Trust-based secure routing in IoT network based on rider foraging optimization algorithm

被引:3
|
作者
Vijay, Kore Amit [1 ]
Ranjan, Mishra Manoj [2 ]
机构
[1] Deemed Be Univ, KIIT, Bhubaneswar 751024, Odisha, India
[2] Deemed Be Univ, KIIT, Sch Comp Applicat, Bhubaneswar 751024, Odisha, India
关键词
Secure routing; Rider Optimization algorithm (ROA); Bacterial Foraging optimization algorithm (BFO); Low-Energy Adaptive Clustering Hierarchy (LEACH); Internet of Things (IoT); INTERNET; THINGS; PROTOCOL; ENERGY;
D O I
10.3233/JHS-220680
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the mobility and frequent topology changes, routing the data poses a challenging issue in the Internet of Things (IoT). Security poses a fundamental requirement factor in most IoT applications particularly, secure routing among the IoT nodes. The aim of this paper is to develop secure routing in IoT with minimal delay, minimal energy consumption and high throughput. Thus, a new algorithm, named Rider Foraging Optimization algorithm (RFO) is designed by the incorporation of standard Rider Optimization algorithm (ROA) and Bacterial Foraging optimization algorithm (BFO) that render an optimal solution, which is the optimal path for transmitting the information. Initially, the trust of the nodes is evaluated and the cluster head (CH) is chosen based on Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol to securely transmit the data. Then, the proposed RFO algorithm selects the optimal path using the fitness factors, such as trust, energy, and delay constraints. The results revealed that the energy consumption of the nodes is reduced and the lifetime of the network is enhanced through the implementation of the proposed RFO, which attained a maximal throughput of 1, and minimal delay and energy consumption of 0.1169 and 0.0002, respectively.
引用
收藏
页码:75 / 94
页数:20
相关论文
共 50 条
  • [21] Dynamic Trust-Based Device Legitimacy Assessment Towards Secure IoT Interactions
    Garagad, Vishwanath
    Iyer, Nalini
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2022, 18 (03) : 269 - 276
  • [22] A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things
    Muzammal, Syeda Mariam
    Murugesan, Raja Kumar
    Jhanjhi, Noor Zaman
    Humayun, Mamoona
    Ibrahim, Ashraf Osman
    Abdelmaboud, Abdelzahir
    SENSORS, 2022, 22 (18)
  • [23] ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
    Khan, Tayyab
    Singh, Karan
    Hasan, Mohd Hilmi
    Ahmad, Khaleel
    Reddy, G. Thippa
    Mohan, Senthilkumar
    Ahmadian, Ali
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 125 : 921 - 943
  • [24] Trust-Based Flying Ad Hoc Network: A Survey
    Kundu, Joydeep
    Alam, Sahabul
    Das, Jadav Chandra
    Dey, Arindam
    De, Debashis
    IEEE ACCESS, 2024, 12 : 99258 - 99281
  • [25] A Distributed Ledger with Trust-Based Data Aggregation for a Lightweight IoT Network
    Deshprabhu, Tanmayee
    Coon, Justin P.
    Badiu, Mihai-Alin
    2021 17TH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS, ISWCS, 2021,
  • [26] Secure IoT Routing through Manifold Criterion Trust Evaluation using Ant Colony Optimization
    Sharmin, Afsah
    Olanrewaju, Rashidah Funke
    Khan, Burhan Ul Islam
    Anwar, Farhat
    Motakabber, S. M. A.
    Rosely, Nur Fatin Liyana Mohd
    Hashim, Aisha Hassan Abdalla
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (11) : 131 - 143
  • [27] Trust-Based Secure Multi-Cloud Collaboration Framework in Cloud-Fog-Assisted IoT
    Zhang, Jiawei
    Li, Teng
    Ying, Zuobin
    Ma, Jianfeng
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (02) : 1546 - 1561
  • [28] Trust-Based and Optimized RPL Routing in Social Internet of Things Network
    Selvaraj, S.
    Thangarajan, R.
    Saravanan, M.
    MOBILE COMPUTING AND SUSTAINABLE INFORMATICS, 2022, 68 : 513 - 529
  • [29] Advanced network security with an integrated trust-based intrusion detection system for routing protocol
    Kumar, Ajay
    Budhiraja, Ishan
    Garg, Deepak
    Garg, Sahil
    Choi, Bong Jun
    Alrashoud, Mubarak
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 120 : 378 - 390
  • [30] Improved Blowfish Algorithm-Based Secure Routing Technique in IoT-Based WSN
    Alotaibi, Majid
    IEEE ACCESS, 2021, 9 (09): : 159187 - 159197