Abstract
Internet of Things (IoT) entities compile a massive volume of sensing data and transmit it to the cloud for processing and reasoning. Reliable and secure data aggregation and forwarding in IoT incorporates resource-constrained low-power and lossy devices that served diverse and sensitive applications with special obligations is a significant challenge for IoT. This paper proposes Reliable Data Dissemination for the Internet of Things Using Harris Hawks Optimization (RDDI) scheme, which is a secure data diffusion mechanism that accoutered a fuzzy hierarchical network model for Wireless Sensor Networks (WSN) based IoT. RDDI discloses attacks and monitors the behavior of nodes information exchange processes. Our scheme prowls to synthesize routing capabilities, energy-aware and geographic data circulation, and fuzzy clustering to provide a reliable, nature-inspired optimized routing called Harris Hawks Optimization (HHO) algorithm for IoT. The performance of RDDI, under five metrics of reliability, end-to-end delay, energy consumption, computational overhead as well as packet forwarding distance in multi-cluster scenarios, is evaluated with three comparative approaches. Findings of simulations reveal that RDDI achieves a reliable strategy and preferable achievement over the other three disposals.
Similar content being viewed by others
Change history
29 July 2020
The Publisher would like to correct the introduced formatting errors and presentation of equation 4 and Table 2 in the original publication.
References
J. Rifkin 2014 The zero marginal cost society: the internet of things, the collaborative commons, and the eclipse of capitalism. St. Martin’s Press
A. Grau What is really needed to secure the Internet of Things? Icon Labs. https://www.iconlabs.com/prod/internet-secure-things-%E2%80%93-what-really-needed-secure-internet-things (Accessed 2014)
A guide to the Internet of Things infographic. Intel. https://www.intel.com/content/www/us/en/internet-of-things/infographics/guide-to-iot.html (Accessed 2015)
Al-Turjman F, Zahmatkesh H, Shahroze R (2019) An overview of security and privacy in smart cities’ IoT communications. Trans Emerg Telecommun Technol. https://doi.org/10.1002/ett.3677
Al-Turjman F (2020) Intelligence and security in big 5G-oriented IoNT: an overview. Future Gener Comput Syst 102:357–368. https://doi.org/10.1016/j.future.2019.08.009
Deebak B, Al-Turjman F (2020) A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Netw 97:102022. https://doi.org/10.1016/j.adhoc.2019.102022
Zarpelao BB, Miani RS, Kawakani CT, de Alvarenga SC (2017) A survey of intrusion detection in Internet of Things. J Netw Comput Appl 84:25–37. https://doi.org/10.1016/j.jnca.2017.02.009
Giaretta A, Balasubramaniam S, Conti M (2015) Security vulnerabilities and countermeasures for target localization in bio-nanothings communication networks. IEEE Trans Inf Forensics Secur 11(4):665–676. https://doi.org/10.1109/TIFS.2015.2505632
M. Conti, A. Dehghantanha, K. Franke, and S. Watson 2018 Internet of Things security and forensics: challenges and opportunities. Elsevier
Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: a top-down survey. Comput Netw 141:199–221. https://doi.org/10.1016/j.comnet.2018.03.012
Airehrour D, Gutierrez J, Ray SK (2016) Secure routing for internet of things: a survey. J Netw Comput Appl 66:198–213. https://doi.org/10.1016/j.jnca.2016.03.006
Yiğit B, Gür G, Alagöz F, Tellenbach B (2019) Cost-aware securing of IoT systems using attack graphs. Ad Hoc Netw 86:23–35. https://doi.org/10.1016/j.adhoc.2018.10.024
Bu L, Isakov M, Kinsy MA (2019) A secure and robust scheme for sharing confidential information in IoT systems. Ad Hoc Netw 92:101762. https://doi.org/10.1016/j.adhoc.2018.09.007
Čolaković A, Hadžialić M (2018) Internet of Things (IoT): a review of enabling technologies, challenges, and open research issues. Comput Netw 144:17–39. https://doi.org/10.1016/j.comnet.2018.07.017
Ghaffari A (2017) Real-time routing algorithm for mobile ad hoc networks using reinforcement learning and heuristic algorithms. Wirel Netw 23(3):703–714. https://doi.org/10.1007/s11276-015-1180-0
Dehkordi SA, Farajzadeh K, Rezazadeh J, Farahbakhsh R, Sandrasegaran K, Dehkordi MA (2019) A survey on data aggregation techniques in IoT sensor networks. Wirel Netw:1–21. https://doi.org/10.1007/s11276-019-02142-z
Zakariayi S, Babaie S (2019) DEHCIC: a distributed energy-aware hexagon based clustering algorithm to improve coverage in wireless sensor networks. Peer-to-Peer Netw Appl 12(4):689–704. https://doi.org/10.1007/s12083-018-0666-9
Khabiri M, Ghaffari A (2018) Energy-aware clustering-based routing in wireless sensor networks using cuckoo optimization algorithm. Wirel Pers Commun 98(3):2473–2495. https://doi.org/10.1007/s11277-017-4983-8
Pourghebleh B, Navimipour NJ (2017) Data aggregation mechanisms in the Internet of things: a systematic review of the literature and recommendations for future research. J Netw Comput Appl 97:23–34. https://doi.org/10.1016/j.jnca.2017.08.006
Parsavand H, Ghaffari A (2018) Controlling congestion in wireless sensor networks through imperialist competitive algorithm. Wirel Pers Commun 101(2):1123–1142. https://doi.org/10.1007/s11277-018-5752-z
Shah SB, Chen Z, Yin F, Khan IU, Ahmad N (2018) Energy and interoperable aware routing for throughput optimization in clustered IoT-wireless sensor networks. Future Gener Comput Syst 81:372–381. https://doi.org/10.1016/j.future.2017.09.043
Hayyolalam V, Kazem AAP (2020) Black widow optimization algorithm: a novel meta-heuristic approach for solving engineering optimization problems. Eng Appl Artif Intell 87:–103249. https://doi.org/10.1016/j.engappai.2019.103249
Heidari AA, Mirjalili S, Faris H, Aljarah I, Mafarja M, Chen H (2019) Harris hawks optimization: algorithm and applications. Future Gener Comput Syst 97:849–872. https://doi.org/10.1016/j.future.2019.02.028
Ghaffari A (2015) Congestion control mechanisms in wireless sensor networks: a survey. J Netw Comput Appl 52:101–115. https://doi.org/10.1016/j.jnca.2015.03.002
Ahuja SP, Wheeler N (2020) Architecture of fog-enabled and cloud-enhanced internet of things applications. Int J Cloud Appl Comput (IJCAC) 10(1):1–10. https://doi.org/10.4018/IJCAC.2020010101
M. Conti, P. Kaliyar, and C. Lal (2017) REMI: a reliable and secure multicast routing protocol for IoT networks. In: Proceedings of the 12th international conference on availability, reliability and security: ACM, p. 84, doi: https://doi.org/10.1145/3098954.3106070
T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik, J.-P. Vasseur, and R. Alexander (2012) RFC 6550: RPL: IPv6 routing protocol for low-power and lossy networks. RFC pp. 1–157, doi: https://doi.org/10.17487/RFC6550
A. Dunkels, B. Gronvall, and T. Voigt (2004) Contiki-a lightweight and flexible operating system for tiny networked sensors. In: 29th annual IEEE international conference on local computer networks, Tampa, FL, USA, USA: IEEE, pp. 455–462, doi: https://doi.org/10.1109/LCN.2004.38
Lorente GG, Lemmens B, Carlier M, Braeken A, Steenhaut K (2017) BMRF: bidirectional multicast RPL forwarding. Ad Hoc Netw 54:69–84. https://doi.org/10.1016/j.adhoc.2016.10.004
M. Conti, P. Kaliyar, M. M. Rabbani, and S. Ranise (2018) SPLIT: a secure and scalable RPL routing protocol for internet of things. In: 2018 14th international conference on wireless and mobile computing, networking and communications (WiMob): IEEE, pp. 1–8, doi: https://doi.org/10.1109/WiMOB.2018.8589115
F. Österlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt (2006) Cross-level sensor network simulation with cooja. In: First IEEE international workshop on practical issues in building sensor network applications (SenseApp 2006), Tampa, FL, USA: IEEE, pp. 641–648, doi: https://doi.org/10.1109/LCN.2006.322172
Lin J-W, Chelliah PR, Hsu M-C, Hou J-X (2019) Efficient fault-tolerant routing in IoT wireless sensor networks based on bipartite-flow graph modeling. IEEE Access 7:14022–14034. https://doi.org/10.1109/ACCESS.2019.2894002
Maheswari PU, Ganeshbabu T (2019) Repetitive node categorization technique based reliable clustering and energy efficient communication in P2P wireless sensor network. Peer-to-Peer Netw Appl:1–12. https://doi.org/10.1007/s12083-019-00768-6
Gupta R (2019) Resource provisioning and scheduling techniques of IoT based applications in fog computing. Int J Fog Comput (IJFC) 2(2):57–70. https://doi.org/10.4018/IJFC.2019070104
Hussain MM, Beg MS (2019) Using vehicles as fog infrastructures for transportation cyber-physical systems (T-CPS): fog computing for vehicular networks. Int J Softw Sci Comput Intell (IJSSCI) 11(1):47–69. https://doi.org/10.4018/IJSSCI.2019010104
Ullah A, Said G, Sher M, Ning H (2020) Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN. Peer-to-Peer Netw Appl 13(1):163–174. https://doi.org/10.1007/s12083-019-00745-z
Ai Z-Y, Zhou Y-T, Song F (2018) A smart collaborative routing protocol for reliable data diffusion in IoT scenarios. Sensors 18(6):1926. https://doi.org/10.3390/s18061926
Y. Yu, R. Govindan, and D. Estrin 2001 Geographical and energy aware routing: a recursive data dissemination protocol for wireless sensor networks. UCLA Computer Science Department Technical Report, pp. 1–11
Najjar-Ghabel S, Yousefi S, Farzinvash L (2018) Reliable data gathering in the Internet of Things using artificial bee colony. Turk J Electr Eng Comput Sci 26(4):1710–1723. https://doi.org/10.3906/elk-1801-100
Junior NF, Silva A, Guelfi A, Kofuji ST (2019) IoT6Sec: reliability model for Internet of Things security focused on anomalous measurements identification with energy analysis. Wirel Netw 25(4):1533–1556. https://doi.org/10.1007/s11276-017-1610-2
Tewari A, Gupta B (2019) A novel ECC-based lightweight authentication protocol for internet of things devices. Int J High Perform Comput Netw 15(1–2):106–120. https://doi.org/10.1504/IJHPCN.2019.103548
Li J, Li X, Cheng X, Yuan J, Zhang R (2019) A trustworthiness-enhanced reliable forwarding scheme in mobile Internet of Things. J Netw Comput Appl 140:40–53. https://doi.org/10.1016/j.jnca.2019.05.003
Selvakumar R (2019) Reliable and secure data communication in wireless sensor networks using optimal locally recoverable codes. Peer-to-Peer Netw Appl:1–10. https://doi.org/10.1007/s12083-019-00809-0
R. Blom (1984) An optimal class of symmetric key generation systems. In: Workshop on the theory and application of cryptographic techniques. Springer, pp. 335–338, doi: https://doi.org/10.1007/3-540-39757-4_22
S. Kim, R. Fonseca, and D. Culler (2004) Reliable transfer on wireless sensor networks. In: 2004 first annual IEEE communications society conference on sensor and ad hoc communications and networks, 2004. IEEE SECON 2004. IEEE, pp. 449–459, doi: https://doi.org/10.1109/SAHCN.2004.1381947
S. Ali, A. Fakoorian, and H. Taheri 2007 Optimum Reed-Solomon erasure coding in fault tolerant sensor networks. In: 2007 4th international symposium on wireless communication systems: IEEE pp. 6–10, doi: https://doi.org/10.1109/ISWCS.2007.4392291
Bednarz JC (1988) Cooperative hunting Harris’ hawks (Parabuteo unicinctus). Science 239(4847):1525–1527. https://doi.org/10.1126/science.239.4847.1525
Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun 1(4):660–670. https://doi.org/10.1109/TWC.2002.804190
Pan M, Jiang J, Zhang F, Rong Q (2015) Medical image registration based on improved fuzzy C-means clustering. Biomed Eng: Appl, Basis Commun 27(04):1550032. https://doi.org/10.4015/S1016237215500325
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The original version of this article was revised: Eq. 4 is typeset inappropriately by inserting unnecessary commas and may confuse the reader; in Table 2, some values of the two columns are mistakenly shifted.
Rights and permissions
About this article
Cite this article
Seyfollahi, A., Ghaffari, A. Reliable data dissemination for the Internet of Things using Harris hawks optimization. Peer-to-Peer Netw. Appl. 13, 1886–1902 (2020). https://doi.org/10.1007/s12083-020-00933-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-020-00933-2