A Cluster-Tree-Based Secure Routing Protocol Using Dragonfly Algorithm (DA) in the Internet of Things (IoT) for Smart Agriculture

被引:21
作者
Hosseinzadeh, Mehdi [1 ,2 ,3 ]
Tanveer, Jawad [4 ]
Rahmani, Amir Masoud [5 ]
Yousefpoor, Efat [6 ]
Yousefpoor, Mohammad Sadegh [6 ]
Khan, Faheem [7 ]
Haider, Amir [8 ]
机构
[1] Duy Tan Univ, Inst Res & Dev, Da Nang 550000, Vietnam
[2] Duy Tan Univ, Sch Med & Pharm, Da Nang 550000, Vietnam
[3] Univ Human Dev, Comp Sci, Sulaymaniyah 07786, Iraq
[4] Sejong Univ, Dept Comp Sci & Engn, Seoul 05006, South Korea
[5] Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, Yunlin 64002, Taiwan
[6] Islamic Azad Univ, Dept Comp Engn, Dezful Branch, Dezful 5716963896, Iran
[7] Gachon Univ, Dept Comp Engn, Seongnam 13120, South Korea
[8] Sejong Univ, Sch Intelligent Mechatron Engn, Seoul 05006, South Korea
关键词
Internet of Things (IoT); smart agriculture; routing; dragonfly algorithm (DA); wireless sensors networks (WSNs); WIRELESS SENSOR NETWORKS; TRUST; SCHEME;
D O I
10.3390/math11010080
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The Internet of Things defines a global and comprehensive network whose task is to monitor and control the physical world by collecting, processing, and analyzing data sensed by IoT devices. This network has succeeded in various areas, and one of its most important applications is in smart agriculture because there are many demands for producing high-quality foodstuff in the world. These demands need new production schemes in the agriculture area. In IoT, communication security is essential due to the extensive heterogeneity of IoT devices. In this paper, a cluster-tree-based secure routing approach using the dragonfly algorithm (CTSRD) is proposed for IoT. The proposed scheme presents a distributed and lightweight trust mechanism called weighted trust (W-Trust). W-Trust reduces the trust value corresponding to malicious nodes based on a penalty coefficient to isolate this node in the network. Furthermore, it improves the trust value of honest IoT devices based on a reward coefficient. Additionally, CTSRD introduces a trust-based clustering process called T-Clustering. In this clustering process, cluster head nodes (CHs) are selected among honest IoT nodes. Finally, CTSRD establishes a routing tree based on the dragonfly algorithm (DA) between CHs. This tree is called DA-Tree. To evaluate the quality of the routing tree, a new fitness function is provided in CTSRD. DA-Tree finds a secure, stable, and optimal routing tree to balance the consumed energy and boost the network lifetime. CTSRD is compared with EEMSR and E-BEENISH with regard to the network lifetime, consumed energy, and packet delivery rate. This comparison shows that our scheme can uniformly distribute the consumed energy in IoT and improves the energy consumption and network lifetime. However, it has a slightly lower packet delivery rate than EEMSR.
引用
收藏
页数:25
相关论文
共 45 条
[1]   An Energy-Efficient Data Aggregation Mechanism for IoT Secured by Blockchain [J].
Ahmed, Adeel ;
Abdullah, Saima ;
Bukhsh, Muhammad ;
Ahmad, Israr ;
Mushtaq, Zaigham .
IEEE ACCESS, 2022, 10 :11404-11419
[2]   SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things [J].
Airehrour, David ;
Gutierrez, Jairo A. ;
Ray, Sayan Kumar .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 :860-876
[3]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[4]   Seed: secure and energy efficient data-collection method for IoT network [J].
Arora, Sofia ;
Batra, Isha ;
Malik, Arun ;
Luhach, Ashish Kr. ;
Alnumay, Waleed S. ;
Chatterjee, Pushpita .
MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (02) :3139-3153
[5]  
Firouzi F., 2020, Intelligent Internet of Things: From Device to Fog and Cloud
[6]   An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things [J].
Gali, Sowmya ;
Nidumolu, Venkatram .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (03) :1779-1789
[7]  
Glissa G, 2016, IEEE GLOB COMM CONF
[8]   Securing the Internet of Things: Challenges, threats and solutions [J].
Grammatikis, Panagiotis I. Radoglou ;
Sarigiannidis, Panagiotis G. ;
Moscholios, Ioannis D. .
INTERNET OF THINGS, 2019, 5 :41-70
[9]   A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures [J].
Hassija, Vikas ;
Chamola, Vinay ;
Saxena, Vikas ;
Jain, Divyansh ;
Goyal, Pranav ;
Sikdar, Biplab .
IEEE ACCESS, 2019, 7 :82721-82743
[10]   GENETIC ALGORITHMS [J].
HOLLAND, JH .
SCIENTIFIC AMERICAN, 1992, 267 (01) :66-72