Skip to main content

Advertisement

Log in

A trusted routing mechanism for multi-attribute chain energy optimization for Industrial Internet of Things

  • S.I.: Technologies of the 4th Industrial Revolution with applications
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

With the improvement of network transmission level and hardware storage and computing capacity, the Internet of Things (IoT) has been rapidly developed, and its application has attracted extensive attention. As an innovative application of Internet of Things technology in the field of industrial automation production, the Industrial Internet of Things includes technologies such as edge computing, big data analysis and intelligent sensing, which greatly improves production efficiency and reduces management costs. At present, Industrial Internet of Things (IIoT) has become the key competitiveness of the country. However, the heterogeneity of equipment, the limitation of resources and the low security of data have greatly hindered the development of IIoT. Therefore, in terms of ensuring efficient energy utilization, a trusted relay routing mechanism for optimizing chain performance based on multi-attribute comprehensive evaluation for the IIoT is proposed. It is an improvement of the low-energy adaptive clustering hierarchy (LEACH) algorithm (a cluster routing protocol that is mainly used in WSN) to improve the network's data security transmission, energy efficiency and load balancing characteristics.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

The data used in this study are available from the author upon request.

References

  1. Liang C, Feng Li, Baoquan R (2021) A survey of software-defined IoT research. Electron J 49(5):14

    Google Scholar 

  2. Alnasser A, Sun H, Jiang J (2019) Recommendation-based trust model for vehicle-to-everything (V2X)[J]. IEEE Int Things J 7(1):440–450

    Article  Google Scholar 

  3. Al-Fuqaha A, Guizani M, Mohammadi M et al (2015) Internet of things: A survey on enabling technologies, protocols, and applications[J]. IEEE Commun. Surveys Tutorials 17(4):2347–2376

    Article  Google Scholar 

  4. Qin D, Shuang J, Ma J et al (2016) Research on Trust Sensing Based Secure Routing Mechanism for Wireless Sensor Networks. Springer, Singapore

    Google Scholar 

  5. Ahmed A, Bakar KA, Channa MI, Khan AW (2016) A secure routing protocol with trust and energy awareness for wireless sensor network. Mob Netw Appl 21(2):272–285

    Article  Google Scholar 

  6. Stavrou E, Pitsillides A (2010) A survey on secure multipath routing protocols in wsns. Comput Netw 54(13):2215–2238. https://doi.org/10.1016/j.comnet.2010.02.015

    Article  MATH  Google Scholar 

  7. Yassen M. B, ljawaerneh S. A, and Abdulraziq R (2016) Secure low energy adaptive clustering hierarchal based on internet of things for wireless sensor network (wsn): Survey, in Engineering & MIS (ICEMIS),International Conference on. IEEE,:1-9.

  8. Li X, Zhou F, Du J (2013) Ldts: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans Inf Forensics Secur. 8(6):924–935

    Article  Google Scholar 

  9. Liu L, Chen L, Jia H (2016) Social milieu oriented routing: a new dimension to enhance network security in wsns. Sensors 16(2):247

    Article  Google Scholar 

  10. Yousefpour A, Fung C, Nguyen T et al (2018) All One Needs to Know about Fog Computing and Related Edge Computing Paradigms: A Complete Survey. J Syst Arch 98:289

    Article  Google Scholar 

  11. Jiang J, Han G, Wang F, Shu L, Guizani M (2015) An efficient distributed trust model for wireless sensor networks. IEEE Trans Parallel Distrib Syst 26(5):1228–1237

    Article  Google Scholar 

  12. Liu G, Wang X, Li X, et al (2018) ESRQ: An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning//:149-155

  13. Sun X, Ansari N (2016) Edge IoT: Mobile edge computing for the Internet of Things. IEEE Commun. Mag. 54(2):22–29

    Article  Google Scholar 

  14. Shi Q, Qin L, Ding Y, et al (2020) Information-aware secure routing in wireless sensor networks. Sensors (Basel, Switzerland), 20(1).

  15. Li X, Wang MM, Wang HZ et al (2019) Toward secure and efficient communication for the internet of things[J]. IEEE/ACM Trans Netw. 27(2):621–634

    Article  Google Scholar 

  16. Huimin W, Ling X, Jingwen D et al (2020) Data secure transmission scheme for the internet of things environment. Comput Appl Res (S01):3

  17. Han GJ, Wang H, Miao X et al (2020) A dynamic multipath scheme for protecting source-location privacy using multiple sinks in WSNs intended for IIo T[J]. IEEE Trans Industr Inf 16(8):5527–5538

    Article  Google Scholar 

  18. Heinzelma , A. Chandrakasan and H. Balakrishnan (2000) "Energy-efficient communication protocol for wireless microsensor networks, Proc. 33rd Hawaii Int'l. Conf. Sys. Sci.,

  19. Nayebi A, Sarbazi-Azad H (2011) Performance modeling of the LEACH protocol for mobile wireless sensor networks. J Parallel Distrib Comput 71(6):812–821

    Article  MATH  Google Scholar 

  20. Lu J (2021) Research on the security and energy-saving routing strategy of wireless ad hoc network based on geographical location. ".

  21. Liang J, Zhang M, Leung VC (2020) A reliable trust computing mechanism based on multisource feedback and fog computing in social sensor cloud[J]. IEEE Int. Things J 7(6):5481–5490

    Article  Google Scholar 

  22. Quan Z, Xiaodong Z (2008) Routing of the trusted sensor network based on the cluster head node [J]. Sensors Microsyst. 27(10):4

    Google Scholar 

  23. Cui Z, Cao Y, Cai X et al (2018) Optimal LEACH protocol with modified bat algorithm for big data sensing systems in Internet of Things[J]. J. Parallel Distrib. Comput. 132:217–229

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xue Liao.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, B., Liao, X. A trusted routing mechanism for multi-attribute chain energy optimization for Industrial Internet of Things. Neural Comput & Applic 35, 21349–21359 (2023). https://doi.org/10.1007/s00521-023-08215-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-023-08215-7

Keywords

Navigation