scholarly journals LWTSM-IoT: Light Weight Trust Sensing Mechanism for Internet of Things

Author(s):  
M Prasad ◽  
◽  
D Reddy ◽  

In Internet of Things (IoT), secure communication is a prime concern since the open internet source and vast heterogeneity offers several challenges to the network. To achieve an enhanced security, an effective trust evaluation model is required through which the abnormal nodes can be detected and isolated. Towards this objective we have proposed a Light Weight Trust Sensing (LWTS) mechanism for IoT routing. Several factors like Packet Forwarding Factor, Packet Consistency Factor and Packet Repetition Factor are employed to analyze the behaviour of IoT nodes. Along with these factors, the proposed model also checks for energy efficiency to achieve an improved network lifetime. Trust Calculation process is accomplished in two phases; they are direct and indirect fashion. Finally based on obtained total trust, each neighbour node are categorized as No Trust, Average Trust, Fair Trust and Good Trust and the node with good trust is selected as next-hop forwarding node. For the proposed approach extensive simulations are carried out and the performance is measured through Packet Delivery Ratio, Malicious Detection Rate and Average Energy Consumption. The obtained results prove the effectiveness when compared to existing approaches.

Author(s):  
Zahrah A. Almusaylim ◽  
Abdulaziz Alhumam ◽  
Wathiq Mansoor ◽  
Pushpita Chatterjee ◽  
Noor Zaman Jhanjhi

The rapid growth of the smart Internet of Things (IoT) and massive propagation of wireless technologies revealed the recent opportunities for development in various domains of real life such as smart cities and E-Health applications. A slight defense against different forms of attacks is offered for the current secure and lightweight Routing Protocol for Low Power and Lossy Networks (RPL) of IoT resource-constrained devices. Data packets are highly likely to be exposed while transmitting them during data packets routing. The RPL rank and version number attacks, which are two forms of RPL attacks, can have critical consequences for RPL networks. The studies conducted on these attacks have several security defects and performance shortcomings. The research proposes a Secure RPL Routing Protocol (SRPL-RP) for rank and version number attacks. It mainly detects, mitigates and isolates attacks in the RPL networks. The detection is based on a comparison of ranks strategy. The mitigation uses threshold and attacks status tables, and the isolation adds them to a blacklist table and alerts relevant nodes to skip them. SRPL-RP supports diverse types of network topologies and is comprehensively analyzed with multiple studies such as Standard RPL with Attacks, SBIDS and RPL+ Shield. The analysis results showed that the SRPL-RP achieves great improvements with Packet Delivery Ratio (PDR) of 98.48%, control message value of 991 packets/second, and average energy consumption of 1231.75 joules. It provides a better accuracy rate with 98.17% under the attacks.


Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 5997
Author(s):  
Zahrah A. Almusaylim ◽  
NZ Jhanjhi ◽  
Abdulaziz Alhumam

The rapid growth of the Internet of Things (IoT) and the massive propagation of wireless technologies has revealed recent opportunities for development in various domains of real life, such as smart cities and E-Health applications. A slight defense against different forms of attack is offered for the current secure and lightweight Routing Protocol for Low Power and Lossy Networks (RPL) of IoT resource-constrained devices. Data packets are highly likely to be exposed in transmission during data packet routing. The RPL rank and version number attacks, which are two forms of RPL attacks, can have critical consequences for RPL networks. The studies conducted on these attacks have several security defects and performance shortcomings. In this research, we propose a Secure RPL Routing Protocol (SRPL-RP) for rank and version number attacks. This mainly detects, mitigates, and isolates attacks in RPL networks. The detection is based on a comparison of the rank strategy. The mitigation uses threshold and attack status tables, and the isolation adds them to a blacklist table and alerts nodes to skip them. SRPL-RP supports diverse types of network topologies and is comprehensively analyzed with multiple studies, such as Standard RPL with Attacks, Sink-Based Intrusion Detection Systems (SBIDS), and RPL+Shield. The analysis results showed that the SRPL-RP achieved significant improvements with a Packet Delivery Ratio (PDR) of 98.48%, a control message value of 991 packets/s, and an average energy consumption of 1231.75 joules. SRPL-RP provided a better accuracy rate of 98.30% under the attacks.


Author(s):  
Baranidharan V. ◽  
Sivaradje G. ◽  
Kiruthiga Varadharajan ◽  
Vignesh S.

The most adverse characteristics of underwater wireless sensor network (UWSN) communications are high propagation delay, high error rate, very low bandwidth, and limited available energy. The energy resources replacement is also more expensive. The proposed clustering-based geographic- opportunistic routing with adjustment of depth-based topology control for communication recovery of void regions (C- GEDAR). The cluster-based GEDAR routes the packet to the surface of sonobuoys with the help of clusters. The void sensor node recovery algorithm is used to recover the void nodes to calculate their new depth. The proposed routing protocol is to be simulated and its performances are evaluated by using an Aquasim simulator. The simulated result shows that C-GEDAR performs better average energy consumption, good packet delivery ratio (PDR) and less end-to-end delay.


2018 ◽  
Vol 7 (4.20) ◽  
pp. 15
Author(s):  
Ashwala Mohan ◽  
Dr. Bhanu Bhaskara

With the increased interest in the utilization of smart applications, the IoT has gained a lot of popularity in the real world scenario. Due to the integration of different heterogeneous devices in a single network, various types of security issues will arise in the IoT. To ensure more security in IoT, this paper proposes a new trust aware routing framework based on the inherent communication and data properties of devices connected in the network. A new trust metric is derived in this paper by combining two different trusts based on the communication between nodes and the information passing through them. Further to achieve a prolonged network lifetime with optimal resource conservation, a clustering based communication strategy is accomplished. Extensive simulations are carried out by varying the malicious nature of network and the performance is measured through the metrics, packet loss ratio, packet delivery ratio, delay, network lifetime and average energy consumption. 


Author(s):  
Kirti A. Adoni ◽  
Anil S. Tavildar ◽  
Krishna K. Warhade

Background: The performance of Mobile Ad-hoc Networks get severely degraded due to various attacks including Selfish Behaviour attack. The detection of malicious nodes and avoidance of such nodes for data forwarding is important to enhance the MANET’s performance. Methods: A probabilistic model based on Single Sided Laplacian distribution for the random ON/OFF switching time of this attack is proposed. The model is used to make appropriate decisions regarding assignment of trust levels to suspicious nodes. The proposed protocol, based on this trust along with Confidence values of nodes, referred to as OLSRT-C protocol is used to select the optimum path for data forwarding. Simulations are carried out using Network Simulator NS2.35. Results: The random behavior of Selfish Behaviour attack is analyzed by considering all the possible random parameters. The random deployment of mobile nodes, number of malicious nodes, number of times the malicious nodes switch and timing instances at which these nodes change their states are considered. From the results, it is observed that, the OLSRTC protocol gives stable performance for Packet Delivery Ratio and Routing Overheads whereas for OLSR protocol, Packet Delivery Ratio gradually reduces and Routing Overheads increase, for percentage of malicious nodes increase from 10% to 50%. For OLSRT-C protocol, Average Energy Consumption per node increases marginally compared to OLSR protocol. Conclusion: The proposed OLSRT-C protocol successfully mitigates randomized Selfish Behaviour attack with marginal increase in the Average Energy Consumption per node. The Protocol Efficacy for OLSRT-C protocol is much higher compared to OLSR protocol.


Author(s):  
Kirti A. Adoni ◽  
Anil S. Tavildar ◽  
Krishna K. Warhade

Background and Objective: Random Black Hole (BH) attack significantly degrades MANET’s performance. For strategic applications, the performance parameters like Packet Delivery Ratio, Routing Overheads, etc. are important. The objectives are: (a) To model random BH attack, (b) To propose a routing strategy for the protocol to mitigate random BH attack, (c) To evaluate and compare the network performance of modified protocol with the standard protocol. Methods: The random BH attack is modelled probabilistically. The analysis is carried out by varying Black Hole Attack (BHA) time as Early, Median, Late occurrences and mix of these three categories. The blocking performance is also analysed by varying the percentages of malicious presence in the network. Normal Optimized Link State Routing (OLSR) protocol is used to simulate the MANET performance using a typical medium size network. The protocol has then been modified using Trust- Confidence aware routing strategy, named as TCAOLSR, with a view to combat the degradations due to the random BH attack. Results: The random behavior of Black Hole attack is analyzed with all the possible random parameters, like deployment of mobile nodes, number of malicious nodes and timing instances at which these nodes change their state. From the results of individual type- Early, Median and Late, it is observed that the TCAOLSR protocol gives stable performance for Packet Delivery Ratio (PDR) and Routing Overheads (RO), whereas for OLSR protocol PDR gradually reduces and RO increases. For individual and mix type, Average Energy Consumption (AEC) per node increases marginally for TCAOLSR protocol. For the mix type, PDR for TCAOLSR is 40-60% better whereas RO for TCAOLSR is very less compared to OLSR protocol. The efficacy of the TCAOLSR protocol remains stable for different categories of BH attack with various percentages of malicious nodes compared to OLSR with the same environment. Conclusion: Simulations reveal that the modified protocol TCAOLSR, effectively mitigates the network degradation for Packet Delivery Ratio and Routing Overheads considerably, at the cost of a slight increase in Average Energy Consumption per node of the network. Efficacy of the OLSR and TCAOLSR protocols has also been defined and compared to prove robustness of the TCAOLSR protocol.


2018 ◽  
Vol 7 (3.3) ◽  
pp. 82
Author(s):  
Santosh Anand ◽  
Pillai Atulya Radhakrishna

In current technology Adhoc network is most commonly used in communication network. Major parts of the Adhoc network devices are based on the sensor nodes. Sensor devices operated on the battery so energy is vital constraint. Effective Utilization of the energy of the sensor nodes and sensor networks to the full extent is highly impracticable. Optimization of the network root and the load balancing in coverage helps to maximize the lifetime of the sensor network considerably. The research carry out on sensor network, deployment model is proposed which essentially finds the optimized roots with the help of  neighbour discovery algorithm which find the neighbour and non neighbour nodes and analysis the load of the network based on Packet Retrieval in RREQ, throughput, average energy consumption, packet delivery ratio and packet drop. 


2019 ◽  
Vol 8 (3) ◽  
pp. 6013-6018

MANETs are a trending topic in the wireless communication network. MANETs are formed automatically by an autonomous system of mobile nodes that are connected via wireless links. Cluster-head gateway switch routing protocol (CGSR) is a proactive protocol which is also called table-driven protocol. It consists of routing table information before setting up a connection. Ad-hoc on-demand distance vector protocol (AODV) is a reactive protocol, it sets path only when demanded by the network. CGSR protocol forms a group of nodes into clusters and selects a node as cluster-head based on some clustering algorithms for each cluster. In this paper, we have proposed a protocol, which combines the advantages of both CGSR and AODV to minimize traffic congestion in an ad-hoc wireless network. The performance metrics such as routing overhead, end-end delay, packet delivery ratio, throughput, and average energy consumption are enhanced and compared with other clustering protocols such as CGSR and LEACH protocols. The comparison result reveals that the routing overhead, end-end delay, and the average energy consumption is reduced and packet delivery ratio, throughput is improved.


Author(s):  
Prasanna Venkatesan Theerthagiri

Background: Packet forwarding is an essential network operation in wireless networks to establish communication among wireless devices. In mobile wireless networks, data transmission occurs in the form of packet relaying. In dynamic environmental networks, relaying of the packet is a more complex process and much essential activity. Objective: It requires the co-operation of intermediate nodes in the network. Specifically, in Mobile Adhoc Networks (MANET) it is the most tedious job because of its dynamic topology, limited energy, and other resource constraints. In this paper, a genetic algorithm is adopted for stimulating the packet relaying, such that to assist the co-operation between various nodes in the network. Methods: The genetic algorithm is a metaheuristic process-based evolutionary algorithms. It intends to produce high-quality optimized solutions to any given complex problems. The current research work had carried out an extensive investigation and comparison of existing relevant genetic algorithm based algorithms. Results: The experimental results are evaluated based on the methodology of the genetic algorithm, the number of nodes, robustness, scalability, packet delivery ratio, average energy consumption, and other parameters.


Energies ◽  
2021 ◽  
Vol 14 (2) ◽  
pp. 442
Author(s):  
Xiaoyue Zhu ◽  
Bo Gao ◽  
Xudong Yang ◽  
Zhong Yu ◽  
Ji Ni

In China, a surging urbanization highlights the significance of building energy conservation. However, most building energy-saving schemes are designed solely in compliance with prescriptive codes and lack consideration of the local situations, resulting in an unsatisfactory effect and a waste of funds. Moreover, the actual effect of the design has yet to be thoroughly verified through field tests. In this study, a method of modifying conventional building energy-saving design based on research into the local climate and residents’ living habits was proposed, and residential buildings in Panzhihua, China were selected for trial. Further, the modification scheme was implemented in an actual project with its effect verified by field tests. Research grasps the precise climate features of Panzhihua, which was previously not provided, and concludes that Panzhihua is a hot summer and warm winter zone. Accordingly, the original internal insulation was canceled, and the shading performance of the windows was strengthened instead. Test results suggest that the consequent change of SET* does not exceed 0.5 °C, whereas variations in the energy consumption depend on the room orientation. For rooms receiving less solar radiation, the average energy consumption increased by approximately 20%, whereas for rooms with a severe western exposure, the average energy consumption decreased by approximately 11%. On the other hand, the cost savings of removing the insulation layer are estimated at 177 million RMB (1 USD ≈ 6.5 RMB) per year. In conclusion, the research-based modification method proposed in this study can be an effective tool for improving building energy efficiency adapted to local conditions.


Sign in / Sign up

Export Citation Format

Share Document