/public/www/idn/https://jgaa.info/public/www/mpo/https://mitrasmart.co.id/akun-pro-thailand/http://ojs3.bkstm.org/pasarantogel2/https://lnx.gatm.it/analiticaojs/https://viguera.com/slot-thailand/https://www.cienciaecuador.com.ec/https://ejournal.aibpmjournals.com/scatter-hitam/https://pijarpemikiran.com/https://hr.tarunabakti.or.id/zeus-slot/https://www.vertitech.gr/wp-content/situs/https://ube.edu.ec/depo10k/https://ejournal.aibpmjournals.com/gates-of-olympus/https://viguera.com/depo-10k/https://tangseldaily.com/https://esic.novacanaapaulista.sp.gov.br/uploads/sigmaslot/https://rbiad.com.br/sigmaslot/https://fjot.anfe.fr/https://www.viguera.com/slot-gacor/http://revista.tce.gob.ec/ojs-3.1.2-4/sweet-bonanza/http://citaitb.com/wp-content/document/https://rdsp.msp.gob.do/sgm/https://rdsp.msp.gob.do/https://thepab.org/public/pro/https://www.unjc.cu/sigmaslot/https://ojs.co.id/wp-content/cache/https://ktadigitalpgri.org/assets/dist/img/scatter-hitam/https://pasarantogel2.live/http://www.inmedsur.cfg.sld.cu/pasaran2/http://controlvisible.auditoria.gov.co/public/https://isbrmj.org/starlight-princess/https://fjot.anfe.fr/https://journalofhealthandcaringsciences.org/atm88/https://journalofhealthandcaringsciences.org/idn/https://www.viguera.com/sigmaslot/https://seemedj.mefos.unios.hr/public/http://ojs3.bkstm.org/sigma/https://masonhq.org/http://www.inmedsur.cfg.sld.cu//https://iojpe.org/jepang/https://ojs.ukscip.com/pages/2024/https://www.journalprenatalife.com/public/http://citaitb.com/idn/https://journalofhealthandcaringsciences.org/mpo/https://asianmedjam.com/slot-deposit-pulsa/https://asianmedjam.com/akun-pro-kamboja/https://isbrmj.org/public/https://caet.inspirees.com/slot-luar/https://isnujatim.org/slot-dana/https://journal.shamlands.sy/pages/io/https://www.viguera.com/slot-kamboja/https://kpmsurabaya.id/akun-pro-kamboja/https://iojpe.org/atmos88/https://www.remap.ugto.mx/pages/slot-luar-negeri-winrate-tertinggi/http://www.inmedsur.cfg.sld.cu/docs/https://www.viguera.com/pasarantogel2/https://webscience-journal.net/https://humanika.penapersada.com/public/wp/https://caet.inspirees.com/scatter-hitam/https://ojs.ahe.lodz.pl/pg/https://ojs.co.id/id/pasarantogel2/https://snman.science/https://algede.org/