Skip to main content

Advertisement

Log in

Reliable data dissemination for the Internet of Things using Harris hawks optimization

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

A Publisher Correction to this article was published on 29 July 2020

This article has been updated

Abstract

Internet of Things (IoT) entities compile a massive volume of sensing data and transmit it to the cloud for processing and reasoning. Reliable and secure data aggregation and forwarding in IoT incorporates resource-constrained low-power and lossy devices that served diverse and sensitive applications with special obligations is a significant challenge for IoT. This paper proposes Reliable Data Dissemination for the Internet of Things Using Harris Hawks Optimization (RDDI) scheme, which is a secure data diffusion mechanism that accoutered a fuzzy hierarchical network model for Wireless Sensor Networks (WSN) based IoT. RDDI discloses attacks and monitors the behavior of nodes information exchange processes. Our scheme prowls to synthesize routing capabilities, energy-aware and geographic data circulation, and fuzzy clustering to provide a reliable, nature-inspired optimized routing called Harris Hawks Optimization (HHO) algorithm for IoT. The performance of RDDI, under five metrics of reliability, end-to-end delay, energy consumption, computational overhead as well as packet forwarding distance in multi-cluster scenarios, is evaluated with three comparative approaches. Findings of simulations reveal that RDDI achieves a reliable strategy and preferable achievement over the other three disposals.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Change history

  • 29 July 2020

    The Publisher would like to correct the introduced formatting errors and presentation of equation 4 and Table 2 in the original publication.

References

  1. J. Rifkin 2014 The zero marginal cost society: the internet of things, the collaborative commons, and the eclipse of capitalism. St. Martin’s Press

  2. A. Grau What is really needed to secure the Internet of Things? Icon Labs. https://www.iconlabs.com/prod/internet-secure-things-%E2%80%93-what-really-needed-secure-internet-things (Accessed 2014)

  3. A guide to the Internet of Things infographic. Intel. https://www.intel.com/content/www/us/en/internet-of-things/infographics/guide-to-iot.html (Accessed 2015)

  4. Al-Turjman F, Zahmatkesh H, Shahroze R (2019) An overview of security and privacy in smart cities’ IoT communications. Trans Emerg Telecommun Technol. https://doi.org/10.1002/ett.3677

  5. Al-Turjman F (2020) Intelligence and security in big 5G-oriented IoNT: an overview. Future Gener Comput Syst 102:357–368. https://doi.org/10.1016/j.future.2019.08.009

    Article  Google Scholar 

  6. Deebak B, Al-Turjman F (2020) A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Netw 97:102022. https://doi.org/10.1016/j.adhoc.2019.102022

  7. Zarpelao BB, Miani RS, Kawakani CT, de Alvarenga SC (2017) A survey of intrusion detection in Internet of Things. J Netw Comput Appl 84:25–37. https://doi.org/10.1016/j.jnca.2017.02.009

    Article  Google Scholar 

  8. Giaretta A, Balasubramaniam S, Conti M (2015) Security vulnerabilities and countermeasures for target localization in bio-nanothings communication networks. IEEE Trans Inf Forensics Secur 11(4):665–676. https://doi.org/10.1109/TIFS.2015.2505632

  9. M. Conti, A. Dehghantanha, K. Franke, and S. Watson 2018 Internet of Things security and forensics: challenges and opportunities. Elsevier

  10. Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: a top-down survey. Comput Netw 141:199–221. https://doi.org/10.1016/j.comnet.2018.03.012

    Article  Google Scholar 

  11. Airehrour D, Gutierrez J, Ray SK (2016) Secure routing for internet of things: a survey. J Netw Comput Appl 66:198–213. https://doi.org/10.1016/j.jnca.2016.03.006

    Article  Google Scholar 

  12. Yiğit B, Gür G, Alagöz F, Tellenbach B (2019) Cost-aware securing of IoT systems using attack graphs. Ad Hoc Netw 86:23–35. https://doi.org/10.1016/j.adhoc.2018.10.024

    Article  Google Scholar 

  13. Bu L, Isakov M, Kinsy MA (2019) A secure and robust scheme for sharing confidential information in IoT systems. Ad Hoc Netw 92:101762. https://doi.org/10.1016/j.adhoc.2018.09.007

    Article  Google Scholar 

  14. Čolaković A, Hadžialić M (2018) Internet of Things (IoT): a review of enabling technologies, challenges, and open research issues. Comput Netw 144:17–39. https://doi.org/10.1016/j.comnet.2018.07.017

    Article  Google Scholar 

  15. Ghaffari A (2017) Real-time routing algorithm for mobile ad hoc networks using reinforcement learning and heuristic algorithms. Wirel Netw 23(3):703–714. https://doi.org/10.1007/s11276-015-1180-0

    Article  Google Scholar 

  16. Dehkordi SA, Farajzadeh K, Rezazadeh J, Farahbakhsh R, Sandrasegaran K, Dehkordi MA (2019) A survey on data aggregation techniques in IoT sensor networks. Wirel Netw:1–21. https://doi.org/10.1007/s11276-019-02142-z

  17. Zakariayi S, Babaie S (2019) DEHCIC: a distributed energy-aware hexagon based clustering algorithm to improve coverage in wireless sensor networks. Peer-to-Peer Netw Appl 12(4):689–704. https://doi.org/10.1007/s12083-018-0666-9

    Article  Google Scholar 

  18. Khabiri M, Ghaffari A (2018) Energy-aware clustering-based routing in wireless sensor networks using cuckoo optimization algorithm. Wirel Pers Commun 98(3):2473–2495. https://doi.org/10.1007/s11277-017-4983-8

    Article  Google Scholar 

  19. Pourghebleh B, Navimipour NJ (2017) Data aggregation mechanisms in the Internet of things: a systematic review of the literature and recommendations for future research. J Netw Comput Appl 97:23–34. https://doi.org/10.1016/j.jnca.2017.08.006

    Article  Google Scholar 

  20. Parsavand H, Ghaffari A (2018) Controlling congestion in wireless sensor networks through imperialist competitive algorithm. Wirel Pers Commun 101(2):1123–1142. https://doi.org/10.1007/s11277-018-5752-z

    Article  Google Scholar 

  21. Shah SB, Chen Z, Yin F, Khan IU, Ahmad N (2018) Energy and interoperable aware routing for throughput optimization in clustered IoT-wireless sensor networks. Future Gener Comput Syst 81:372–381. https://doi.org/10.1016/j.future.2017.09.043

    Article  Google Scholar 

  22. Hayyolalam V, Kazem AAP (2020) Black widow optimization algorithm: a novel meta-heuristic approach for solving engineering optimization problems. Eng Appl Artif Intell 87:–103249. https://doi.org/10.1016/j.engappai.2019.103249

  23. Heidari AA, Mirjalili S, Faris H, Aljarah I, Mafarja M, Chen H (2019) Harris hawks optimization: algorithm and applications. Future Gener Comput Syst 97:849–872. https://doi.org/10.1016/j.future.2019.02.028

    Article  Google Scholar 

  24. Ghaffari A (2015) Congestion control mechanisms in wireless sensor networks: a survey. J Netw Comput Appl 52:101–115. https://doi.org/10.1016/j.jnca.2015.03.002

    Article  Google Scholar 

  25. Ahuja SP, Wheeler N (2020) Architecture of fog-enabled and cloud-enhanced internet of things applications. Int J Cloud Appl Comput (IJCAC) 10(1):1–10. https://doi.org/10.4018/IJCAC.2020010101

    Article  Google Scholar 

  26. M. Conti, P. Kaliyar, and C. Lal (2017) REMI: a reliable and secure multicast routing protocol for IoT networks. In: Proceedings of the 12th international conference on availability, reliability and security: ACM, p. 84, doi: https://doi.org/10.1145/3098954.3106070

  27. T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik, J.-P. Vasseur, and R. Alexander (2012) RFC 6550: RPL: IPv6 routing protocol for low-power and lossy networks. RFC pp. 1–157, doi: https://doi.org/10.17487/RFC6550

  28. A. Dunkels, B. Gronvall, and T. Voigt (2004) Contiki-a lightweight and flexible operating system for tiny networked sensors. In: 29th annual IEEE international conference on local computer networks, Tampa, FL, USA, USA: IEEE, pp. 455–462, doi: https://doi.org/10.1109/LCN.2004.38

  29. Lorente GG, Lemmens B, Carlier M, Braeken A, Steenhaut K (2017) BMRF: bidirectional multicast RPL forwarding. Ad Hoc Netw 54:69–84. https://doi.org/10.1016/j.adhoc.2016.10.004

    Article  Google Scholar 

  30. M. Conti, P. Kaliyar, M. M. Rabbani, and S. Ranise (2018) SPLIT: a secure and scalable RPL routing protocol for internet of things. In: 2018 14th international conference on wireless and mobile computing, networking and communications (WiMob): IEEE, pp. 1–8, doi: https://doi.org/10.1109/WiMOB.2018.8589115

  31. F. Österlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt (2006) Cross-level sensor network simulation with cooja. In: First IEEE international workshop on practical issues in building sensor network applications (SenseApp 2006), Tampa, FL, USA: IEEE, pp. 641–648, doi: https://doi.org/10.1109/LCN.2006.322172

  32. Lin J-W, Chelliah PR, Hsu M-C, Hou J-X (2019) Efficient fault-tolerant routing in IoT wireless sensor networks based on bipartite-flow graph modeling. IEEE Access 7:14022–14034. https://doi.org/10.1109/ACCESS.2019.2894002

    Article  Google Scholar 

  33. Maheswari PU, Ganeshbabu T (2019) Repetitive node categorization technique based reliable clustering and energy efficient communication in P2P wireless sensor network. Peer-to-Peer Netw Appl:1–12. https://doi.org/10.1007/s12083-019-00768-6

  34. Gupta R (2019) Resource provisioning and scheduling techniques of IoT based applications in fog computing. Int J Fog Comput (IJFC) 2(2):57–70. https://doi.org/10.4018/IJFC.2019070104

    Article  Google Scholar 

  35. Hussain MM, Beg MS (2019) Using vehicles as fog infrastructures for transportation cyber-physical systems (T-CPS): fog computing for vehicular networks. Int J Softw Sci Comput Intell (IJSSCI) 11(1):47–69. https://doi.org/10.4018/IJSSCI.2019010104

    Article  Google Scholar 

  36. Ullah A, Said G, Sher M, Ning H (2020) Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN. Peer-to-Peer Netw Appl 13(1):163–174. https://doi.org/10.1007/s12083-019-00745-z

    Article  Google Scholar 

  37. Ai Z-Y, Zhou Y-T, Song F (2018) A smart collaborative routing protocol for reliable data diffusion in IoT scenarios. Sensors 18(6):1926. https://doi.org/10.3390/s18061926

    Article  Google Scholar 

  38. Y. Yu, R. Govindan, and D. Estrin 2001 Geographical and energy aware routing: a recursive data dissemination protocol for wireless sensor networks. UCLA Computer Science Department Technical Report, pp. 1–11

  39. Najjar-Ghabel S, Yousefi S, Farzinvash L (2018) Reliable data gathering in the Internet of Things using artificial bee colony. Turk J Electr Eng Comput Sci 26(4):1710–1723. https://doi.org/10.3906/elk-1801-100

    Article  Google Scholar 

  40. Junior NF, Silva A, Guelfi A, Kofuji ST (2019) IoT6Sec: reliability model for Internet of Things security focused on anomalous measurements identification with energy analysis. Wirel Netw 25(4):1533–1556. https://doi.org/10.1007/s11276-017-1610-2

    Article  Google Scholar 

  41. Tewari A, Gupta B (2019) A novel ECC-based lightweight authentication protocol for internet of things devices. Int J High Perform Comput Netw 15(1–2):106–120. https://doi.org/10.1504/IJHPCN.2019.103548

    Article  Google Scholar 

  42. Li J, Li X, Cheng X, Yuan J, Zhang R (2019) A trustworthiness-enhanced reliable forwarding scheme in mobile Internet of Things. J Netw Comput Appl 140:40–53. https://doi.org/10.1016/j.jnca.2019.05.003

    Article  Google Scholar 

  43. Selvakumar R (2019) Reliable and secure data communication in wireless sensor networks using optimal locally recoverable codes. Peer-to-Peer Netw Appl:1–10. https://doi.org/10.1007/s12083-019-00809-0

  44. R. Blom (1984) An optimal class of symmetric key generation systems. In: Workshop on the theory and application of cryptographic techniques. Springer, pp. 335–338, doi: https://doi.org/10.1007/3-540-39757-4_22

  45. S. Kim, R. Fonseca, and D. Culler (2004) Reliable transfer on wireless sensor networks. In: 2004 first annual IEEE communications society conference on sensor and ad hoc communications and networks, 2004. IEEE SECON 2004. IEEE, pp. 449–459, doi: https://doi.org/10.1109/SAHCN.2004.1381947

  46. S. Ali, A. Fakoorian, and H. Taheri 2007 Optimum Reed-Solomon erasure coding in fault tolerant sensor networks. In: 2007 4th international symposium on wireless communication systems: IEEE pp. 6–10, doi: https://doi.org/10.1109/ISWCS.2007.4392291

  47. Bednarz JC (1988) Cooperative hunting Harris’ hawks (Parabuteo unicinctus). Science 239(4847):1525–1527. https://doi.org/10.1126/science.239.4847.1525

    Article  Google Scholar 

  48. Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun 1(4):660–670. https://doi.org/10.1109/TWC.2002.804190

    Article  Google Scholar 

  49. Pan M, Jiang J, Zhang F, Rong Q (2015) Medical image registration based on improved fuzzy C-means clustering. Biomed Eng: Appl, Basis Commun 27(04):1550032. https://doi.org/10.4015/S1016237215500325

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Ghaffari.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original version of this article was revised: Eq. 4 is typeset inappropriately by inserting unnecessary commas and may confuse the reader; in Table 2, some values ​​of the two columns are mistakenly shifted.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Seyfollahi, A., Ghaffari, A. Reliable data dissemination for the Internet of Things using Harris hawks optimization. Peer-to-Peer Netw. Appl. 13, 1886–1902 (2020). https://doi.org/10.1007/s12083-020-00933-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-00933-2

Keywords

Navigation