Improved lightweight security approach routing protocol in internet of things

被引:5
作者
Mostafa, Samih M. [1 ]
Darwish, Ibrahim M. [1 ]
Saadi, Mohamed R. [2 ]
机构
[1] South Valley Univ, Comp Sci Math Dept, Fac Sci, Qena, Egypt
[2] Luxor Univ, Fac Comp & Informat, Luxor, Egypt
关键词
PDR; RSA based algorithm; AES KBSB algorithm; WSN; Internet of things;
D O I
10.1016/j.iot.2020.100208
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many of the devices dealing with the internet of things possessing network and storage capacity shortage are easily susceptible to hacking. In wireless Sensor Networks (WSN), secure data transmission is always a critical issue. Due to the prevalence of malicious attacks, WSN possesses an extensive number of compact, low-cost sensor hubs for gathering secret information. To provide improved secrecy, there is an urge to differentiate malicious nodes from normal nodes. Non-linear substitution is one of the necessary steps in the famous AES cryptosystem. A good quality S-box designing and effective processing time are the remarkable challenges for the rejection of susceptible attacks. The present research introduces an innovative RSA based algorithm and AES KDSB (Advanced Encryption Standard Key Dependent S Box) algorithm. This proposed algorithm with the key-dependent S-Box designation will overcome the limitations of the static S-box. The subkey is developed on the basis of the data block in order to guarantee more security against hacking. The brute force attack broke the data encryption standard since the robust S box used is against replacement. Further, traffic organization with respect to criticality and importance offers a good opportunity for nodes with topmost priority for accessing the channel and capturing the medium. And hence the services are quickly served with minimized delay. The overall efficiency of the suggested system is proved by comparing the framework with the prevailing techniques (BTEM, AF TNS, Trust Doe) with respect to the factors such as throughput, delay, trustworthiness, PDR, False positives and detection rates. Future work regarding the proposed system is also discussed. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:14
相关论文
共 31 条
[1]   SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things [J].
Airehrour, David ;
Gutierrez, Jairo A. ;
Ray, Sayan Kumar .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 :860-876
[2]   A Lightweight Trust Design for IoT Routing [J].
Airehrour, David ;
Gutierrez, Jairo ;
Ray, Sayan Kumar .
2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, :552-557
[3]   Diagonal and Vertical Routing Protocol for Underwater Wireless Sensor Network [J].
Ali, Tariq ;
Jung, Low Tang ;
Faye, Ibrahima .
2ND INTERNATIONAL CONFERENCE ON INNOVATION, MANAGEMENT AND TECHNOLOGY RESEARCH, 2014, 129 :372-379
[4]   Towards IoT data classification through semantic features [J].
Antunes, Mario ;
Gomes, Diogo ;
Aguiar, Rui L. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 :792-798
[5]   Assessing and Comparing Vulnerability Detection Tools for Web Services: Benchmarking Approach and Examples [J].
Antunes, Nuno ;
Vieira, Marco .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (02) :269-283
[6]  
Anwar R.W., 2019, BTEM BELIEF BASED TR
[7]   Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption [J].
Belazi, Akram ;
Khan, Majid ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
NONLINEAR DYNAMICS, 2017, 87 (01) :337-361
[8]   Cloud computing adoption framework: A security framework for business clouds [J].
Chang, Victor ;
Kuo, Yen -Hung ;
Ramachandran, Muthu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 57 :24-41
[9]   Fog and IoT: An Overview of Research Opportunities [J].
Chiang, Mung ;
Zhang, Tao .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (06) :854-864
[10]  
Dhumane A., 2016, Proceedings of the International Multiconference of Engineers and Computer Scientists, V1, P16