Authors:
Sowmya Gali,Venkatram N,DOI NO:
http://doi.org/10.26782/jmcms.2019.10.00029Keywords:
Internet of Things,Trust Management,Clustering,Communication Trust,Malicious Detection Rate,Network Lifetime,Abstract
Due to openness of the deployed environment and transmission medium (Internet), Internet of Things (IoT) suffers from various types of security attacks including Denial of service, Sinkhole, Tampering etc. Securing IoT is achieved a greater research interest and this paper proposes a new secure routing strategy for IoT based on trust model. In this model, initially the nodes of the network are formulated as clusters and the IoT nodes which are more prominent in trustworthiness and energy are only chosen as Cluster Heads. Further a trust evaluation mechanism was accomplished for every Cluster Node at Cluster Head to build a secure route for data transmission from source node to destination node. The trust evaluation is a composition of the communication trust, nobility trust and data trust. Simulation experiments are conducted over the proposed approach and the performance is analyzed through the performance metrics such as Packet Delivery Rate, Network Lifetime, and Malicious Detection Rate. The obtained performance metrics shows the outstanding performance of proposed method even in the increased malicious behavior of network.Refference:
I. Atzori L, Iera A and Morabito G. The Internet ofThings: a survey, ComputNetw
2010; 54(15): 2787–2805
II. Atzori, L., Iera, A., Morabito, G., Nitti, M. The Social Internet of Things (SIoT) –
when social networks meet the Internet of Things: concept, architecture and
networkcharacterization. Comput. Netw2012; 56(16):3594–3608,.
III. Bernabe, J.B., Ramos, J.L. H., Gomez, A.F.S.TAC-IoT: multidimensional
trustawareaccess control system for the Internet of Things. Soft
Comput.2016;20(5):1–17.
IV. D. Chen, G. Chang, D. Sun, J. Li, J. Jia, and X. Wang. TRM-IoT: A trust
management model based on fuzzy reputation for internet of things”, Computer
Science and Information Systems. 2011; 8(4):1207-1228.
V. Dong J, Qi M.A new clustering algorithm based on PSO with the jumping
mechanism of SA. In Proceedings of the 3rd International Conference on
Intelligent Information Technology Application, NJ, USA, 21–22, 61–64.
VI. FangyuGai, Jiexin Zhang, Peidong Zhu, and Xinwen Jiang. Multi-dimensional
Trust-Based AnomalyDetection System in Internet of Things.Springer
International Publishing2017; pp. 302–313.
VII. F. Bao and I. R. Chen. Dynamic trust management for internet of things
applications. In: Proc. of international workshop on Self-aware internet of
things2012; California, USA, pp.1-6.
VIII. F. Hao, G. Min, M. Lin, C. Luo, and L. Yang. Mobi-FuzzyTrust: An efficient
fuzzy trust inference mechanism in mobile social network. IEEETrans. Parallel
Distrib. Syst., 2014; 25(11): 2944-2955.
IX. F. Ishmanov, A.S. Malik, S.W. Kim, B. Begalov. Trust management systemin
wireless sensor networks: design considerations and research challenges. Trans.
Emerg. Telecommun. Technol 2015; 26:107–130.
X. Hasnat MA, Akbar M, Iqbal Z, Khan ZA, QasimU, JavaidN.Bio inspired
distributed energy efficient clustering for Wireless SensorNetworks, Information
Technology: Towards New Smart World (NSITNSW). 5th National Symposium
on, Riyadh;2015: pp. 1-7.
XI. Jabeur N, Yasar AUH, Shakshuki E, Haddad H. Towards bio-inspired adaptive
spatial clustering approach for IoT applications. Future Generation Computer
Systems: May 2017.
XII. Jacobsen R. H, Zhang Q, Toftegaard T. S.Bio-inspired Principles for Large-Scale
Networked Sensor Systems:An Overview. Sensors: 2011; 11(4): 4137–4151.
XIII. Jin Wang, Yiquan Cao, Bin Li.Particle swarm optimization based clustering
algorithm with mobile sink for WSNs.Journal of Future Generation Computer
Systems. 2017; 76©: 452-457.
XIV. Karaboga D, Okdem S, OzturkC.Cluster based wireless sensor network routing
using artificial bee colony algorithm. International journal of Wireless
Networks:2012;7(18): 847-860.
XV. Kokoris Kogias E, Voutyras O, Varvarigou T.TRM-SIoT:A scalable hybrid trust
& reputation model for the socialinternet of things. In: Proc., of IEEE 21st
international conference on emerging technologies and factory automation
(ETFA); 2016:1–9.
XVI. KrishnaveniV, Arumugam G.A novel enhanced bio-inspired harmony search
algorithm for clustering.International Conference onRecent Advances in
Computing and Software Systems (RACSS).2012;7-12.
XVII. Liang Y, Cai Z, Yu J, Han Q, Li Y. Deep learning based inferenceof private
information using embedded sensors insmart devices. IEEE Netw Mag 2018; 32:
8–14.
XVIII. Liu X, Li K, Guo S and Liu A. Top-k queries for categorizedRFID systems. IEEE
ACM T Network 2017; 25(5):2587–2600.
XIX. López T. S., Brintrup A., Isenberg, M A. and Mansfeld J. Resource Management
in the Internet of Things: Clustering, Synchronization and Software Agents.In:
Harrison, Mark, Uckelman, D and Michahelles, F, (eds.) Architecting the
Internet of Things. Springer-Verlag.2011; ISBN978-3-642-19156-5.
XX. Mohammad DahmanAlshehri, FarookhKhadeerHussain, Omar KhadeerHussain.
Clustering Driven Intelligent Trust Management Methodologyfor the Internet of
Things (CITM-IoT).Mobile Networks and Applications. 2018; 23(3):419-431.
XXI. Nitti, M., Girau, R., Atzori, L.Trustworthiness management in the Social
Internetof Things.IEEE Trans. Knowl. Data Eng.2014;26(5): 1253–1266.
XXII. P. K. Reddy, R.S. Babu. An Evolutionary Secure Energy Efficient Routing
Protocol in Internet of Things. International Journal of Intelligent Engineering
and Systems. 2017;10(3): 337-346.
XXIII. Qiu T, Liu X, Li K and Hu Q.Community-aware data propagationwith small
world feature for internet of vehicles.IEEE Commun Mag 2018;56(1):86-91.
XXIV. Raja SP, Rajkumar TD, and Raj VP. Internet of Things: challenges, issues and
applications. J Circuit Syst Comp 2018;27(12).
XXV. Rajagopal, A.Soft computing based cluster head selection in wireless sensor
network using bacterial foraging algorithm. Int. J. Electron. Commun. Eng2015;
9(3): 379-384.
XXVI. Reena Varghese, Dr. T. Chithralekha, CarynthiaKharkongor. Self-organized
Cluster Based Energy efficient MetaTrust model for Internet of Things. 2nd IEEE
International Conference on Engineering and Technology (ICETECH),
Coimbatore, 2016.
XXVII. Sandeep K.E, Kusuma S.M., Kumar V.B.P. Fire-LEACH: A Novel Clustering
Protocol for Wireless Sensor Networks Based on FireflyAlgorithm.International
Journal of ComputerScience Theory and Application. 2014: 1(1): 12-17.
XXVIII. Sarma N.V.S.N, and Gopi M. Implementation of Energy Efficient Clustering
Using Firefly Algorithm in Wireless Sensor Networks. 1st International Congress
on Computer, Electronics, Electrical, and Communication Engineering
(ICCEECE2014),IACSIT Press, Singapore, 2014: 59.
XXIX. Sarobin V.R, GanesanR. Bio-Inspired Cluster-Based Deterministic Node
Deployment in Wireless Sensor Networks. International Journal of Technology.
2016;4: 673-682.
XXX. Sarobin V.R, Ganesan R. Bio-Inspired, Cluster-Based Deterministic Node
Deployment in Wireless Sensor Networks. International Journal of
Technology.2016; 673-682.
XXXI. Senthilnath J, Omkar S.N, Mani V.Clustering using firefly algorithm:
performance study. Swarm and Evolutionary Computation. 2011: 1(3): 164 –
171.
XXXII. SowmyaGali, andVenkatramNidumolu. Multi-Context Trust Aware Routing For
Internet of Things.International Journal of Intelligent Engineering and
System.2019:12(1): 189-200.
XXXIII. Z. Yan, P. Zhang, and A.V. Vasilakos,.A survey on trust management for
Internet ofThings. J. Netw. Comput. Appl 2014; 42:120–134.
XXXIV. Zhang Q, Jacobsen RH, Toftegaard T. S.Bio-inspired low-complexity clustering
in large-scale dense wireless sensor networks.Global Communications
Conference (GLOBECOM), Anaheim, CA. 2012;658-663.
XXXV. Zhihua Zhang, Hongliang Zhu, ShoushanLuo, Yang Xin, and Xiaoming Liu.
Intrusion Detection Based on State Context andHierarchical Trust in Wireless
Sensor Network.IEEE Access, 2017; 5: 12088-12102.