Secret Dynamic Key Authentication and Decision Trust Secure Routing Framework for Internet of Things Based WSN

被引:11
作者
Meena, Uma [1 ]
Sharma, Promila [2 ]
机构
[1] SRMIST, CSE Dept, Delhi NCR Campus, Modinagar, UP, India
[2] Mewar Univ, Dept Comp Sci, Gangarar, Rajasthan, India
关键词
Internet of things; Wireless sensor network; Secure routing; Clustering; Key agreement and authentication; WIRELESS SENSOR NETWORKS; ALGORITHM; PROTOCOL; SCHEME;
D O I
10.1007/s11277-022-09632-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet of Things (IoT) devices has risen drastically due to the advancement of Information and communication technologies. Wireless sensor network (WSN) performs a key function in the development of IoT applications like smart factories, transportation systems, military, smart cities, healthcare systems, etc. However, energy, memory, processing and computation resources are the restrictions included in such smart devices. Along with these restrictions, achieving reliability with secure data transmission is a fundamental challenge for WSN. To overcome these challenges, a dynamic key authentication and energy efficient secure routing protocol is proposed in this paper. The proposed approach consists of node clustering, cluster head (CH) selection, key authentication and secure routing. In WSN, sensor nodes (SNs) are deployed randomly. Energy efficient seagull K-medoid clustering (SKC) algorithm is proposed to cluster these SNs based on the intrinsic qualities of nodes and CH is selected using Rider Bald Eagle Search (RBES) algorithm. Next, the Key agreement process is carried out using a Dynamic key authentication scheme, which offers safer data transmission over the network as security is an important factor. Finally, Decision trust routing protocol is introduced for the secure and effective routing for IoT based WSN. MATLAB is the implementation tool used for experiment. The experimental results showed the proposed method is efficient for energy efficient and secure routing than the existing methods.
引用
收藏
页码:1753 / 1781
页数:29
相关论文
共 37 条
[1]  
Alzubaidi W.K., SECURE ROUTING SCHEM
[2]   EDAK: An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs [J].
Athmani, Samir ;
Bilami, Azeddine ;
Boubiche, Djallel Eddine .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 92 :789-799
[3]   A lightweight IoT-based security framework for inventory automation using wireless sensor network [J].
Batra, Isha ;
Verma, Sahil ;
Kavita ;
Alazab, Mamoun .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (04)
[4]   LEACH-MAC: a new cluster head selection algorithm for Wireless Sensor Networks [J].
Batra, Payal Khurana ;
Kant, Krishna .
WIRELESS NETWORKS, 2016, 22 (01) :49-60
[5]   RideNN: A New Rider Optimization Algorithm-Based Neural Network for Fault Diagnosis in Analog Circuits [J].
Binu, D. ;
Kariyappa, B. S. .
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2019, 68 (01) :2-26
[6]   A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks [J].
Deebak, B. D. ;
Al-Turjman, Fadi .
AD HOC NETWORKS, 2020, 97
[7]   Multi-factor user authentication scheme for IoT-based healthcare services [J].
Dhillon P.K. ;
Kalra S. .
Journal of Reliable Intelligent Environments, 2018, 4 (03) :141-160
[8]  
Elhoseny M, 2019, STUD SYST DECIS CONT, V165, P115, DOI 10.1007/978-3-319-92807-4_6
[9]   A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things [J].
Han, Guangjie ;
Zhou, Lina ;
Wang, Hao ;
Zhang, Wenbo ;
Chan, Sammy .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :689-697
[10]   An Energy-Efficient and Secure Routing Protocol for Intrusion Avoidance in IoT-Based WSN [J].
Haseeb, Khalid ;
Almogren, Ahmad ;
Islam, Naveed ;
Din, Ikram Ud ;
Jan, Zahoor .
ENERGIES, 2019, 12 (21)