Skip to main content
Log in

RETRACTED ARTICLE: Real time behavior based service specific secure routing for cloud centric IoT systems

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

This article was retracted on 30 May 2022

This article has been updated

Abstract

The problem of secure routing in cloud centric IoT systems has been well studied. Number of approaches has been discussed earlier to support the security performance in IoT systems. Still the performance of algorithms in security measures is below the expected level. To solve this issue, an efficient behavior analysis model is described in this article. The method monitors the behaviors of edge nodes in cloud, to fetch the information like number of service access, number of transmissions involved, and number of IoT systems, total bytes supported and so on. First, available ways to reach the service point is discovered through each edge nodes of the network, and estimate the edge support measure, service support measure, secure routing measure. The method evaluates the suitability of route for data transmission at each time session based on different factors. According to these factors, trusted data support measure is estimated to select the transmission route. The behavior based service specific secure routing algorithm improves the performance of security towards the growth of QoS in IoT systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Change history

References

  • Airehrour D, Gutierrez J, Ray SK (2016) A lightweight trust design for IoT routing. In: 2016 IEEE 14th international conference on dependable, autonomic and secure computing, 14th international conference on pervasive intelligence and computing, 2nd international conference on big data intelligence and computing and cyber science and technology congress (DASC/PiCom/DataCom/CyberSciTech), pp 552–557. https://doi.org/10.1109/dasc-picom-datacom-cyberscitec.2016.105

  • Basabi AE, He J, Hashemi SM (2016) Secure routing in IoT with multi-objective simulated annealing. In: 2016 2nd IEEE international conference on computer and communications (ICCC), pp 2073–2076. https://doi.org/10.1109/compcomm.2016.7925065

  • Chaithra S, Gowrishankar S (2016) Study of secure fault tolerant routing protocol for IoT. IJSR 5(7):1833–1838

    Google Scholar 

  • Chze PLR, Leong KS (2014) A secure multi-hop routing for IoT communication. In: 2014 IEEE world forum on internet of things (WF-IoT), pp 428–432. https://doi.org/10.1109/wf-iot.2014.6803204

  • Glissa G, Rachedi A, Meddeb A (2016) A secure routing protocol based on RPL for internet of things. In: 2016 IEEE global communications conference (GLOBECOM). https://doi.org/10.1109/glocom.2016.7841543

  • Hajjar AE, Roussos G, Paterson M (2017) Secure routing in IoT networks with SISLOF. In: 2017 global internet of things summit (GIoTS). https://doi.org/10.1109/giots.2017.8016278

  • Hatzivasilis G, Papaefstathiou I, Manifavas C (2017) SCOTRES: secure routing for IoT and CPS. IEEE Internet Things J 4(6):2129–2141

    Article  Google Scholar 

  • Krishnamoorthy K, Jeyabalu M (2013) A survey on routing algorithms for cloud computing. IJCA Proc Int Conf Comput Inf Technol IC2IT(4):5–8

    Google Scholar 

  • Manda S, Nalini N (2018) Performance analysis of routing protocols for IoT. AIP Conf Proc. https://doi.org/10.1063/1.5032066

    Article  Google Scholar 

  • Mao S (2016) Crowd cloud routing protocol based on opportunistic computing for wireless sensor networks. EURASIP J Embed Syst 2016(1):1

    Article  Google Scholar 

  • Mehta D, Kashyap I, Zafar S (2017) Routing optimization in cloud networks. Int J Adv Res Comput Sci 8(2):16–18

    Google Scholar 

  • Nazir M (2012) Cloud computing: overview & current research challenges. IOSR-JCE 8(1):14–22

    Article  Google Scholar 

  • Ramezan G, Leung C (2018) A blockchain-based contractual routing protocol for the internet of things using smart contracts. Wirel Commun Mob Comput 2018(1):1–14

    Article  Google Scholar 

  • Sadique KM, Rahmani R, Johannesson P (2018) Towards security on internet of things: applications and challenges in technology. Procedia Comput Sci 141:199–206

    Article  Google Scholar 

  • Sankaran KS, Vasudevan N, Verghese A (2020) ACIAR: application-centric information-aware routing technique for IOT platform assisted by wireless sensor networks. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01748-y

    Article  Google Scholar 

  • Thakur UK, Dethe C (2019) QoS aware cloud based routing protocol for security improvement of hybrid wireless network. Mach Learn Res 4(1):21–26

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. Karthika.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s12652-022-04008-3

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Karthika, E., Mohanapriya, S. RETRACTED ARTICLE: Real time behavior based service specific secure routing for cloud centric IoT systems. J Ambient Intell Human Comput 12, 4737–4744 (2021). https://doi.org/10.1007/s12652-020-01879-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-01879-2

Keywords

Navigation