Robust Routing for Secure Communication in Internet of Things Enabled Networks

  • Somnath B. Thigale
  • Rahul Pandey
  • Virendrakumar A. Dhotre
Conference paper


The Internet of Things (IoT) is emerging technology as the global and pervasive paradigm that aids and gives component to the monitoring and controlling the physical world by playing out the errands for information gathering, handling, and examination from the IoT sensor devices. There are several concerns about IoT networks’ design such as quality of service, security, scalability, and reliability. Security and privacy is the most critical problem for IoT networks. Hence designing the secure routing protocol is the main research challenge for IoT networks. In this paper, we have mentined the review on the recent security mechanisms for IoT enabled wireless networks. Secondly, we have designed two recent secure techniques for IoT enabled networks and evaluated them with networks designed in terms of various QoS parameters such as throughput, overhead, delay etc. The outcome of this paper is the current challenges and future directions for designing the robust security protocol for IoT networks.


Internet of things Routing protocol Data communication Security Privacy Cryptography Trust management 


  1. 1.
    Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54:2787–2805CrossRefGoogle Scholar
  2. 2.
    Zhao K, Ge L (2013) A survey on the internet of things security. In: Proceedings of the 9th international conference on Computational Intelligence and Security (CIS), pp 663–667Google Scholar
  3. 3.
    Evans D (2011) The internet of things: how the next evolution of the internet is changing everythingGoogle Scholar
  4. 4.
    Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29:1645–1660CrossRefGoogle Scholar
  5. 5.
    Abdelaziz AK, Nafaa M, Salim G (2013) Survey of routing attacks and counter-measures. In: Proceedings of the 15th international conference on computer modelling and simulation (UKSim), pp 693–698Google Scholar
  6. 6.
    Chze PLR, Leong KS (2014) A secure multi-hop routing for IoT communication. IEEE World Forum Internet Things (WF-IoT):428–32Google Scholar
  7. 7.
    Chze PLR, Leong KS (2014) A secure multi-hop routing for IoT communication. IEEE World Forum on the Internet of Things (WF-IoT), pp 428–432Google Scholar
  8. 8.
    Hummen R, Hiller J, Wirtz H, Henze M, Shafagh H, Wehrle K (2013), 6LoWPAN fragmentation attacks and mitigation mechanisms. In: Presented at the proceedings of the sixth ACM conference on security and privacy in wireless and mobile networks, Budapest, HungaryGoogle Scholar
  9. 9.
    Anita X, Martin Leo Manickam J, Bhagyaveni MA (2013) Two-way acknowledgment-based trust framework for wireless sensor networks. Int J Distrib Sens Netw 2013:14Google Scholar
  10. 10.
    Krentz KF, Rafiee H, Meinel C (2013) 6LoWPAN security: adding compromise resilience to the 802.15.4 security sublayer. In: Presented at the proceedings of the international workshop on adaptive security, Zurich, SwitzerlandGoogle Scholar
  11. 11.
    Mulligan G (2007) The 6LoWPAN architecture. In: Presented at the proceedings of the 4th workshop on embedded networked sensors, Cork, IrelandGoogle Scholar
  12. 12.
    Raza S, Shafagh H, Hewage K, Hummen R, Voigt T, d. o. t. Akademin för innovation et al (2013) Lithe: lightweight secure CoAP for the internet of things. IEEE Sensors J 13:3711–3720CrossRefGoogle Scholar
  13. 13.
    Raza S, Duquennoy S, Höglund J, Roedig U, Voigt T (2014) Secure communication for the internet of things—a comparison of link-layer security and IPsec for 6LoWPAN. Secur Commun Netw 7:2654–2668CrossRefGoogle Scholar
  14. 14.
    Li W, Member, IEEE, Song H (2016) ART: an attack-resistant trust management scheme for securing vehicular Ad Hoc networks. IEEE Trans Intell Transp Sys 17(4)CrossRefGoogle Scholar
  15. 15.
    Elleuchi M, Boujeleben M, Abid M (2017) Securing RPL-based internet of things applied for water pipeline monitoring. 5th international conference on Software, Telecommunications and Computer Networks (SoftCOM)Google Scholar
  16. 16.
    Li W, Member, IEEE, Song H, Senior Member, IEEE, Zeng F (2018) Policy-based secure and trustworthy sensing for an internet of things in smart cities. IEEE Internet Things J 5(2):716–723CrossRefGoogle Scholar
  17. 17.

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Somnath B. Thigale
    • 1
  • Rahul Pandey
    • 1
  • Virendrakumar A. Dhotre
    • 1
  1. 1.MUITLucknowIndia

Personalised recommendations