Skip to main content
Log in

Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) has a wide concentration in today’s technological world. It has a significant impact on smart infrastructure with a security vision. So, IoT devices with sensors or smart gadgets are used to gather important data. The data gathered from IoT are vulnerable to signal processing attacks due to the interconnection of different network categories. In this paper, a system for securing data in IoT communication is proposed. The proposed system includes two techniques. Initially, a technique with the combination of Fuzzy and Particle swarm optimization (F-PSO) is utilized to determine a secure path. Then a cryptographic technique using the Learning with Errors over Rings (R-LWE) encryption scheme is adopted for data encryption. The trust value of every node in the network is calculated using trustworthiness analysis. Then based on the trust value, the malicious nodes are segregated. After that, the characteristics of secure nodes are utilized to find the secure path between source and destination. The secure path is selected optimally using F-PSO. After finding the secure path, the data are encrypted using the R-LWE technique. The proposed system attained a throughput of 96% with less than 0.1 ms delay. An enhanced trust-based secure routing and message delivery protocol attained better performance than existing such as Advanced Encryption Standard, Tiny Encryption Algorithm, eXtended TEA, and Rivest–Shamir–Adleman encryption schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21

Similar content being viewed by others

Data availability

If all data, models and code generated or used during the study appear in the submitted article and no data needs to be specifically requested.

Code availability

No code is available for this manuscript.

Abbreviations

ACO:

Ant colony optimization

AES:

Advanced encryption standard

AODV:

Ad hoc On-Demand Distance Vector

BCO:

Bee colony optimization

BS:

Base station

CH:

Cluster head

CSO:

Cuckoo search optimization

FA:

Firefly algorithm

F-PSO:

Fuzzy particle swarm optimization

IoT:

Internet of Things

MIoT:

Mobile Internet of Things

R-LWE:

Learning with errors over rings

RPL:

Routing Protocol for Low-power and Lossy Networks

RSA:

Rivest–Shamir–Adleman

SDN:

Software defined networking

SNR:

Signal-to-noise ratio

TEA:

Tiny Encryption Algorithm

XTEA:

eXtended TEA

References

  1. Sirajuddin M, Rupa C, Iwendi C, Biamba C (2021) TBSMR: A trust-based secure multipath routing protocol for enhancing the QoS of the mobile ad hoc network. Secur Commun Networks. https://doi.org/10.1155/2021/5521713

    Article  Google Scholar 

  2. Cheng CF, Srivastava G, Lin JCW, Lin YC (2021) Fault-tolerance mechanisms for software-defined internet of vehicles. IEEE Trans Intell Transp Syst 22(6):3859–3868. https://doi.org/10.1109/TITS.2020.3043729

    Article  Google Scholar 

  3. Karthick S, Sree Devi E, Nagarajan RV (2017) Trust-distrust protocol for the secure routing in wireless sensor networks. In: 2017 International Conference on Algorithms, Methodology, MODELS and Applications in Emerging Technologies (ICAMMAET), pp. 1–5. IEEE, 2017. https://doi.org/10.1109/ICAMMAET.2017.8186688

  4. Li X, Zheng Y, Khan WU, Zeng M, Li D, Ragesh GK, Li L (2021) Physical layer security of cognitive ambient backscatter communications for green Internet-of-Things. IEEE Trans Green Commun Network 5(3):1066–1076. https://doi.org/10.1109/TGCN.2021.3062060

    Article  Google Scholar 

  5. Amit Vijay K, Manoj Ranjan M (2022) Trust-based secure routing in IoT network based on rider foraging optimization algorithm. J High Speed Networks. https://doi.org/10.3233/JHS-220680

    Article  Google Scholar 

  6. Granjal J, Monteiro E, Silva (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutor 17(3):1294–1312. https://doi.org/10.1109/COMST.2015.2388550

    Article  Google Scholar 

  7. Cheng CF, Chen YC, Lin JCW (2020) A carrier-based sensor deployment algorithm for perception layer in the IoT architecture. IEEE Sens J 20(17):10295–10305. https://doi.org/10.1109/JSEN.2020.2989871

    Article  Google Scholar 

  8. Zhang J, Li G, Marshall A, Hu A, Hanzo L (2020) A new frontier for IoT security emerging from three decades of key generation relying on wireless channels. IEEE Access 8:138406–138446. https://doi.org/10.1109/ACCESS.2020.3012006

    Article  Google Scholar 

  9. Shao Y, Lin JCW, Srivastava G, Guo D, Zhang H, Yi H, Jolfaei A (2021) Multi-objective neural evolutionary algorithm for combinatorial optimization problems. IEEE Trans Neural Networks Learn Syst. https://doi.org/10.1109/TNNLS.2021.3105937

    Article  Google Scholar 

  10. Yi M, Xu X, Xu L (2019) An intelligent communication warning vulnerability detection algorithm based on IoT technology. IEEE Access 7:164803–164814. https://doi.org/10.1109/ACCESS.2019.2953075

    Article  Google Scholar 

  11. Noori D (2020) Shakeri H and Torshiz MN (2020) Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment. EURASIP J Inf Secur 1:1–11. https://doi.org/10.1186/s13635-020-00114-x

    Article  Google Scholar 

  12. Alamr AA, Kausar F, Kim J, Seo C (2018) A secure ECC-based RFID mutual authentication protocol for internet of things. J Supercomput 74(9):4281–4294. https://doi.org/10.1007/s11227-016-1861-1

    Article  Google Scholar 

  13. Ragesh GK, Baskaran K (2016) Cryptographically enforced data access control in personal health record systems. Procedia Technol 25:473–480. https://doi.org/10.1016/j.protcy.2016.08.134

    Article  Google Scholar 

  14. Sri RB, Karthikeyan S (2016) Secure Elliptic curve cryptography based RFID authentication schemes for internet of things. Indian J Sci Technol. https://doi.org/10.17485/ijst/2016/v9i42/104589

    Article  Google Scholar 

  15. Al Sibahee MA, Lu S, Abduljabbar ZA, Liu X, Abdalla HB, Hussain MA, Hussien ZA, Ghrabat MJJ (2020) Lightweight secure message delivery for E2E S2S communication in the IoT-cloud system. IEEE Access 8:218331–218347. https://doi.org/10.1109/ACCESS.2020.3041809

    Article  Google Scholar 

  16. Shin D, Sharma V, Kim J, Kwon S, You I (2017) Secure and efficient protocol for route optimization in PMIPv6-based smart home IoT networks. IEEE Access 5:11100–11117. https://doi.org/10.1109/ACCESS.2017.2710379

    Article  Google Scholar 

  17. Siboni S, Sachidananda V, Meidan Y, Bohadana M, Mathov Y, Bhairav S, Shabtai A, Elovici Y (2019) Security testbed for Internet-of-Things devices. IEEE Trans Reliab 68(1):23–44. https://doi.org/10.1109/TR.2018.2864536

    Article  Google Scholar 

  18. Zarca AM, Bernabe JB, Skarmeta A, Calero JMA (2020) Virtual IoT HoneyNets to mitigate cyberattacks in SDN/NFV-enabled IoT networks. IEEE J Sel Areas Commun 38(6):1262–1277. https://doi.org/10.1109/JSAC.2020.2986621

    Article  Google Scholar 

  19. Tewari A, Gupta BB (2020) An internet-of-things-based security scheme for healthcare environment for robust location privacy. Int J Comput Sci Eng 21(2):298–303. https://doi.org/10.1504/IJCSE.2020.105742

    Article  Google Scholar 

  20. Hamza R, Yan Z, Muhammad K, Bellavista P, Titouna F (2020) A privacy-preserving cryptosystem for IoT E-healthcare. Inf Sci 527:493–510. https://doi.org/10.1016/j.ins.2019.01.070

    Article  MathSciNet  MATH  Google Scholar 

  21. Djedjig N, Tandjaoui D, Medjek F, Romdhani I (2020) Trust-aware and cooperative routing protocol for IoT security. J Inform Secur Appl 52:102467. https://doi.org/10.1016/j.jisa.2020.102467

    Article  Google Scholar 

  22. Muzammal SM, Murugesan RK, Jhanjhi NZ (2021) Introducing mobility metrics in trust-based security of routing protocol for Internet of Things. In: 2021 National Computing Colleges Conference (NCCC), IEEE, 2021, 1–5. https://doi.org/10.1109/NCCC49330.2021.9428799

  23. Boudouaia MA, Ali-Pacha A, Abouaissa A, Lorenz P (2020) Security against rank attack in RPL protocol. IEEE Network 34(4):133–139. https://doi.org/10.1109/MNET.011.1900651

    Article  Google Scholar 

  24. Mabodi K, Yusefi M, Zandiyan S, Irankhah L, Fotohi R (2020) Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. J Supercomput. https://doi.org/10.1007/s11227-019-03137-5

    Article  Google Scholar 

  25. Rathee G, Sharma A, Kumar R, Ahmad F, Iqbal R (2020) A trust management scheme to secure mobile information centric networks. Comput Commun 151:66–75. https://doi.org/10.1016/j.comcom.2019.12.024

    Article  Google Scholar 

  26. Ragesh GK, Baskaran K (2017) Attribute set based encryption for user centric data security and privacy in cloud-assisted WBANs. In: International Information Institute (Tokyo). Information, 17(6): 2207

  27. Kumar A, Hariharan N (2020) DCRL-RPL: dual context-based routing and load balancing in RPL for IoT networks. IET Commun 14(12):1869–1882. https://doi.org/10.1049/iet-com.2020.0091

    Article  Google Scholar 

  28. Kumar A, Hariharan N (2020) Enhanced Mobility based content centric routing. In RPL for Low Power Lossy Networks in Internet of Vehicles. In: 2020 3rd International Conference on Intelligent Autonomous Systems (ICOIAS) 2020, February; 88–92, IEEE. https://doi.org/10.1109/ICoIAS49312.2020.9081846

  29. Tandon A, Srivastava P (2019) Trust-based enhanced secure routing against rank and sybil attacks in IoT. In: 2019 Twelfth International Conference on Contemporary Computing (IC3) 2019, August; 1–7, IEEE. https://doi.org/10.1109/IC3.2019.8844935

  30. Mukhedkar MM, Kolekar U (2019) Trust-based secure routing in mobile ad hoc network using hybrid optimization algorithm. Comput J 62(10):1528–1545. https://doi.org/10.1093/comjnl/bxz061

    Article  MathSciNet  Google Scholar 

  31. Agarkar AA, Agrawal H (2019) Lightweight R-LWE-based privacy preservation scheme for smart grid network. Int J Inf Comput Secur 11(3):233–254. https://doi.org/10.1504/IJICS.2019.099433

    Article  Google Scholar 

  32. Gul J, Mushtaq S, Riaz R (2012) Optimal guard node placement using SGLD and energy factor. J Comput 4:87–92

    Google Scholar 

  33. Gul MJ, Rehman A, Paul A, Rho S, Riaz R, Kim J (2020) Blockchain expansion to secure assets with fog node on special duty. Soft Comput 24(20):15209–15221. https://doi.org/10.1007/s00500-020-04857-0

    Article  Google Scholar 

Download references

Funding

There is no funding provided to prepare the manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. K. Ragesh.

Ethics declarations

Conflict of interest

The process of writing and the content of the article does not give grounds for raising the issue of a conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Consent to participate

I have read and I understand the provided information.

Consent to publication

This article does not contain any Image or video to get permission.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ragesh, G.K., Kumar, A. Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications. J Supercomput 79, 2882–2909 (2023). https://doi.org/10.1007/s11227-022-04766-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-022-04766-z

Keywords

Navigation