Loading…
An Opportunistic Approach for Cloud Service-Based IoT Routing Framework Administering Data, Transaction, and Identity Security
There has been an asymmetric shift toward harnessing cloud-based technologies as the world focuses on shifting operations remotely. Data security for remote operations is crucial for the protection and preservation of critical infrastructure. Furthermore, there has been an emerging trend to integrat...
Saved in:
Published in: | IEEE internet of things journal 2022-02, Vol.9 (4), p.2505-2512 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c293t-1902ef0eff51ae61e9b01cc396b0538dac8931492cd2968620780835545bc8fc3 |
---|---|
cites | cdi_FETCH-LOGICAL-c293t-1902ef0eff51ae61e9b01cc396b0538dac8931492cd2968620780835545bc8fc3 |
container_end_page | 2512 |
container_issue | 4 |
container_start_page | 2505 |
container_title | IEEE internet of things journal |
container_volume | 9 |
creator | Sharma, Deepak Kumar Bhardwaj, Kartik Krishna Banyal, Siddhant Gupta, Riyanshi Gupta, Nitin Nkenyereye, Lewis |
description | There has been an asymmetric shift toward harnessing cloud-based technologies as the world focuses on shifting operations remotely. Data security for remote operations is crucial for the protection and preservation of critical infrastructure. Furthermore, there has been an emerging trend to integrate IoT-based devices with the expanding cloud infrastructure. In this work, mobile cloud-based infrastructure is considered where contact opportunities are developed in an opportunistic manner so as to facilitate efficient data forwarding and secure process handling. A probabilistic framework is proposed that facilitates data routing between the nodes and local cloud in an IoT network coupled with a multitier trust and encryption scheme for secure data delivery in the cloud-based IoT network. The proposed scheme is evaluated with simulations over two data sets against attack resilience and routing efficiency-based performance metrics, comparing to standard protocols, such as PRoPHET, MaxProp, ProWait, and TCAFE, which displays the enhancement in operations of Sec-CIoT. |
doi_str_mv | 10.1109/JIOT.2021.3078810 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JIOT_2021_3078810</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9427245</ieee_id><sourcerecordid>2625366209</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-1902ef0eff51ae61e9b01cc396b0538dac8931492cd2968620780835545bc8fc3</originalsourceid><addsrcrecordid>eNpNkF9LwzAUxYMoOOY-gPgS8HWd-dNmzWOdTieDgdbnkqWpZm5JTVJlL352UzbEp3u4nHMu9wfAJUYTjBG_eVqsyglBBE8omuY5RidgQCiZJilj5PSfPgcj7zcIoRjLMGcD8FMYuGpb60JntA9awqJtnRXyHTbWwdnWdjV8Ue5LS5XcCq9quLAlfLZd0OYNzp3YqW_rPmBR73TfoFy_vxNBjGHphPFCBm3NGAoTo7UyQYd9bJSdi-ICnDVi69XoOIfgdX5fzh6T5ephMSuWiSSchgRzRFSDVNNkWCiGFV8jLCXlbI0ymtdC5pzilBNZE85yRiIGlNMsS7O1zBtJh-D60Bt_--yUD9XGds7EkxVhJKORDeLRhQ8u6az3TjVV6_ROuH2FUdWTrnrSVU-6OpKOmatDRiul_vw8JVOSZvQXbFZ6JA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2625366209</pqid></control><display><type>article</type><title>An Opportunistic Approach for Cloud Service-Based IoT Routing Framework Administering Data, Transaction, and Identity Security</title><source>IEEE Xplore (Online service)</source><creator>Sharma, Deepak Kumar ; Bhardwaj, Kartik Krishna ; Banyal, Siddhant ; Gupta, Riyanshi ; Gupta, Nitin ; Nkenyereye, Lewis</creator><creatorcontrib>Sharma, Deepak Kumar ; Bhardwaj, Kartik Krishna ; Banyal, Siddhant ; Gupta, Riyanshi ; Gupta, Nitin ; Nkenyereye, Lewis</creatorcontrib><description>There has been an asymmetric shift toward harnessing cloud-based technologies as the world focuses on shifting operations remotely. Data security for remote operations is crucial for the protection and preservation of critical infrastructure. Furthermore, there has been an emerging trend to integrate IoT-based devices with the expanding cloud infrastructure. In this work, mobile cloud-based infrastructure is considered where contact opportunities are developed in an opportunistic manner so as to facilitate efficient data forwarding and secure process handling. A probabilistic framework is proposed that facilitates data routing between the nodes and local cloud in an IoT network coupled with a multitier trust and encryption scheme for secure data delivery in the cloud-based IoT network. The proposed scheme is evaluated with simulations over two data sets against attack resilience and routing efficiency-based performance metrics, comparing to standard protocols, such as PRoPHET, MaxProp, ProWait, and TCAFE, which displays the enhancement in operations of Sec-CIoT.</description><identifier>ISSN: 2327-4662</identifier><identifier>EISSN: 2327-4662</identifier><identifier>DOI: 10.1109/JIOT.2021.3078810</identifier><identifier>CODEN: IITJAU</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Cloud computing ; Critical infrastructure ; Cybersecurity ; Delays ; Encryption ; individual privacy ; Internet of Things ; mobility ; opportunistic networking ; Performance measurement ; prediction ; Probabilistic logic ; Routing ; Security</subject><ispartof>IEEE internet of things journal, 2022-02, Vol.9 (4), p.2505-2512</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-1902ef0eff51ae61e9b01cc396b0538dac8931492cd2968620780835545bc8fc3</citedby><cites>FETCH-LOGICAL-c293t-1902ef0eff51ae61e9b01cc396b0538dac8931492cd2968620780835545bc8fc3</cites><orcidid>0000-0001-5067-858X ; 0000-0002-8871-4299 ; 0000-0001-6117-3464 ; 0000-0001-7934-7055</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9427245$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Sharma, Deepak Kumar</creatorcontrib><creatorcontrib>Bhardwaj, Kartik Krishna</creatorcontrib><creatorcontrib>Banyal, Siddhant</creatorcontrib><creatorcontrib>Gupta, Riyanshi</creatorcontrib><creatorcontrib>Gupta, Nitin</creatorcontrib><creatorcontrib>Nkenyereye, Lewis</creatorcontrib><title>An Opportunistic Approach for Cloud Service-Based IoT Routing Framework Administering Data, Transaction, and Identity Security</title><title>IEEE internet of things journal</title><addtitle>JIoT</addtitle><description>There has been an asymmetric shift toward harnessing cloud-based technologies as the world focuses on shifting operations remotely. Data security for remote operations is crucial for the protection and preservation of critical infrastructure. Furthermore, there has been an emerging trend to integrate IoT-based devices with the expanding cloud infrastructure. In this work, mobile cloud-based infrastructure is considered where contact opportunities are developed in an opportunistic manner so as to facilitate efficient data forwarding and secure process handling. A probabilistic framework is proposed that facilitates data routing between the nodes and local cloud in an IoT network coupled with a multitier trust and encryption scheme for secure data delivery in the cloud-based IoT network. The proposed scheme is evaluated with simulations over two data sets against attack resilience and routing efficiency-based performance metrics, comparing to standard protocols, such as PRoPHET, MaxProp, ProWait, and TCAFE, which displays the enhancement in operations of Sec-CIoT.</description><subject>Cloud computing</subject><subject>Critical infrastructure</subject><subject>Cybersecurity</subject><subject>Delays</subject><subject>Encryption</subject><subject>individual privacy</subject><subject>Internet of Things</subject><subject>mobility</subject><subject>opportunistic networking</subject><subject>Performance measurement</subject><subject>prediction</subject><subject>Probabilistic logic</subject><subject>Routing</subject><subject>Security</subject><issn>2327-4662</issn><issn>2327-4662</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNpNkF9LwzAUxYMoOOY-gPgS8HWd-dNmzWOdTieDgdbnkqWpZm5JTVJlL352UzbEp3u4nHMu9wfAJUYTjBG_eVqsyglBBE8omuY5RidgQCiZJilj5PSfPgcj7zcIoRjLMGcD8FMYuGpb60JntA9awqJtnRXyHTbWwdnWdjV8Ue5LS5XcCq9quLAlfLZd0OYNzp3YqW_rPmBR73TfoFy_vxNBjGHphPFCBm3NGAoTo7UyQYd9bJSdi-ICnDVi69XoOIfgdX5fzh6T5ephMSuWiSSchgRzRFSDVNNkWCiGFV8jLCXlbI0ymtdC5pzilBNZE85yRiIGlNMsS7O1zBtJh-D60Bt_--yUD9XGds7EkxVhJKORDeLRhQ8u6az3TjVV6_ROuH2FUdWTrnrSVU-6OpKOmatDRiul_vw8JVOSZvQXbFZ6JA</recordid><startdate>20220215</startdate><enddate>20220215</enddate><creator>Sharma, Deepak Kumar</creator><creator>Bhardwaj, Kartik Krishna</creator><creator>Banyal, Siddhant</creator><creator>Gupta, Riyanshi</creator><creator>Gupta, Nitin</creator><creator>Nkenyereye, Lewis</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-5067-858X</orcidid><orcidid>https://orcid.org/0000-0002-8871-4299</orcidid><orcidid>https://orcid.org/0000-0001-6117-3464</orcidid><orcidid>https://orcid.org/0000-0001-7934-7055</orcidid></search><sort><creationdate>20220215</creationdate><title>An Opportunistic Approach for Cloud Service-Based IoT Routing Framework Administering Data, Transaction, and Identity Security</title><author>Sharma, Deepak Kumar ; Bhardwaj, Kartik Krishna ; Banyal, Siddhant ; Gupta, Riyanshi ; Gupta, Nitin ; Nkenyereye, Lewis</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-1902ef0eff51ae61e9b01cc396b0538dac8931492cd2968620780835545bc8fc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Cloud computing</topic><topic>Critical infrastructure</topic><topic>Cybersecurity</topic><topic>Delays</topic><topic>Encryption</topic><topic>individual privacy</topic><topic>Internet of Things</topic><topic>mobility</topic><topic>opportunistic networking</topic><topic>Performance measurement</topic><topic>prediction</topic><topic>Probabilistic logic</topic><topic>Routing</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Sharma, Deepak Kumar</creatorcontrib><creatorcontrib>Bhardwaj, Kartik Krishna</creatorcontrib><creatorcontrib>Banyal, Siddhant</creatorcontrib><creatorcontrib>Gupta, Riyanshi</creatorcontrib><creatorcontrib>Gupta, Nitin</creatorcontrib><creatorcontrib>Nkenyereye, Lewis</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE internet of things journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sharma, Deepak Kumar</au><au>Bhardwaj, Kartik Krishna</au><au>Banyal, Siddhant</au><au>Gupta, Riyanshi</au><au>Gupta, Nitin</au><au>Nkenyereye, Lewis</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An Opportunistic Approach for Cloud Service-Based IoT Routing Framework Administering Data, Transaction, and Identity Security</atitle><jtitle>IEEE internet of things journal</jtitle><stitle>JIoT</stitle><date>2022-02-15</date><risdate>2022</risdate><volume>9</volume><issue>4</issue><spage>2505</spage><epage>2512</epage><pages>2505-2512</pages><issn>2327-4662</issn><eissn>2327-4662</eissn><coden>IITJAU</coden><abstract>There has been an asymmetric shift toward harnessing cloud-based technologies as the world focuses on shifting operations remotely. Data security for remote operations is crucial for the protection and preservation of critical infrastructure. Furthermore, there has been an emerging trend to integrate IoT-based devices with the expanding cloud infrastructure. In this work, mobile cloud-based infrastructure is considered where contact opportunities are developed in an opportunistic manner so as to facilitate efficient data forwarding and secure process handling. A probabilistic framework is proposed that facilitates data routing between the nodes and local cloud in an IoT network coupled with a multitier trust and encryption scheme for secure data delivery in the cloud-based IoT network. The proposed scheme is evaluated with simulations over two data sets against attack resilience and routing efficiency-based performance metrics, comparing to standard protocols, such as PRoPHET, MaxProp, ProWait, and TCAFE, which displays the enhancement in operations of Sec-CIoT.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/JIOT.2021.3078810</doi><tpages>8</tpages><orcidid>https://orcid.org/0000-0001-5067-858X</orcidid><orcidid>https://orcid.org/0000-0002-8871-4299</orcidid><orcidid>https://orcid.org/0000-0001-6117-3464</orcidid><orcidid>https://orcid.org/0000-0001-7934-7055</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2327-4662 |
ispartof | IEEE internet of things journal, 2022-02, Vol.9 (4), p.2505-2512 |
issn | 2327-4662 2327-4662 |
language | eng |
recordid | cdi_crossref_primary_10_1109_JIOT_2021_3078810 |
source | IEEE Xplore (Online service) |
subjects | Cloud computing Critical infrastructure Cybersecurity Delays Encryption individual privacy Internet of Things mobility opportunistic networking Performance measurement prediction Probabilistic logic Routing Security |
title | An Opportunistic Approach for Cloud Service-Based IoT Routing Framework Administering Data, Transaction, and Identity Security |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T19%3A31%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20Opportunistic%20Approach%20for%20Cloud%20Service-Based%20IoT%20Routing%20Framework%20Administering%20Data,%20Transaction,%20and%20Identity%20Security&rft.jtitle=IEEE%20internet%20of%20things%20journal&rft.au=Sharma,%20Deepak%20Kumar&rft.date=2022-02-15&rft.volume=9&rft.issue=4&rft.spage=2505&rft.epage=2512&rft.pages=2505-2512&rft.issn=2327-4662&rft.eissn=2327-4662&rft.coden=IITJAU&rft_id=info:doi/10.1109/JIOT.2021.3078810&rft_dat=%3Cproquest_cross%3E2625366209%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c293t-1902ef0eff51ae61e9b01cc396b0538dac8931492cd2968620780835545bc8fc3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2625366209&rft_id=info:pmid/&rft_ieee_id=9427245&rfr_iscdi=true |