An Efficient and Secure Fog Based Routing Mechanism in IoT Network

被引:4
作者
Malik, Tauqeer Safdar [1 ]
Tanveer, Jawad [2 ]
Anwar, Shahid [3 ]
Mufti, Muhammad Rafiq [4 ]
Afzal, Humaira [3 ]
Kim, Ajung [5 ]
机构
[1] Bahauddin Zakariya Univ, Dept Informat Technol, Multan 60800, Pakistan
[2] Sejong Univ, Dept Comp Sci & Engn, Seoul 05006, South Korea
[3] Bahauddin Zakariya Univ, Dept Comp Sci, Multan 60800, Pakistan
[4] COMSATS Univ Islamabad, Dept Comp Sci, Vehari Campus, Islamabad 61100, Pakistan
[5] Sejong Univ, Sch Opt Engn, Seoul 05006, South Korea
关键词
Internet of Things (IoT); cloud-native fog computing; advanced algorithms; wireless communications; security in IoT; SENSOR; PROTOCOL; AUTHENTICATION; ALGORITHM;
D O I
10.3390/math11173652
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The Internet of Things (IoT) networks are the most prone to internal as well as external attacks in addition to energy consumption problems. Conventional security solutions are not able to address these issues effectively due to the limited resources of sensor nodes participating in IoT communications. In this work, an Efficient and Secure Fog Based Routing Mechanism (ESFRM) is proposed to protect the network from faulty internal as well as external attacks. Every node participating in IoT communications calculates the comprehensive trust value of the next intermediate node which is the addition of direct trust, indirect trust and energy trust values before forwarding the data. This comprehensive trust value is then compared with the comprehensive threshold trust value to decide whether the particular node is a rogue node or a valid normal node. Further, an enhanced RSA (Rivest, Shamir, Adleman) algorithm is implemented to provide three levels of data security from Cluster Head (CH) to fog node, from fog node to cloud server and directly from CH to cloud server. For this purpose, an efficient CH selection technique is also proposed in this work. The proposed methodology is compared with the Secure Energy-efficient Fog-based Routing (SEFR) protocol and Trust-aware Secure Routing Protocol (TSRP). The evaluation results show that the proposed ESFRM outperforms the conventional schemes with respect to energy consumption, malicious node detection and transmission rate.
引用
收藏
页数:18
相关论文
共 43 条
[11]   A Fog Computing Approach for Localization in WSN [J].
Bhargava, Kriti ;
Ivanov, Stepan .
2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
[12]   A light-weight solution for blackhole attacks in wireless sensor networks [J].
Bilgin, Bilal Erman ;
Baktir, Selcuk .
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2019, 27 (04) :2557-2570
[13]  
Elamurugu V., 2021, International Journal of Computer Networks and Applications, P788, DOI [10.22247/ijcna/2021/210726, 10.22247/ijcna/2021/210726]
[14]   A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption [J].
Elhoseny, Mohamed ;
Elminir, Hamdy ;
Riad, Alaa ;
Yuan, Xiaohui .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (03) :262-275
[15]   Integrated Energy and Trust-Based Semi-Markov Prediction for Lifetime Maximization in Wireless Sensor Networks [J].
Famila, S. ;
Jawahar, A. ;
Vimalraj, S. Leones Sherwin ;
Lydia, J. .
WIRELESS PERSONAL COMMUNICATIONS, 2021, 118 (01) :505-522
[16]   MSCR: multidimensional secure clustered routing scheme in hierarchical wireless sensor networks [J].
Fang, Weidong ;
Zhang, Wuxiong ;
Chen, Wei ;
Liu, Jin ;
Ni, Yepeng ;
Yang, Yinxuan .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
[17]   TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing [J].
Fang, Weidong ;
Zhang, Wuxiong ;
Chen, Wei ;
Liu, Yang ;
Tang, Chaogang .
WIRELESS NETWORKS, 2020, 26 (05) :3169-3182
[18]  
Gomathi, 2017, INT J COMPUT SCI ENG, V5, P1761
[19]   A secure routing protocol with regional partitioned clustering and Beta trust management in smart home [J].
Hong, Zhen ;
Shao, Qian ;
Liao, Xiaojing ;
Beyah, Raheem .
WIRELESS NETWORKS, 2019, 25 (07) :3805-3823
[20]   Trust based energy efficient data collection with unmanned aerial vehicle in edge network [J].
Jiang, Bo ;
Huang, Guosheng ;
Wang, Tian ;
Gui, Jinsong ;
Zhu, Xiaoyu .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (06)