Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication


The internet of things (IoT) is able to provide a prediction of linked, universal, and smart nodes that have autonomous interaction when they present services. Because of wide openness, relatively high processing power, and wide distribution of IoT things, they are ideal for attacks of the gray hole. In the gray hole attack, the attacker fakes itself as the shortest path to the destination that is a thing here. This causes the routing packets not to reach the destination. The proposed method is based on the AODV routing protocol and is presented under the MTISS-IoT name which means for the reduction of gray hole attacks using check node information. In this paper, a hybrid approach is proposed based on cryptographic authentication. The proposed approach consists of four phases, such as the verifying node trust in the IoT, testing the routes, gray hole attack discovery, and the malicious attack elimination process in MTISS-IoT. The method is evaluated here via extensive simulations carried out in the NS-3 environment. The experimental results of four scenarios demonstrated that the MTISS-IoT method can achieve a false positive rate of 14.104%, a false negative rate of 17.49%, and a detection rate of 94.5% when gray hole attack was launched.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10


  1. 1.



  1. 1.

    Airehrour D, Gutierrez J, Ray SK (2016) Secure routing for internet of things: a survey. J Netw Comput Appl 66:198–213

  2. 2.

    Prabhakar A, Anjali T (2019) Gray hole attack as a Byzantine attack in a wireless multi-hop network. J Appl Secur Res. https://doi.org/10.1080/19361610.2019.1669988

  3. 3.

    Behzad S, Fotohi R, Dadgar F (2015) Defense against the attacks of the black hole, gray hole and wormhole in MANETs based on RTT and PFT. Int J Comput Sci and Netw Solut (IJCSNS) 3:89–103

  4. 4.

    Fotohi R (2020) Securing of unmanned aerial systems (UAS) against security threats using human immune system. Reliab Eng Syst Saf 193:106675

  5. 5.

    Bostani H, Sheikhan M (2017) Hybrid of anomaly-based and specification-based IDS for internet of things using unsupervised OPF based on MapReduce approach. Comput Commun 98:52–71

  6. 6.

    Sahay R, Geethakumari G, Mitra B, Thejas V (2018). Exponential smoothing based approach for detection of blackhole attacks in IoT. In: 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, pp 1–6

  7. 7.

    Hatzivasilis G, Papaefstathiou I, Manifavas C (2017) SCOTRES: secure routing for IoT and CPS. IEEE Intern Things J 4(6):2129–2141

  8. 8.

    Airehrour D, Gutierrez JA, Ray SK (2017) A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks. J Telecommun Digital Econ 5(1):50–69. https://doi.org/10.18080/jtde.v5n1.88

  9. 9.

    Raoof A, Matrawy A, Lung CH (2018) Routing attacks and mitigation methods for Rpl-based internet of things. IEEE Commun Surv Tutorials 21(2):1582–1606

  10. 10.

    Bhalaji N, Hariharasudan KS, Aashika K (2019) A trust based mechanism to combat blackhole attack in RPL protocol. In: International Conference on Intelligent Computing and Communication Technologies. Springer, Singapore pp 457–464

  11. 11.

    Patel HB, Jinwala DC (2019) Blackhole detection in 6LoWPAN based internet of things: an anomaly based approach. In: TENCON 2019-2019 IEEE Region 10 Conference (TENCON). IEEE, pp 947–954

  12. 12.

    Conti M, Kaliyar P, Rabbani MM, Ranise S (2018) SPLIT: a secure and scalable RPL routing protocol for internet of things. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp 1–8

  13. 13.

    Sicari S, Rizzardi A, Miorandi D, Coen-Porisini A (2018) REATO: REActing to denial of service attacks in the internet of things. Comput Netw 137:37–48

  14. 14.

    Yavuz FY, Ünal D, Gül E (2018) Deep learning for detection of routing attacks in the internet of things. Int J Comput Intell Syst 12(1):39–58

  15. 15.

    Qin T, Wang B, Chen R, Qin Z, Wang L (2019) IMLADS: intelligent maintenance and lightweight anomaly detection system for internet of things. Sensors 19(4):958

  16. 16.

    Jamali S, Fotohi R (2017) DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system. J Supercomput 73(12):5173–5196

  17. 17.

    Fotohi R, Firoozi Bari S, Yusefi M (2019) Securing wireless sensor networks against denial-of-sleep attacks using RSA cryptography algorithm and interlock protocol. Int J Commun Syst. https://doi.org/10.1002/dac.4234

  18. 18.

    Sarkohaki F, Fotohi R, Ashrafian V (2017) An efficient routing protocol in mobile ad-hoc networks by using artificial immune system. Int J Adv Comput Sci Appl (IJACSA) 8(4):554–561

  19. 19.

    Alcaraz C (2019) Security and privacy trends in the industrial internet of things. Springer, Berlin

  20. 20.

    Fotohi R, Ebazadeh Y, Geshlag MS (2016) A new approach for improvement security against DoS attacks in vehicular ad-hoc network. Int J Adv Comput Sci Appl 7(7):10–16

  21. 21.

    Rathee G, Sharma A, Kumar R, Iqbal R (2019) A secure communicating things network framework for industrial IoT using blockchain technology. Ad Hoc Netw 94:101933

  22. 22.

    Behzad S, Fotohi R, Balov JH, Rabipour MJ (2018) An artificial immune based approach for detection and isolation misbehavior attacks in wireless networks. JCP 13(6):705–720

  23. 23.

    Zhang J, Rajendran S, Sun Z, Woods R, Hanzo L (2019) Physical layer security for the internet of things: authentication and key generation. IEEE Wirel Commun 26(5):92–98. https://doi.org/10.1109/MWC.2019.1800455

  24. 24.

    Fotohi R, Jamali S (2014) A comprehensive study on defence against wormhole attack methods in mobile ad hoc networks. Int J Comput Sci Netw Solut 2:37–56

  25. 25.

    Butun I, Österberg P, Song H (2019) Security of the internet of things: vulnerabilities, attacks and countermeasures. IEEE Commun Surv Tutor. https://doi.org/10.1109/COMST.2019.2953364

  26. 26.

    Zandiyan S, Fotohi R, Koravand M (2016) P-method: improving AODV routing protocol for against network layer attacks in mobile Ad-Hoc networks. Int J Comput Sci Inf Secur 14(6):95

  27. 27.

    Fotohi R, Heydari R, Jamali S (2016) A Hybrid routing method for mobile ad-hoc networks. J Adv Comput Res 7(3):93–103

  28. 28.

    Xia J, Xu Y, Deng D, Zhou Q, Fan L (2019) Intelligent secure communication for internet of things with statistical channel state information of attacker. IEEE Access 7:144481–144488

  29. 29.

    Fotohi R, Jamali S, Sarkohaki F, Behzad S (2013) An Improvement over AODV routing protocol by limiting visited hop count. Int J Inf Technol Comput Sci (IJITCS) 5(9):87–93

  30. 30.

    Jamali S, Fotohi R (2016) Defending against wormhole attack in MANET using an artificial immune system. New Rev Inf Netw 21(2):79–100

  31. 31.

    Zhang T, Zhang T, Ji X, Xu W (2019) Cuckoo-RPL: cuckoo filter based RPL for defending AMI network from blackhole attacks. In: 2019 Chinese Control Conference (CCC). IEEE, pp 8920–8925

  32. 32.

    Behzad S, Fotohi R, Jamali S (2013) Improvement over the OLSR routing protocol in mobile ad hoc networks by eliminating the unnecessary loops. Int J Inf Technol Comput Sci (IJITCS) 5(6):2013

  33. 33.

    Kandhoul N, Dhurandher SK, Woungang I (2019) T_CAFE: a trust based security approach for opportunistic IoT. IET Commun

  34. 34.

    Jamali S, Fotohi R, Analoui M (2018) An artificial immune system based method for defense against wormhole attack in mobile adhoc networks. Tabriz J Electr Eng 47(4):1407–1419

  35. 35.

    Sani AS, Yuan D, Jin J, Gao L, Yu S, Dong ZY (2019) Cyber security framework for internet of things-based energy internet. Future Gener Comput Syst 93:849–859

Download references

Author information

Correspondence to Reza Fotohi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Mabodi, K., Yusefi, M., Zandiyan, S. et al. Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. J Supercomput (2020). https://doi.org/10.1007/s11227-019-03137-5

Download citation


  • Internet of things (IoT)
  • Gray hole attack
  • Multi-level trust
  • Cryptographic authentication