Skip to main content
Log in

Enhancing Security in the Internet of Things: A Trust-Based Protocol for Resilient Communication

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

The quick increasing in the Internet of Things (IoT) devices has raised significant security concerns, particularly in the face of reactive jamming attacks. This paper proposes a trust-based protocol named Trust-Based Protocol for Resilient Communication (TBRC) that incorporates a robust key management technique to improve the security of IoT systems and mitigate the impact of reactive jamming attacks. To assess the effectiveness of our protocol, the work is compared with existing schemes such as CKMT, EDDK, and CEMT. Through extensive simulations under realistic conditions, we analyze key performance metrics, including energy consumption, packet loss, computational time, and throughput. The comparative analysis demonstrates that our proposed protocol outperforms CKMT, EDDK, and CEMT in terms of computational efficiency, throughput, and delay, making it a more effective solution for secure IoT communication. By leveraging a robust key management technique, our protocol provides a secure and resilient communication framework for IoT environments, effectively countering reactive jamming attacks. The integration of this technique strengthens the overall security posture of IoT networks, ensuring reliable and secure communication between devices. This work contributes to advancing IoT security by introducing a trust-based protocol with a robust key management technique that effectively mitigates the impact of reactive jamming attacks. The comparative evaluation against existing schemes validates the superiority of our proposed approach in terms of security, efficiency, and reliability. The results of our evaluation highlight the improved performance of our protocol, positioning it as a promising solution for real-world IoT deployments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Gautam AK, Kumar R. A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks. SN Appl Sci. 2021;3:50. https://doi.org/10.1007/s42452-020-04089-9.

    Article  Google Scholar 

  2. Ferrag MA, Maglaras LA, Janicke H, Jiang J, Shu L. Authentication protocols for internet of things: a comprehensive survey. Secur Commun Netw. 2017;2017:1.

    Article  Google Scholar 

  3. Khan GA. A cognitive energy efficient and trusted routing model for the security of wireless sensor networks: CEMT. Wirel Pers Commun. 2021;119:3149–59.

    Article  Google Scholar 

  4. Khan ABF, Anandharaj G. A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment: CKMT. SN Appl Sci. 2019;1:1575. https://doi.org/10.1007/s42452-019-1628-4.

  5. Zhang X, He J, Wei Q. EDDK: energy-efficient distributed deterministic key management for wireless sensor networks. J Wirel Com Network. 2011;2011:765143. https://doi.org/10.1155/2011/765143.

    Article  Google Scholar 

  6. Meena U, Sharma A. Secure key agreement with rekeying using FLSO routing protocol in wireless sensor network. Wirel Pers Commun. 2018;101:1177–99.

    Article  Google Scholar 

  7. Reddy VB, Negi A, Venkataraman S. Trust computation model using hysteresis curve for wireless sensor networks. In: Proceedings of the IEEE SENSORS; 2018. p. 1–4.

  8. Gautam AK, Kumar R. A robust trust model for wireless sensor networks. In: Proceedings of the 5th IEEE Uttar Pradesh Section Int. Conf. Electr., Electron. Comput. Eng. (UPCON); 2018. p. 1–5.

  9. Verma R, Darak SJ, Tikkiwal V, Joshi H, Kumar R. Countermeasures against jamming attack in sensor networks with timing and power constraints. In: 2019 11th International Conference on Communication Systems & Networks (COMSNETS), Bengaluru, India; 2019. p. 485–8.

  10. Fadele AA, Othman M, Hashem IAT, et al. A novel countermeasure technique for reactive jamming attack in internet of things. Multimed Tools Appl. 2019;78:29899–920.

    Article  Google Scholar 

  11. Jia L, Xu Y, Sun Y, Feng S, Anpalagan A. Stackelberg game approaches for anti-jamming defence in wireless networks. IEEE Wirel Commun. 2018;25(6):120–8.

    Article  Google Scholar 

  12. Korzhuk V, Groznykh A, Menshikov A, Strecker M. Identification of attacks against wireless sensor networks based on behaviour analysis. J Wirel Mobile Netw Ubiquit Comput Dependable Appl (JoWUA). 2019;10(2):1–21.

    Google Scholar 

  13. Feroz Khan AB, Hussain MM, Kalpana Devi S, Gunavathie MA. DDoS attack modeling and resistance using trust based protocol for the security of Internet of Things. J Eng Res. 2023;11(2):100058.

  14. Pourhabibi S, Pashazadeh S, Abbasi M. A secure and energy-efficient authentication scheme for IoT using lightweight cryptography. Int J Commun Syst. 2019;32(11):e3975.

    Google Scholar 

  15. Wang Y, Song H. A survey on security and privacy in Internet of Things. Secur Commun Netw. 2019;2019:1–25.

    Google Scholar 

  16. Liu J, Wang L, Yu Y. Improved security of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks. IEEE Internet Things J. 2020;7(6):5256–66. https://doi.org/10.1109/JIOT.2020.2979613.

    Article  Google Scholar 

  17. Seo S-H, Won J, Sultana S, Bertino E. Effective key management in dynamic wireless sensor networks. IEEE Trans Inf Forensics Secur. 2015;10(2):371–83. https://doi.org/10.1109/TIFS.2014.2375555.

    Article  Google Scholar 

  18. Cheng Q, Li Y, Shi W, et al. A certificateless authentication and key agreement scheme for secure cloud-assisted wireless body area network. Mobile Netw Appl. 2022;27:346–56. https://doi.org/10.1007/s11036-021-01840-3.

    Article  Google Scholar 

  19. Wang D, Wang P. Two birds with one two-factor authentication with security beyond conventional bound. IEEE Trans Dependable Secure Comput. 2018;15(4):708–22.

    Google Scholar 

  20. Qiu S, Wang D, Xu G, Kunari S. Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices. IEEE Trans Dependable Secure Comput. 2020;19:1338–51.

    Google Scholar 

  21. Kumar M, Chand S. A lightweight cloud-assisted identity-based anonymous authentication and key agreement protocol for secure wireless body area network. IEEE Syst J. 2020;15:2779–86.

    Article  Google Scholar 

  22. Khan ABF, Lalitha H, Kalpana Devi S, Rajalakshmi CN. A multi-attribute based trusted routing for embedded devices in MANET-IoT. Microprocessors Microsyst. 2022;89:104446.

Download references

Author information

Authors and Affiliations

Authors

Contributions

Dr. AAA made substantial contributions to the writing and revision of the manuscript. Dr. MMH provided valuable insights for the interpretation of the results. SRA played a crucial role in the critical review and revision of the manuscript. Dr. LS assisted in data collection, performed statistical analysis, and contributed to the drafting and editing of the manuscript. Dr. FKAB, as the corresponding author, oversaw the entire research project.

Corresponding author

Correspondence to A. B. Feroz Khan.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Althaf Ali, A., Hussain, M.M., Subramaneswara Rao, A. et al. Enhancing Security in the Internet of Things: A Trust-Based Protocol for Resilient Communication. SN COMPUT. SCI. 5, 4 (2024). https://doi.org/10.1007/s42979-023-02329-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-023-02329-4

Keywords

Navigation