Abstract
With the improvement of network transmission level and hardware storage and computing capacity, the Internet of Things (IoT) has been rapidly developed, and its application has attracted extensive attention. As an innovative application of Internet of Things technology in the field of industrial automation production, the Industrial Internet of Things includes technologies such as edge computing, big data analysis and intelligent sensing, which greatly improves production efficiency and reduces management costs. At present, Industrial Internet of Things (IIoT) has become the key competitiveness of the country. However, the heterogeneity of equipment, the limitation of resources and the low security of data have greatly hindered the development of IIoT. Therefore, in terms of ensuring efficient energy utilization, a trusted relay routing mechanism for optimizing chain performance based on multi-attribute comprehensive evaluation for the IIoT is proposed. It is an improvement of the low-energy adaptive clustering hierarchy (LEACH) algorithm (a cluster routing protocol that is mainly used in WSN) to improve the network's data security transmission, energy efficiency and load balancing characteristics.
Similar content being viewed by others
Data availability
The data used in this study are available from the author upon request.
References
Liang C, Feng Li, Baoquan R (2021) A survey of software-defined IoT research. Electron J 49(5):14
Alnasser A, Sun H, Jiang J (2019) Recommendation-based trust model for vehicle-to-everything (V2X)[J]. IEEE Int Things J 7(1):440–450
Al-Fuqaha A, Guizani M, Mohammadi M et al (2015) Internet of things: A survey on enabling technologies, protocols, and applications[J]. IEEE Commun. Surveys Tutorials 17(4):2347–2376
Qin D, Shuang J, Ma J et al (2016) Research on Trust Sensing Based Secure Routing Mechanism for Wireless Sensor Networks. Springer, Singapore
Ahmed A, Bakar KA, Channa MI, Khan AW (2016) A secure routing protocol with trust and energy awareness for wireless sensor network. Mob Netw Appl 21(2):272–285
Stavrou E, Pitsillides A (2010) A survey on secure multipath routing protocols in wsns. Comput Netw 54(13):2215–2238. https://doi.org/10.1016/j.comnet.2010.02.015
Yassen M. B, ljawaerneh S. A, and Abdulraziq R (2016) Secure low energy adaptive clustering hierarchal based on internet of things for wireless sensor network (wsn): Survey, in Engineering & MIS (ICEMIS),International Conference on. IEEE,:1-9.
Li X, Zhou F, Du J (2013) Ldts: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans Inf Forensics Secur. 8(6):924–935
Liu L, Chen L, Jia H (2016) Social milieu oriented routing: a new dimension to enhance network security in wsns. Sensors 16(2):247
Yousefpour A, Fung C, Nguyen T et al (2018) All One Needs to Know about Fog Computing and Related Edge Computing Paradigms: A Complete Survey. J Syst Arch 98:289
Jiang J, Han G, Wang F, Shu L, Guizani M (2015) An efficient distributed trust model for wireless sensor networks. IEEE Trans Parallel Distrib Syst 26(5):1228–1237
Liu G, Wang X, Li X, et al (2018) ESRQ: An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning//:149-155
Sun X, Ansari N (2016) Edge IoT: Mobile edge computing for the Internet of Things. IEEE Commun. Mag. 54(2):22–29
Shi Q, Qin L, Ding Y, et al (2020) Information-aware secure routing in wireless sensor networks. Sensors (Basel, Switzerland), 20(1).
Li X, Wang MM, Wang HZ et al (2019) Toward secure and efficient communication for the internet of things[J]. IEEE/ACM Trans Netw. 27(2):621–634
Huimin W, Ling X, Jingwen D et al (2020) Data secure transmission scheme for the internet of things environment. Comput Appl Res (S01):3
Han GJ, Wang H, Miao X et al (2020) A dynamic multipath scheme for protecting source-location privacy using multiple sinks in WSNs intended for IIo T[J]. IEEE Trans Industr Inf 16(8):5527–5538
Heinzelma , A. Chandrakasan and H. Balakrishnan (2000) "Energy-efficient communication protocol for wireless microsensor networks, Proc. 33rd Hawaii Int'l. Conf. Sys. Sci.,
Nayebi A, Sarbazi-Azad H (2011) Performance modeling of the LEACH protocol for mobile wireless sensor networks. J Parallel Distrib Comput 71(6):812–821
Lu J (2021) Research on the security and energy-saving routing strategy of wireless ad hoc network based on geographical location. ".
Liang J, Zhang M, Leung VC (2020) A reliable trust computing mechanism based on multisource feedback and fog computing in social sensor cloud[J]. IEEE Int. Things J 7(6):5481–5490
Quan Z, Xiaodong Z (2008) Routing of the trusted sensor network based on the cluster head node [J]. Sensors Microsyst. 27(10):4
Cui Z, Cao Y, Cai X et al (2018) Optimal LEACH protocol with modified bat algorithm for big data sensing systems in Internet of Things[J]. J. Parallel Distrib. Comput. 132:217–229
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Wang, B., Liao, X. A trusted routing mechanism for multi-attribute chain energy optimization for Industrial Internet of Things. Neural Comput & Applic 35, 21349–21359 (2023). https://doi.org/10.1007/s00521-023-08215-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-023-08215-7