Open Access
Subscription Access
An Interoperability Framework for Enhanced Security of Handheld Devices Using IoT-Based Secure Energy Efficient Firefly Optimization Algorithm
Security is a major challenge in the Internet of Things (IoT) domain as it plays a crucial role in a safe and uninterrupted data transmission, across various hand-held devices connected to the network. Establishing a secure Routing Protocol for Low power and lossy networks (RPL) is necessary and crucial, as it is the standard RPL network in IoT that helps to remove malicious nodes from the network. The existing researches focused on developing energy-saving techniques, malicious node detection techniques, as well as security-enhancing techniques, but neglected energy efficiency, and other trust-related considerations. This resulted in reduced confidentiality and unauthorized access to user data. To overcome these limitations, a Secure Energy Efficient Firefly Optimization Algorithm in RPL (SEEFOA-RPL) is proposed in this research for establishing a reliable and energy-efficient routing path by using Destination-Oriented Directed Acyclic Graph (DODAG) architecture. The proposed algorithm improves security measures in handheld devices such as smartphones, wearable watches, digital cameras, portable media players, and tablets. Initially, a trust model for the RPL network is established to calculate the trust parameters that help in building a secure routing in the network. The SEEFOA is capable of solving complex optimization problems, and finds the best optimum solution for a secure-energy efficient routing path. The proposed SEEFOA-RPL delivers a high-level performance in terms of Detection Rate (DR), False Negative Rate (FNR), and False Positive Rate (FPR), respectively measured at 99%, 12%, and 17% in an attack interval 4, and Packet Drop Ratio (PDR) measured at 82% in an attack interval of 1.5.
Keywords
Destination-Oriented Directed Acyclic Graph, Energy Efficiency, Internet of Things, Malicious Nodes Detection, Routing Protocol for Low Power and Lossy Networks, Secure Energy Efficient Firefly Optimization Algorithm.
User
Font Size
Information
- Y. Xu, J. Liu, Y. Shen, J. Liu, X. Jiang, and T. Taleb, “Incentive Jamming-Based Secure Routing in Decentralized Internet of Things,” IEEE Internet Things J., vol. 8, no. 4, pp. 3000–3013, 2021
- T. Ul Hassan, M. Asim, T. Baker, J. Hassan, and N. Tariq, “CTrust‐RPL : A control layer‐based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks‐based Internet of Things applications,” Trans Emerging Tel Tech, vol. 32, no. 3, 2021.
- P. Sathyaraj and D. Rukmani Devi, “Designing the routing protocol with secured IoT devices and QoS over Manet using trust-based performance evaluation method,” J Ambient Intell Human Comput, vol. 12, no. 7, pp. 6987–6995, Jul. 2021.
- R. Sahay, G. Geethakumari, and B. Mitra, “A novel blockchain based framework to secure IoT-LLNs against routing attacks,” Computing, vol. 102, no. 11, pp. 2445–2470, 2020.
- R. Nagaraju et al., “Secure Routing-Based Energy Optimization for IoT Application with Heterogeneous Wireless Sensor Networks,” Energies, vol. 15, no. 13, p. 4777, 2022.
- S. Sharma and V. K. Verma, “Security explorations for routing attacks in low power networks on internet of things,” J Supercomput, vol. 77, no. 5, pp. 4778–4812, 2021.
- S. Md. Mujeeb, R. Praveen Sam, and K. Madhavi, “Adaptive EHTARA: An Energy-Efficient and Trust Aware Secure Routing Algorithm for Big Data Classification in IoT Network,” Wireless Pers Commun, vol. 121, no. 1, pp. 621–646, 2021.
- N. Djedjig, D. Tandjaoui, F. Medjek, and I. Romdhani, “Trust-aware and cooperative routing protocol for IoT security,” Journal of Information Security and Applications, vol. 52, p. 102467, 2020.
- Y. Shibasaki, K. Iwamura, and K. Sato, “A Communication-Efficient Secure Routing Protocol for IoT Networks,” Sensors, vol. 22, no. 19, p. 7503, 2022.
- A. Pliatsios, K. Kotis, and C. Goumopoulos, “A systematic review on semantic interoperability in the IoE-enabled smart cities,” Internet of Things, vol. 22, p. 100754, 2023.
- Z. A. Almusaylim, N. Jhanjhi, and A. Alhumam, “Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP,” Sensors, vol. 20, no. 21, p. 5997, 2020.
- A. Sharma and N. Kumar, “Third Eye: An Intelligent and Secure Route Planning Scheme for Critical Services Provisions in Internet of Vehicles Environment,” IEEE Systems Journal, vol. 16, no. 1, pp. 1217–1227, 2022.
- E. O’Connell, W. O’Brien, M. Bhattacharya, D. Moore, and M. Penica, “Digital Twins: Enabling Interoperability in Smart Manufacturing Networks,” Telecom, vol. 4, no. 2, pp. 265–278, May 2023.
- G. Pradeep Reddy and Y. V. Pavan Kumar, “Internet of Things Based Communication Architecture for Switchport Security and Energy Management in Interoperable Smart Microgrids,” Arab J Sci Eng, vol. 48, no. 5, pp. 5809–5827, May 2023.
- I. Roussaki et al., “Building an interoperable space for smart agriculture,” Digital Communications and Networks, vol. 9, no. 1, pp. 183–193, Feb. 2023.
- M. Hosseinzadeh et al., “A Cluster-Tree-Based Secure Routing Protocol Using Dragonfly Algorithm (DA) in the Internet of Things (IoT) for Smart Agriculture,” Mathematics, vol. 11, no. 1, p. 80, 2022.
- S. M. Muzammal, R. K. Murugesan, N. Z. Jhanjhi, M. Humayun, A. O. Ibrahim, and A. Abdelmaboud, “A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things,” Sensors, vol. 22, no. 18, p. 7052, 2022.
- A. Agiollo, M. Conti, P. Kaliyar, T.-N. Lin, and L. Pajola, “DETONAR: Detection of Routing Attacks in RPL-Based IoT,” IEEE Trans. Netw. Serv. Manage., vol. 18, no. 2, pp. 1178–1190, 2021.
- A. O. Khadidos, S. Shitharth, A. O. Khadidos, K. Sangeetha, and K. H. Alyoubi, “Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism,” Journal of Sensors, vol. 2022, pp. 1–17, 2022.
- M. A. Abbasi, Z. A. Memon, N. M. Durrani, W. Haider, K. Laeeq, and G. A. Mallah, “A multi-layer trust-based middleware framework for handling interoperability issues in heterogeneous IOTs,” Cluster Comput, vol. 24, no. 3, pp. 2133–2160, 2021.
- A. Gupta and A. Singh, “An Intelligent Healthcare Cyber Physical Framework for Encephalitis Diagnosis Based on Information Fusion and Soft-Computing Techniques,” New Gener. Comput., vol. 40, no. 4, pp. 1093–1123, Dec. 2022.
- S. M. Muzammal, R. K. Murugesan, N. Jhanjhi, M. S. Hossain, and A. Yassine, “Trust and Mobility-Based Protocol for Secure Routing in Internet of Things,” Sensors, vol. 22, no. 16, p. 6215, 2022.
- F. Medjek, D. Tandjaoui, N. Djedjig, and I. Romdhani, “Multicast DIS attack mitigation in RPL-based IoT-LLNs,” Journal of Information Security and Applications, vol. 61, p. 102939, Sep. 2021.
- M. Zaminkar and R. Fotohi, “SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism,” Wireless Pers Commun, vol. 114, no. 2, pp. 1287–1312, Sep. 2020.
- P.S. Nandhini, S. Kuppuswami, S. Malliga, and R. DeviPriya, “nhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers,” The Journal of Supercomputing, vol. 79, no. 6, pp.6825-6848, 2023.
Abstract Views: 152
PDF Views: 1