Loading…

An Opportunistic Approach for Cloud Service-Based IoT Routing Framework Administering Data, Transaction, and Identity Security

There has been an asymmetric shift toward harnessing cloud-based technologies as the world focuses on shifting operations remotely. Data security for remote operations is crucial for the protection and preservation of critical infrastructure. Furthermore, there has been an emerging trend to integrat...

Full description

Saved in:
Bibliographic Details
Published in:IEEE internet of things journal 2022-02, Vol.9 (4), p.2505-2512
Main Authors: Sharma, Deepak Kumar, Bhardwaj, Kartik Krishna, Banyal, Siddhant, Gupta, Riyanshi, Gupta, Nitin, Nkenyereye, Lewis
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c293t-1902ef0eff51ae61e9b01cc396b0538dac8931492cd2968620780835545bc8fc3
cites cdi_FETCH-LOGICAL-c293t-1902ef0eff51ae61e9b01cc396b0538dac8931492cd2968620780835545bc8fc3
container_end_page 2512
container_issue 4
container_start_page 2505
container_title IEEE internet of things journal
container_volume 9
creator Sharma, Deepak Kumar
Bhardwaj, Kartik Krishna
Banyal, Siddhant
Gupta, Riyanshi
Gupta, Nitin
Nkenyereye, Lewis
description There has been an asymmetric shift toward harnessing cloud-based technologies as the world focuses on shifting operations remotely. Data security for remote operations is crucial for the protection and preservation of critical infrastructure. Furthermore, there has been an emerging trend to integrate IoT-based devices with the expanding cloud infrastructure. In this work, mobile cloud-based infrastructure is considered where contact opportunities are developed in an opportunistic manner so as to facilitate efficient data forwarding and secure process handling. A probabilistic framework is proposed that facilitates data routing between the nodes and local cloud in an IoT network coupled with a multitier trust and encryption scheme for secure data delivery in the cloud-based IoT network. The proposed scheme is evaluated with simulations over two data sets against attack resilience and routing efficiency-based performance metrics, comparing to standard protocols, such as PRoPHET, MaxProp, ProWait, and TCAFE, which displays the enhancement in operations of Sec-CIoT.
doi_str_mv 10.1109/JIOT.2021.3078810
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JIOT_2021_3078810</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9427245</ieee_id><sourcerecordid>2625366209</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-1902ef0eff51ae61e9b01cc396b0538dac8931492cd2968620780835545bc8fc3</originalsourceid><addsrcrecordid>eNpNkF9LwzAUxYMoOOY-gPgS8HWd-dNmzWOdTieDgdbnkqWpZm5JTVJlL352UzbEp3u4nHMu9wfAJUYTjBG_eVqsyglBBE8omuY5RidgQCiZJilj5PSfPgcj7zcIoRjLMGcD8FMYuGpb60JntA9awqJtnRXyHTbWwdnWdjV8Ue5LS5XcCq9quLAlfLZd0OYNzp3YqW_rPmBR73TfoFy_vxNBjGHphPFCBm3NGAoTo7UyQYd9bJSdi-ICnDVi69XoOIfgdX5fzh6T5ephMSuWiSSchgRzRFSDVNNkWCiGFV8jLCXlbI0ymtdC5pzilBNZE85yRiIGlNMsS7O1zBtJh-D60Bt_--yUD9XGds7EkxVhJKORDeLRhQ8u6az3TjVV6_ROuH2FUdWTrnrSVU-6OpKOmatDRiul_vw8JVOSZvQXbFZ6JA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2625366209</pqid></control><display><type>article</type><title>An Opportunistic Approach for Cloud Service-Based IoT Routing Framework Administering Data, Transaction, and Identity Security</title><source>IEEE Xplore (Online service)</source><creator>Sharma, Deepak Kumar ; Bhardwaj, Kartik Krishna ; Banyal, Siddhant ; Gupta, Riyanshi ; Gupta, Nitin ; Nkenyereye, Lewis</creator><creatorcontrib>Sharma, Deepak Kumar ; Bhardwaj, Kartik Krishna ; Banyal, Siddhant ; Gupta, Riyanshi ; Gupta, Nitin ; Nkenyereye, Lewis</creatorcontrib><description>There has been an asymmetric shift toward harnessing cloud-based technologies as the world focuses on shifting operations remotely. Data security for remote operations is crucial for the protection and preservation of critical infrastructure. Furthermore, there has been an emerging trend to integrate IoT-based devices with the expanding cloud infrastructure. In this work, mobile cloud-based infrastructure is considered where contact opportunities are developed in an opportunistic manner so as to facilitate efficient data forwarding and secure process handling. A probabilistic framework is proposed that facilitates data routing between the nodes and local cloud in an IoT network coupled with a multitier trust and encryption scheme for secure data delivery in the cloud-based IoT network. The proposed scheme is evaluated with simulations over two data sets against attack resilience and routing efficiency-based performance metrics, comparing to standard protocols, such as PRoPHET, MaxProp, ProWait, and TCAFE, which displays the enhancement in operations of Sec-CIoT.</description><identifier>ISSN: 2327-4662</identifier><identifier>EISSN: 2327-4662</identifier><identifier>DOI: 10.1109/JIOT.2021.3078810</identifier><identifier>CODEN: IITJAU</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Cloud computing ; Critical infrastructure ; Cybersecurity ; Delays ; Encryption ; individual privacy ; Internet of Things ; mobility ; opportunistic networking ; Performance measurement ; prediction ; Probabilistic logic ; Routing ; Security</subject><ispartof>IEEE internet of things journal, 2022-02, Vol.9 (4), p.2505-2512</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-1902ef0eff51ae61e9b01cc396b0538dac8931492cd2968620780835545bc8fc3</citedby><cites>FETCH-LOGICAL-c293t-1902ef0eff51ae61e9b01cc396b0538dac8931492cd2968620780835545bc8fc3</cites><orcidid>0000-0001-5067-858X ; 0000-0002-8871-4299 ; 0000-0001-6117-3464 ; 0000-0001-7934-7055</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9427245$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Sharma, Deepak Kumar</creatorcontrib><creatorcontrib>Bhardwaj, Kartik Krishna</creatorcontrib><creatorcontrib>Banyal, Siddhant</creatorcontrib><creatorcontrib>Gupta, Riyanshi</creatorcontrib><creatorcontrib>Gupta, Nitin</creatorcontrib><creatorcontrib>Nkenyereye, Lewis</creatorcontrib><title>An Opportunistic Approach for Cloud Service-Based IoT Routing Framework Administering Data, Transaction, and Identity Security</title><title>IEEE internet of things journal</title><addtitle>JIoT</addtitle><description>There has been an asymmetric shift toward harnessing cloud-based technologies as the world focuses on shifting operations remotely. Data security for remote operations is crucial for the protection and preservation of critical infrastructure. Furthermore, there has been an emerging trend to integrate IoT-based devices with the expanding cloud infrastructure. In this work, mobile cloud-based infrastructure is considered where contact opportunities are developed in an opportunistic manner so as to facilitate efficient data forwarding and secure process handling. A probabilistic framework is proposed that facilitates data routing between the nodes and local cloud in an IoT network coupled with a multitier trust and encryption scheme for secure data delivery in the cloud-based IoT network. The proposed scheme is evaluated with simulations over two data sets against attack resilience and routing efficiency-based performance metrics, comparing to standard protocols, such as PRoPHET, MaxProp, ProWait, and TCAFE, which displays the enhancement in operations of Sec-CIoT.</description><subject>Cloud computing</subject><subject>Critical infrastructure</subject><subject>Cybersecurity</subject><subject>Delays</subject><subject>Encryption</subject><subject>individual privacy</subject><subject>Internet of Things</subject><subject>mobility</subject><subject>opportunistic networking</subject><subject>Performance measurement</subject><subject>prediction</subject><subject>Probabilistic logic</subject><subject>Routing</subject><subject>Security</subject><issn>2327-4662</issn><issn>2327-4662</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNpNkF9LwzAUxYMoOOY-gPgS8HWd-dNmzWOdTieDgdbnkqWpZm5JTVJlL352UzbEp3u4nHMu9wfAJUYTjBG_eVqsyglBBE8omuY5RidgQCiZJilj5PSfPgcj7zcIoRjLMGcD8FMYuGpb60JntA9awqJtnRXyHTbWwdnWdjV8Ue5LS5XcCq9quLAlfLZd0OYNzp3YqW_rPmBR73TfoFy_vxNBjGHphPFCBm3NGAoTo7UyQYd9bJSdi-ICnDVi69XoOIfgdX5fzh6T5ephMSuWiSSchgRzRFSDVNNkWCiGFV8jLCXlbI0ymtdC5pzilBNZE85yRiIGlNMsS7O1zBtJh-D60Bt_--yUD9XGds7EkxVhJKORDeLRhQ8u6az3TjVV6_ROuH2FUdWTrnrSVU-6OpKOmatDRiul_vw8JVOSZvQXbFZ6JA</recordid><startdate>20220215</startdate><enddate>20220215</enddate><creator>Sharma, Deepak Kumar</creator><creator>Bhardwaj, Kartik Krishna</creator><creator>Banyal, Siddhant</creator><creator>Gupta, Riyanshi</creator><creator>Gupta, Nitin</creator><creator>Nkenyereye, Lewis</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-5067-858X</orcidid><orcidid>https://orcid.org/0000-0002-8871-4299</orcidid><orcidid>https://orcid.org/0000-0001-6117-3464</orcidid><orcidid>https://orcid.org/0000-0001-7934-7055</orcidid></search><sort><creationdate>20220215</creationdate><title>An Opportunistic Approach for Cloud Service-Based IoT Routing Framework Administering Data, Transaction, and Identity Security</title><author>Sharma, Deepak Kumar ; Bhardwaj, Kartik Krishna ; Banyal, Siddhant ; Gupta, Riyanshi ; Gupta, Nitin ; Nkenyereye, Lewis</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-1902ef0eff51ae61e9b01cc396b0538dac8931492cd2968620780835545bc8fc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Cloud computing</topic><topic>Critical infrastructure</topic><topic>Cybersecurity</topic><topic>Delays</topic><topic>Encryption</topic><topic>individual privacy</topic><topic>Internet of Things</topic><topic>mobility</topic><topic>opportunistic networking</topic><topic>Performance measurement</topic><topic>prediction</topic><topic>Probabilistic logic</topic><topic>Routing</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Sharma, Deepak Kumar</creatorcontrib><creatorcontrib>Bhardwaj, Kartik Krishna</creatorcontrib><creatorcontrib>Banyal, Siddhant</creatorcontrib><creatorcontrib>Gupta, Riyanshi</creatorcontrib><creatorcontrib>Gupta, Nitin</creatorcontrib><creatorcontrib>Nkenyereye, Lewis</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE internet of things journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sharma, Deepak Kumar</au><au>Bhardwaj, Kartik Krishna</au><au>Banyal, Siddhant</au><au>Gupta, Riyanshi</au><au>Gupta, Nitin</au><au>Nkenyereye, Lewis</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An Opportunistic Approach for Cloud Service-Based IoT Routing Framework Administering Data, Transaction, and Identity Security</atitle><jtitle>IEEE internet of things journal</jtitle><stitle>JIoT</stitle><date>2022-02-15</date><risdate>2022</risdate><volume>9</volume><issue>4</issue><spage>2505</spage><epage>2512</epage><pages>2505-2512</pages><issn>2327-4662</issn><eissn>2327-4662</eissn><coden>IITJAU</coden><abstract>There has been an asymmetric shift toward harnessing cloud-based technologies as the world focuses on shifting operations remotely. Data security for remote operations is crucial for the protection and preservation of critical infrastructure. Furthermore, there has been an emerging trend to integrate IoT-based devices with the expanding cloud infrastructure. In this work, mobile cloud-based infrastructure is considered where contact opportunities are developed in an opportunistic manner so as to facilitate efficient data forwarding and secure process handling. A probabilistic framework is proposed that facilitates data routing between the nodes and local cloud in an IoT network coupled with a multitier trust and encryption scheme for secure data delivery in the cloud-based IoT network. The proposed scheme is evaluated with simulations over two data sets against attack resilience and routing efficiency-based performance metrics, comparing to standard protocols, such as PRoPHET, MaxProp, ProWait, and TCAFE, which displays the enhancement in operations of Sec-CIoT.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/JIOT.2021.3078810</doi><tpages>8</tpages><orcidid>https://orcid.org/0000-0001-5067-858X</orcidid><orcidid>https://orcid.org/0000-0002-8871-4299</orcidid><orcidid>https://orcid.org/0000-0001-6117-3464</orcidid><orcidid>https://orcid.org/0000-0001-7934-7055</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 2327-4662
ispartof IEEE internet of things journal, 2022-02, Vol.9 (4), p.2505-2512
issn 2327-4662
2327-4662
language eng
recordid cdi_crossref_primary_10_1109_JIOT_2021_3078810
source IEEE Xplore (Online service)
subjects Cloud computing
Critical infrastructure
Cybersecurity
Delays
Encryption
individual privacy
Internet of Things
mobility
opportunistic networking
Performance measurement
prediction
Probabilistic logic
Routing
Security
title An Opportunistic Approach for Cloud Service-Based IoT Routing Framework Administering Data, Transaction, and Identity Security
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T19%3A31%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20Opportunistic%20Approach%20for%20Cloud%20Service-Based%20IoT%20Routing%20Framework%20Administering%20Data,%20Transaction,%20and%20Identity%20Security&rft.jtitle=IEEE%20internet%20of%20things%20journal&rft.au=Sharma,%20Deepak%20Kumar&rft.date=2022-02-15&rft.volume=9&rft.issue=4&rft.spage=2505&rft.epage=2512&rft.pages=2505-2512&rft.issn=2327-4662&rft.eissn=2327-4662&rft.coden=IITJAU&rft_id=info:doi/10.1109/JIOT.2021.3078810&rft_dat=%3Cproquest_cross%3E2625366209%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c293t-1902ef0eff51ae61e9b01cc396b0538dac8931492cd2968620780835545bc8fc3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2625366209&rft_id=info:pmid/&rft_ieee_id=9427245&rfr_iscdi=true