Abstract
The quick increasing in the Internet of Things (IoT) devices has raised significant security concerns, particularly in the face of reactive jamming attacks. This paper proposes a trust-based protocol named Trust-Based Protocol for Resilient Communication (TBRC) that incorporates a robust key management technique to improve the security of IoT systems and mitigate the impact of reactive jamming attacks. To assess the effectiveness of our protocol, the work is compared with existing schemes such as CKMT, EDDK, and CEMT. Through extensive simulations under realistic conditions, we analyze key performance metrics, including energy consumption, packet loss, computational time, and throughput. The comparative analysis demonstrates that our proposed protocol outperforms CKMT, EDDK, and CEMT in terms of computational efficiency, throughput, and delay, making it a more effective solution for secure IoT communication. By leveraging a robust key management technique, our protocol provides a secure and resilient communication framework for IoT environments, effectively countering reactive jamming attacks. The integration of this technique strengthens the overall security posture of IoT networks, ensuring reliable and secure communication between devices. This work contributes to advancing IoT security by introducing a trust-based protocol with a robust key management technique that effectively mitigates the impact of reactive jamming attacks. The comparative evaluation against existing schemes validates the superiority of our proposed approach in terms of security, efficiency, and reliability. The results of our evaluation highlight the improved performance of our protocol, positioning it as a promising solution for real-world IoT deployments.
Similar content being viewed by others
References
Gautam AK, Kumar R. A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks. SN Appl Sci. 2021;3:50. https://doi.org/10.1007/s42452-020-04089-9.
Ferrag MA, Maglaras LA, Janicke H, Jiang J, Shu L. Authentication protocols for internet of things: a comprehensive survey. Secur Commun Netw. 2017;2017:1.
Khan GA. A cognitive energy efficient and trusted routing model for the security of wireless sensor networks: CEMT. Wirel Pers Commun. 2021;119:3149–59.
Khan ABF, Anandharaj G. A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment: CKMT. SN Appl Sci. 2019;1:1575. https://doi.org/10.1007/s42452-019-1628-4.
Zhang X, He J, Wei Q. EDDK: energy-efficient distributed deterministic key management for wireless sensor networks. J Wirel Com Network. 2011;2011:765143. https://doi.org/10.1155/2011/765143.
Meena U, Sharma A. Secure key agreement with rekeying using FLSO routing protocol in wireless sensor network. Wirel Pers Commun. 2018;101:1177–99.
Reddy VB, Negi A, Venkataraman S. Trust computation model using hysteresis curve for wireless sensor networks. In: Proceedings of the IEEE SENSORS; 2018. p. 1–4.
Gautam AK, Kumar R. A robust trust model for wireless sensor networks. In: Proceedings of the 5th IEEE Uttar Pradesh Section Int. Conf. Electr., Electron. Comput. Eng. (UPCON); 2018. p. 1–5.
Verma R, Darak SJ, Tikkiwal V, Joshi H, Kumar R. Countermeasures against jamming attack in sensor networks with timing and power constraints. In: 2019 11th International Conference on Communication Systems & Networks (COMSNETS), Bengaluru, India; 2019. p. 485–8.
Fadele AA, Othman M, Hashem IAT, et al. A novel countermeasure technique for reactive jamming attack in internet of things. Multimed Tools Appl. 2019;78:29899–920.
Jia L, Xu Y, Sun Y, Feng S, Anpalagan A. Stackelberg game approaches for anti-jamming defence in wireless networks. IEEE Wirel Commun. 2018;25(6):120–8.
Korzhuk V, Groznykh A, Menshikov A, Strecker M. Identification of attacks against wireless sensor networks based on behaviour analysis. J Wirel Mobile Netw Ubiquit Comput Dependable Appl (JoWUA). 2019;10(2):1–21.
Feroz Khan AB, Hussain MM, Kalpana Devi S, Gunavathie MA. DDoS attack modeling and resistance using trust based protocol for the security of Internet of Things. J Eng Res. 2023;11(2):100058.
Pourhabibi S, Pashazadeh S, Abbasi M. A secure and energy-efficient authentication scheme for IoT using lightweight cryptography. Int J Commun Syst. 2019;32(11):e3975.
Wang Y, Song H. A survey on security and privacy in Internet of Things. Secur Commun Netw. 2019;2019:1–25.
Liu J, Wang L, Yu Y. Improved security of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks. IEEE Internet Things J. 2020;7(6):5256–66. https://doi.org/10.1109/JIOT.2020.2979613.
Seo S-H, Won J, Sultana S, Bertino E. Effective key management in dynamic wireless sensor networks. IEEE Trans Inf Forensics Secur. 2015;10(2):371–83. https://doi.org/10.1109/TIFS.2014.2375555.
Cheng Q, Li Y, Shi W, et al. A certificateless authentication and key agreement scheme for secure cloud-assisted wireless body area network. Mobile Netw Appl. 2022;27:346–56. https://doi.org/10.1007/s11036-021-01840-3.
Wang D, Wang P. Two birds with one two-factor authentication with security beyond conventional bound. IEEE Trans Dependable Secure Comput. 2018;15(4):708–22.
Qiu S, Wang D, Xu G, Kunari S. Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices. IEEE Trans Dependable Secure Comput. 2020;19:1338–51.
Kumar M, Chand S. A lightweight cloud-assisted identity-based anonymous authentication and key agreement protocol for secure wireless body area network. IEEE Syst J. 2020;15:2779–86.
Khan ABF, Lalitha H, Kalpana Devi S, Rajalakshmi CN. A multi-attribute based trusted routing for embedded devices in MANET-IoT. Microprocessors Microsyst. 2022;89:104446.
Author information
Authors and Affiliations
Contributions
Dr. AAA made substantial contributions to the writing and revision of the manuscript. Dr. MMH provided valuable insights for the interpretation of the results. SRA played a crucial role in the critical review and revision of the manuscript. Dr. LS assisted in data collection, performed statistical analysis, and contributed to the drafting and editing of the manuscript. Dr. FKAB, as the corresponding author, oversaw the entire research project.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Althaf Ali, A., Hussain, M.M., Subramaneswara Rao, A. et al. Enhancing Security in the Internet of Things: A Trust-Based Protocol for Resilient Communication. SN COMPUT. SCI. 5, 4 (2024). https://doi.org/10.1007/s42979-023-02329-4
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-023-02329-4