Abstract
Internet of Things (IoT) has a wide concentration in today’s technological world. It has a significant impact on smart infrastructure with a security vision. So, IoT devices with sensors or smart gadgets are used to gather important data. The data gathered from IoT are vulnerable to signal processing attacks due to the interconnection of different network categories. In this paper, a system for securing data in IoT communication is proposed. The proposed system includes two techniques. Initially, a technique with the combination of Fuzzy and Particle swarm optimization (F-PSO) is utilized to determine a secure path. Then a cryptographic technique using the Learning with Errors over Rings (R-LWE) encryption scheme is adopted for data encryption. The trust value of every node in the network is calculated using trustworthiness analysis. Then based on the trust value, the malicious nodes are segregated. After that, the characteristics of secure nodes are utilized to find the secure path between source and destination. The secure path is selected optimally using F-PSO. After finding the secure path, the data are encrypted using the R-LWE technique. The proposed system attained a throughput of 96% with less than 0.1 ms delay. An enhanced trust-based secure routing and message delivery protocol attained better performance than existing such as Advanced Encryption Standard, Tiny Encryption Algorithm, eXtended TEA, and Rivest–Shamir–Adleman encryption schemes.
Similar content being viewed by others
Data availability
If all data, models and code generated or used during the study appear in the submitted article and no data needs to be specifically requested.
Code availability
No code is available for this manuscript.
Abbreviations
- ACO:
-
Ant colony optimization
- AES:
-
Advanced encryption standard
- AODV:
-
Ad hoc On-Demand Distance Vector
- BCO:
-
Bee colony optimization
- BS:
-
Base station
- CH:
-
Cluster head
- CSO:
-
Cuckoo search optimization
- FA:
-
Firefly algorithm
- F-PSO:
-
Fuzzy particle swarm optimization
- IoT:
-
Internet of Things
- MIoT:
-
Mobile Internet of Things
- R-LWE:
-
Learning with errors over rings
- RPL:
-
Routing Protocol for Low-power and Lossy Networks
- RSA:
-
Rivest–Shamir–Adleman
- SDN:
-
Software defined networking
- SNR:
-
Signal-to-noise ratio
- TEA:
-
Tiny Encryption Algorithm
- XTEA:
-
eXtended TEA
References
Sirajuddin M, Rupa C, Iwendi C, Biamba C (2021) TBSMR: A trust-based secure multipath routing protocol for enhancing the QoS of the mobile ad hoc network. Secur Commun Networks. https://doi.org/10.1155/2021/5521713
Cheng CF, Srivastava G, Lin JCW, Lin YC (2021) Fault-tolerance mechanisms for software-defined internet of vehicles. IEEE Trans Intell Transp Syst 22(6):3859–3868. https://doi.org/10.1109/TITS.2020.3043729
Karthick S, Sree Devi E, Nagarajan RV (2017) Trust-distrust protocol for the secure routing in wireless sensor networks. In: 2017 International Conference on Algorithms, Methodology, MODELS and Applications in Emerging Technologies (ICAMMAET), pp. 1–5. IEEE, 2017. https://doi.org/10.1109/ICAMMAET.2017.8186688
Li X, Zheng Y, Khan WU, Zeng M, Li D, Ragesh GK, Li L (2021) Physical layer security of cognitive ambient backscatter communications for green Internet-of-Things. IEEE Trans Green Commun Network 5(3):1066–1076. https://doi.org/10.1109/TGCN.2021.3062060
Amit Vijay K, Manoj Ranjan M (2022) Trust-based secure routing in IoT network based on rider foraging optimization algorithm. J High Speed Networks. https://doi.org/10.3233/JHS-220680
Granjal J, Monteiro E, Silva (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutor 17(3):1294–1312. https://doi.org/10.1109/COMST.2015.2388550
Cheng CF, Chen YC, Lin JCW (2020) A carrier-based sensor deployment algorithm for perception layer in the IoT architecture. IEEE Sens J 20(17):10295–10305. https://doi.org/10.1109/JSEN.2020.2989871
Zhang J, Li G, Marshall A, Hu A, Hanzo L (2020) A new frontier for IoT security emerging from three decades of key generation relying on wireless channels. IEEE Access 8:138406–138446. https://doi.org/10.1109/ACCESS.2020.3012006
Shao Y, Lin JCW, Srivastava G, Guo D, Zhang H, Yi H, Jolfaei A (2021) Multi-objective neural evolutionary algorithm for combinatorial optimization problems. IEEE Trans Neural Networks Learn Syst. https://doi.org/10.1109/TNNLS.2021.3105937
Yi M, Xu X, Xu L (2019) An intelligent communication warning vulnerability detection algorithm based on IoT technology. IEEE Access 7:164803–164814. https://doi.org/10.1109/ACCESS.2019.2953075
Noori D (2020) Shakeri H and Torshiz MN (2020) Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment. EURASIP J Inf Secur 1:1–11. https://doi.org/10.1186/s13635-020-00114-x
Alamr AA, Kausar F, Kim J, Seo C (2018) A secure ECC-based RFID mutual authentication protocol for internet of things. J Supercomput 74(9):4281–4294. https://doi.org/10.1007/s11227-016-1861-1
Ragesh GK, Baskaran K (2016) Cryptographically enforced data access control in personal health record systems. Procedia Technol 25:473–480. https://doi.org/10.1016/j.protcy.2016.08.134
Sri RB, Karthikeyan S (2016) Secure Elliptic curve cryptography based RFID authentication schemes for internet of things. Indian J Sci Technol. https://doi.org/10.17485/ijst/2016/v9i42/104589
Al Sibahee MA, Lu S, Abduljabbar ZA, Liu X, Abdalla HB, Hussain MA, Hussien ZA, Ghrabat MJJ (2020) Lightweight secure message delivery for E2E S2S communication in the IoT-cloud system. IEEE Access 8:218331–218347. https://doi.org/10.1109/ACCESS.2020.3041809
Shin D, Sharma V, Kim J, Kwon S, You I (2017) Secure and efficient protocol for route optimization in PMIPv6-based smart home IoT networks. IEEE Access 5:11100–11117. https://doi.org/10.1109/ACCESS.2017.2710379
Siboni S, Sachidananda V, Meidan Y, Bohadana M, Mathov Y, Bhairav S, Shabtai A, Elovici Y (2019) Security testbed for Internet-of-Things devices. IEEE Trans Reliab 68(1):23–44. https://doi.org/10.1109/TR.2018.2864536
Zarca AM, Bernabe JB, Skarmeta A, Calero JMA (2020) Virtual IoT HoneyNets to mitigate cyberattacks in SDN/NFV-enabled IoT networks. IEEE J Sel Areas Commun 38(6):1262–1277. https://doi.org/10.1109/JSAC.2020.2986621
Tewari A, Gupta BB (2020) An internet-of-things-based security scheme for healthcare environment for robust location privacy. Int J Comput Sci Eng 21(2):298–303. https://doi.org/10.1504/IJCSE.2020.105742
Hamza R, Yan Z, Muhammad K, Bellavista P, Titouna F (2020) A privacy-preserving cryptosystem for IoT E-healthcare. Inf Sci 527:493–510. https://doi.org/10.1016/j.ins.2019.01.070
Djedjig N, Tandjaoui D, Medjek F, Romdhani I (2020) Trust-aware and cooperative routing protocol for IoT security. J Inform Secur Appl 52:102467. https://doi.org/10.1016/j.jisa.2020.102467
Muzammal SM, Murugesan RK, Jhanjhi NZ (2021) Introducing mobility metrics in trust-based security of routing protocol for Internet of Things. In: 2021 National Computing Colleges Conference (NCCC), IEEE, 2021, 1–5. https://doi.org/10.1109/NCCC49330.2021.9428799
Boudouaia MA, Ali-Pacha A, Abouaissa A, Lorenz P (2020) Security against rank attack in RPL protocol. IEEE Network 34(4):133–139. https://doi.org/10.1109/MNET.011.1900651
Mabodi K, Yusefi M, Zandiyan S, Irankhah L, Fotohi R (2020) Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. J Supercomput. https://doi.org/10.1007/s11227-019-03137-5
Rathee G, Sharma A, Kumar R, Ahmad F, Iqbal R (2020) A trust management scheme to secure mobile information centric networks. Comput Commun 151:66–75. https://doi.org/10.1016/j.comcom.2019.12.024
Ragesh GK, Baskaran K (2017) Attribute set based encryption for user centric data security and privacy in cloud-assisted WBANs. In: International Information Institute (Tokyo). Information, 17(6): 2207
Kumar A, Hariharan N (2020) DCRL-RPL: dual context-based routing and load balancing in RPL for IoT networks. IET Commun 14(12):1869–1882. https://doi.org/10.1049/iet-com.2020.0091
Kumar A, Hariharan N (2020) Enhanced Mobility based content centric routing. In RPL for Low Power Lossy Networks in Internet of Vehicles. In: 2020 3rd International Conference on Intelligent Autonomous Systems (ICOIAS) 2020, February; 88–92, IEEE. https://doi.org/10.1109/ICoIAS49312.2020.9081846
Tandon A, Srivastava P (2019) Trust-based enhanced secure routing against rank and sybil attacks in IoT. In: 2019 Twelfth International Conference on Contemporary Computing (IC3) 2019, August; 1–7, IEEE. https://doi.org/10.1109/IC3.2019.8844935
Mukhedkar MM, Kolekar U (2019) Trust-based secure routing in mobile ad hoc network using hybrid optimization algorithm. Comput J 62(10):1528–1545. https://doi.org/10.1093/comjnl/bxz061
Agarkar AA, Agrawal H (2019) Lightweight R-LWE-based privacy preservation scheme for smart grid network. Int J Inf Comput Secur 11(3):233–254. https://doi.org/10.1504/IJICS.2019.099433
Gul J, Mushtaq S, Riaz R (2012) Optimal guard node placement using SGLD and energy factor. J Comput 4:87–92
Gul MJ, Rehman A, Paul A, Rho S, Riaz R, Kim J (2020) Blockchain expansion to secure assets with fog node on special duty. Soft Comput 24(20):15209–15221. https://doi.org/10.1007/s00500-020-04857-0
Funding
There is no funding provided to prepare the manuscript.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The process of writing and the content of the article does not give grounds for raising the issue of a conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Informed consent
Informed consent was obtained from all individual participants included in the study.
Consent to participate
I have read and I understand the provided information.
Consent to publication
This article does not contain any Image or video to get permission.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ragesh, G.K., Kumar, A. Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications. J Supercomput 79, 2882–2909 (2023). https://doi.org/10.1007/s11227-022-04766-z
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-022-04766-z