Skip to main content

Advertisement

Log in

An Efficient and Secure Data Forwarding Mechanism for Opportunistic IoT

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) is a heterogeneous network of interconnected things where users, smart devices and wireless technologies, collude for providing services. It is expected that a great deal of devices will get connected to the Internet in the near future. Opportunistic networks(OppNet) are a class of disruption tolerant networks characterized by uncertain topology and intermittent connectivity between the nodes. Opportunistic Internet of Things(OppIoT) is an amalgamation of the OppNet and IoT exploiting the communication between the IoT devices and the communities formed by humans. The data is exposed to a wide unfamiliar audience and the message delivery is dependent on the residual battery of the node, as most of the energy is spent on node discovery and message transmission. In such a scenario where a huge number of devices are accommodated, a scalable, adaptable, inter-operable, energy-efficient and secure network architecture is required. This paper proposes a novel defense mechanism against black hole and packet fabrication attacks for OppIoT, GFRSA, A Green Forwarding ratio and RSA (Rivest, Shamir and Adleman) based secure routing protocol. The selection of the next hop is based on node’s forwarding behavior, current energy level and its predicted message delivery probability. For further enhancing the security provided by the protocol, the messages are encrypted using asymmetric cryptography before transmission. Simulations performed using opportunistic network environment (ONE) simulator convey that GFRSA provides message security, saves energy and outperforms the existing protocols, LPRF-MC (Location Prediction-based Forwarding for Routing using Markov Chain) and RSASec (Asymmetric RSA-based security approach) in terms of correct packet delivery by 27.37%, message delivery probability is higher by 34.51%, number of messages dropped are reduced by 15.17% and the residual node energy is higher by 14.08%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805.

    Article  Google Scholar 

  2. Pelusi, L., Passarella, A., & Conti, M. (2006). Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks. IEEE Communications Magazine, 44(11), 134–141.

    Article  Google Scholar 

  3. Guo, B., Zhang, D., Wang, Z., Yu, Z., & Zhou, X. (2013). Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things. Journal of Network and Computer Applications, 36(6), 1531–1539.

    Article  Google Scholar 

  4. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in internet of things: The road ahead. Computer Networks, 76, 146–164.

    Article  Google Scholar 

  5. Shah, S. B., Chen, Z., Yin, F., Khan, I. U., & Ahmad, N. (2018). Energy and interoperable aware routing for throughput optimization in clustered IoT-wireless sensor networks. Future Generation Computer Systems, 81, 372–381.

    Article  Google Scholar 

  6. Wu, Y., Zhao, Y., Riguidel, M., Wang, G., & Yi, P. (2015). Security and trust management in opportunistic networks: A survey. Security and Communication Networks, 8(9), 1812–1827.

    Article  Google Scholar 

  7. Lin, X.-J., Sun, L., & Qu, H. (2018). An efficient RSA-based certificateless public key encryption scheme. Discrete Applied Mathematics, 241, 39–47.

    Article  MathSciNet  Google Scholar 

  8. Dhurandher, S. K., Borah, S. J., Woungang, I., Bansal, A., & Gupta, A. (2018). A location prediction-based routing scheme for opportunistic networks in an IoT scenario. Journal of Parallel and Distributed Computing, 118, 369–378.

    Article  Google Scholar 

  9. Pham, T. N. D., & Yeo, C. K. (2016). Detecting colluding blackhole and greyhole attacks in delay tolerant networks. IEEE Transactions on Mobile Computing, 15(5), 1116–1129.

    Article  Google Scholar 

  10. Wang, X., Ning, Z., Zhou, M., Hu, X., Wang, L., Hu, B., et al. (2018). A privacy-preserving message forwarding framework for opportunistic cloud of things. IEEE Internet of Things Journal, 5(6), 5281–5295.

    Article  Google Scholar 

  11. Krishna, M. B., & Lorenz, P. (2017). Delay aware secure hashing for opportunistic message forwarding in internet of things. In Globecom workshops (GC Wkshps) (pp. 1–6). IEEE.

  12. Dhurandher, S. K., Kumar, A., & Obaidat, M. S. (2017). Cryptography-based misbehavior detection and trust control mechanism for opportunistic network systems. IEEE Systems Journal, 12(4), 3191–3202.

    Article  Google Scholar 

  13. Kandhoul, N., & Dhurandher, S. K. (2019). An asymmetric RSA based security approach for opportunistic IoT. In WIDECOM 2019 (pp. 47–60). Milan: Springer. https://doi.org/10.1007/978-3-030-11437-4_5.

  14. Chen, R., Guo, J., & Bao, F. (2016). Trust management for SOA-based iot and its application to service composition. IEEE Transactions on Services Computing, 9(3), 482–495.

    Article  Google Scholar 

  15. Dhurandher, S. K., Woungang, I., Arora, J., & Gupta, H. (2016). History-based secure routing protocol to detect blackhole and greyhole attacks in opportunistic networks. Recent Advances in Communications and Networking Technology (Formerly Recent Patents on Telecommunication), 5(2), 73–89.

    Google Scholar 

  16. Vashishth, V., Chhabra, A., & Sharma, D. K. (2019). GMMR: A gaussian mixture model based unsupervised machine learning approach for optimal routing in opportunistic IoT networks. Computer Communications, 134, 138–148. https://doi.org/10.1016/j.comcom.2018.12.001.

    Article  Google Scholar 

  17. RSA algorithm. (2019). Retrieved February 2, 2019, from https://www.rsa.com/.

  18. Miller–Rabin primality test. (2019). Retrieved February 14, 2019, from https://en.wikipedia.org/wiki/Miller.

  19. Jeon, I.-K., & Lee, K.-W. (2016). A dynamic Markov chain prediction model for delay-tolerant networks. International Journal of Distributed Sensor Networks, 12(9), 1550147716666662.

    Article  Google Scholar 

  20. Keränen, A., Ott, J., & Kärkkäinen, T. (2009). The one simulator for DTN protocol evaluation. In Proceedings of the 2nd international conference on simulation tools and techniques, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (pp. 1–10). https://doi.org/10.4108/ICST.SIMUTOOLS2009.5674.

  21. Crawdad haggle dataset cambridge. (2019). Retrieved February 20, 2019, from https://crawdad.org/uoi/haggle/20160828/one.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nisha Kandhoul.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kandhoul, N., Dhurandher, S.K. An Efficient and Secure Data Forwarding Mechanism for Opportunistic IoT. Wireless Pers Commun 118, 217–237 (2021). https://doi.org/10.1007/s11277-020-08010-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-08010-w

Keywords

Navigation