Abstract
Internet of Things (IoT) is a heterogeneous network of interconnected things where users, smart devices and wireless technologies, collude for providing services. It is expected that a great deal of devices will get connected to the Internet in the near future. Opportunistic networks(OppNet) are a class of disruption tolerant networks characterized by uncertain topology and intermittent connectivity between the nodes. Opportunistic Internet of Things(OppIoT) is an amalgamation of the OppNet and IoT exploiting the communication between the IoT devices and the communities formed by humans. The data is exposed to a wide unfamiliar audience and the message delivery is dependent on the residual battery of the node, as most of the energy is spent on node discovery and message transmission. In such a scenario where a huge number of devices are accommodated, a scalable, adaptable, inter-operable, energy-efficient and secure network architecture is required. This paper proposes a novel defense mechanism against black hole and packet fabrication attacks for OppIoT, GFRSA, A Green Forwarding ratio and RSA (Rivest, Shamir and Adleman) based secure routing protocol. The selection of the next hop is based on node’s forwarding behavior, current energy level and its predicted message delivery probability. For further enhancing the security provided by the protocol, the messages are encrypted using asymmetric cryptography before transmission. Simulations performed using opportunistic network environment (ONE) simulator convey that GFRSA provides message security, saves energy and outperforms the existing protocols, LPRF-MC (Location Prediction-based Forwarding for Routing using Markov Chain) and RSASec (Asymmetric RSA-based security approach) in terms of correct packet delivery by 27.37%, message delivery probability is higher by 34.51%, number of messages dropped are reduced by 15.17% and the residual node energy is higher by 14.08%.
Similar content being viewed by others
References
Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805.
Pelusi, L., Passarella, A., & Conti, M. (2006). Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks. IEEE Communications Magazine, 44(11), 134–141.
Guo, B., Zhang, D., Wang, Z., Yu, Z., & Zhou, X. (2013). Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things. Journal of Network and Computer Applications, 36(6), 1531–1539.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in internet of things: The road ahead. Computer Networks, 76, 146–164.
Shah, S. B., Chen, Z., Yin, F., Khan, I. U., & Ahmad, N. (2018). Energy and interoperable aware routing for throughput optimization in clustered IoT-wireless sensor networks. Future Generation Computer Systems, 81, 372–381.
Wu, Y., Zhao, Y., Riguidel, M., Wang, G., & Yi, P. (2015). Security and trust management in opportunistic networks: A survey. Security and Communication Networks, 8(9), 1812–1827.
Lin, X.-J., Sun, L., & Qu, H. (2018). An efficient RSA-based certificateless public key encryption scheme. Discrete Applied Mathematics, 241, 39–47.
Dhurandher, S. K., Borah, S. J., Woungang, I., Bansal, A., & Gupta, A. (2018). A location prediction-based routing scheme for opportunistic networks in an IoT scenario. Journal of Parallel and Distributed Computing, 118, 369–378.
Pham, T. N. D., & Yeo, C. K. (2016). Detecting colluding blackhole and greyhole attacks in delay tolerant networks. IEEE Transactions on Mobile Computing, 15(5), 1116–1129.
Wang, X., Ning, Z., Zhou, M., Hu, X., Wang, L., Hu, B., et al. (2018). A privacy-preserving message forwarding framework for opportunistic cloud of things. IEEE Internet of Things Journal, 5(6), 5281–5295.
Krishna, M. B., & Lorenz, P. (2017). Delay aware secure hashing for opportunistic message forwarding in internet of things. In Globecom workshops (GC Wkshps) (pp. 1–6). IEEE.
Dhurandher, S. K., Kumar, A., & Obaidat, M. S. (2017). Cryptography-based misbehavior detection and trust control mechanism for opportunistic network systems. IEEE Systems Journal, 12(4), 3191–3202.
Kandhoul, N., & Dhurandher, S. K. (2019). An asymmetric RSA based security approach for opportunistic IoT. In WIDECOM 2019 (pp. 47–60). Milan: Springer. https://doi.org/10.1007/978-3-030-11437-4_5.
Chen, R., Guo, J., & Bao, F. (2016). Trust management for SOA-based iot and its application to service composition. IEEE Transactions on Services Computing, 9(3), 482–495.
Dhurandher, S. K., Woungang, I., Arora, J., & Gupta, H. (2016). History-based secure routing protocol to detect blackhole and greyhole attacks in opportunistic networks. Recent Advances in Communications and Networking Technology (Formerly Recent Patents on Telecommunication), 5(2), 73–89.
Vashishth, V., Chhabra, A., & Sharma, D. K. (2019). GMMR: A gaussian mixture model based unsupervised machine learning approach for optimal routing in opportunistic IoT networks. Computer Communications, 134, 138–148. https://doi.org/10.1016/j.comcom.2018.12.001.
RSA algorithm. (2019). Retrieved February 2, 2019, from https://www.rsa.com/.
Miller–Rabin primality test. (2019). Retrieved February 14, 2019, from https://en.wikipedia.org/wiki/Miller.
Jeon, I.-K., & Lee, K.-W. (2016). A dynamic Markov chain prediction model for delay-tolerant networks. International Journal of Distributed Sensor Networks, 12(9), 1550147716666662.
Keränen, A., Ott, J., & Kärkkäinen, T. (2009). The one simulator for DTN protocol evaluation. In Proceedings of the 2nd international conference on simulation tools and techniques, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (pp. 1–10). https://doi.org/10.4108/ICST.SIMUTOOLS2009.5674.
Crawdad haggle dataset cambridge. (2019). Retrieved February 20, 2019, from https://crawdad.org/uoi/haggle/20160828/one.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kandhoul, N., Dhurandher, S.K. An Efficient and Secure Data Forwarding Mechanism for Opportunistic IoT. Wireless Pers Commun 118, 217–237 (2021). https://doi.org/10.1007/s11277-020-08010-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-08010-w