Multi-dimensional trust aware routing for clustered IOT framework

  • Authors

    • Ashwala Mohan
    • Dr. Bhanu Bhaskara
    2018-11-28
    https://doi.org/10.14419/ijet.v7i4.20.22114
  • IoT, Trust, Social Trust, Information Trust, Packet Delivery Ratio, Network Lifetime
  • With the increased interest in the utilization of smart applications, the IoT has gained a lot of popularity in the real world scenario. Due to the integration of different heterogeneous devices in a single network, various types of security issues will arise in the IoT. To ensure more security in IoT, this paper proposes a new trust aware routing framework based on the inherent communication and data properties of devices connected in the network. A new trust metric is derived in this paper by combining two different trusts based on the communication between nodes and the information passing through them. Further to achieve a prolonged network lifetime with optimal resource conservation, a clustering based communication strategy is accomplished. Extensive simulations are carried out by varying the malicious nature of network and the performance is measured through the metrics, packet loss ratio, packet delivery ratio, delay, network lifetime and average energy consumption.

     

  • References

    1. L.A. Grieco, M.B. Alaya, T. Monteil, K.K. Drira, Architectinginformation centric ETSI-M2M systems, in: IEEE PerCom, 2014.

      [2] S. Raza, H. Shafagh, K. Hewage, R. Hummen, T. Voigt, Lithe:Lightweight Secure CoAP for the Internet of Things, IEEE Sensors Journal 13 (10) (2013) 3711-3720.

      [3] H. Feng, W. Fu, Study of recent development about privacy andsecurity of the internet of things, in: 2010 International Conferenceon Web Information Systems and Mining (WISM), Sanya, 2010, pp.91–95.

      [4] R. Roman, J. Zhou, J. Lopez, On the features and challenges ofsecurity and privacy in distributed internet of things, Comput.Networks 57 (10) (2013) 2266–2279.

      [5] J. Anderson, L. Rainie, The Internet of Things will Thrive by 2025,PewResearch Internet Project, May 2014.

      [6] G. Glissa, A. Rachedi, and A. Meddeb, "A Secure Routing Protocol Based on RPL for Internet of Things," in 2016 IEEE GlobalCommunications Conference (GLOBECOM), 2016, pp. 1-7.

      [7] N. Djedjig, D. Tandjaoui, F. Medjek, and I. Romdhani, "New trust metric for the RPL routing protocol," in 2017 8th InternationalConference on Information and Communication Systems (ICICS), 2017, pp. 328-335.

      [8] T. Matsunaga, K. Toyoda, and I. Sasase, "Low false alarm rate RPL network monitoring system by considering timing inconstancybetween the rank measurements," in 2014 11th International Symposium on Wireless Communications Systems (ISWCS), 2014,pp. 427-431.

      [9] C. Taylor and T. Johnson, "Strong authentication countermeasures using dynamic keying for sinkhole and distance spoofing attacksin smart grid networks," in 2015 IEEE Wireless Communications and Networking Conference (WCNC), 2015, pp. 1835-1840.

      [10] M. Surendar and A. Umamakeswari, "InDReS: An Intrusion Detection and response system for Internet of Things with6LoWPAN," in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET),2016, pp. 1903-1908.

      [11] A. Le, J. Loo, K. K. Chai, and M. Aiash, "A specification-based IDS for detecting attacks on RPL-based network topology,"Information, vol. 7, p. 25, 2016.

      [12] P. Pongle and G. Chavan, "Real time intrusion and wormhole attack detection in internet of things," International Journal ofComputer Applications, vol. 121, 2015.

      [13] Z. Yan, P. Zhang, and A. V. Vasilakos, "A survey on trust management for Internet of Things," Journal of Network and ComputerApplications, vol. 42, pp. 120-134, 2014.

      [14]J.Guo, I.-R. Chen, and J. J. P. Tsai, “Asurveyof trust computationmodels for service management in internet of things systems,â€Computer Communications, vol. 97, pp. 1–14, 2017.

      [15] J.-H. Lee and H. Kim, “Security and privacy challenges inthe internet of things [security and privacy matters],†IEEEConsumer Electronics Magazine, vol. 6, no. 3, pp. 134–136, 2017.

      [16] C. V. L. Mendoza and J. H. Kleinschmidt, “Mitigating on-offattacks in the internet of things using a distributed trust managementscheme,†International Journal of Distributed SensorNetworks, vol. 2015, Article ID 859731, 2015.

      [17] H. Hellaoui, A. Bouabdallah, and M. Koudil, “TAS-IoT: Trust-Based Adaptive Security in the IoT,†in Proceedings of the 41stIEEE Conference on Local Computer Networks (LCN ’16), pp.599–602, November 2016.

      [18] O. Ben Abderrahim, M. H. Elhdhili, and L. Saidane, “TMCoISIOT:A trust management system based on communities ofinterest for the social internet of things,†in Proceedings of the13th IEEE International Wireless Communications and MobileComputing Conference (IWCMC ’17), pp. 747–752, June 2017.

      [19] F. Boustanifar and Z. Movahedi, “A trust-based offloading formobile M2M communications,†in Proceedings of the Intl IEEEConferences on Ubiquitous Intelligence & Computing, Advancedand Trusted Computing, Scalable Computing and Communications,Cloud and Big Data Computing, Internet of People,and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld ’16), pp. 1139–1143, IEEE, 2016.

      [20] W. Li, H. Song, and F. Zeng, “Policy-based secure and trustworthysensing for internet of things in smart cities,†IEEE InternetofThings Journal, vol. PP, no. 99, pp. 1-1, 2017.

      [21] Y. Yu, Z. Jia, W. Tao, B. Xue, and C. Lee, “An efficient trustevaluation scheme for node behavior detection in the internetof things,â€Wireless Personal Communications, vol. 93, no. 2, pp.571–587, 2017.

      [22] T. Zhang, L. Yan, and Y. Yang, “Trust evaluation method forclustered wireless sensor networks based on cloud model,â€Wireless Networks, pp. 1–21, 2016.

      [23] Awais Ansari, GouriPatil, “A Novel Composite Routing Strategy to Enhance Trust and Network Lifetime in WSNsâ€, IJATIR, June 2017.

  • Downloads

  • How to Cite

    Mohan, A., & Bhanu Bhaskara, D. (2018). Multi-dimensional trust aware routing for clustered IOT framework. International Journal of Engineering & Technology, 7(4.20), 15-21. https://doi.org/10.14419/ijet.v7i4.20.22114