Loading…
Cooperative and feedback based authentic routing protocol for energy efficient IoT systems
The open communication medium of the Internet of Things (IoT) is more vulnerable to security attacks. As the IoT environment consists of distributed power limited units, the routing protocol used for distributed routing should be light‐weighted compared to other centralized networks. In this situati...
Saved in:
Published in: | Concurrency and computation 2022-05, Vol.34 (11), p.n/a |
---|---|
Main Authors: | , , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c2936-69ffb706e037a34f05f19faac45c20a50e8ec7baa2e89692ecb5c6dfa695856b3 |
---|---|
cites | cdi_FETCH-LOGICAL-c2936-69ffb706e037a34f05f19faac45c20a50e8ec7baa2e89692ecb5c6dfa695856b3 |
container_end_page | n/a |
container_issue | 11 |
container_start_page | |
container_title | Concurrency and computation |
container_volume | 34 |
creator | Gayathri, A. Prabu, A. V. Rajasoundaran, S. Routray, Sidheswar Narayanasamy, P. Kumar, Naween Qi, Yinan |
description | The open communication medium of the Internet of Things (IoT) is more vulnerable to security attacks. As the IoT environment consists of distributed power limited units, the routing protocol used for distributed routing should be light‐weighted compared to other centralized networks. In this situation, complex security algorithms and routing mechanisms affect the generic data communications in IoT platforms. To handle this problem, this proposed system develops a cooperative and feedback‐based trustable energy‐efficient routing protocol (CFTEERP). This protocol calculates local trust value (LTV) and global trust value (GTV) of each node using node attributes and K‐means‐based feedback evaluation procedures. The K‐means clustering algorithm leaves out the distorted node routing metrics and misbehaving node metrics for all channels. This proposed CFTEERP uses the nearest secure node costs to increase the network lifetime without selecting the nearest nodes for routing the data. In this work, secure routing is initiated using multipath routing strategy that analyses LTV, GTV, next trustable node, average throughput, energy consumption, average packet delivery ratio (PDR) and traffic various metrics of entire IoT communication. The technical aspects of proposed system are implemented to solve different existing techniques' limitations. In the comparative experiment, the proposed method provides 90% of PDR and a minimal energy consumption rate of 25% lesser than the existing systems against different malicious attacks. |
doi_str_mv | 10.1002/cpe.6886 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2651502097</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2651502097</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2936-69ffb706e037a34f05f19faac45c20a50e8ec7baa2e89692ecb5c6dfa695856b3</originalsourceid><addsrcrecordid>eNp10LFOwzAQBmALgUQpSDyCJRaWlLNTO8mIogKVKsFQFhbLcc4lpY2D7YDy9gSK2Jjuhk__nX5CLhnMGAC_MR3OZJ7LIzJhIuUJyHR-_LdzeUrOQtgCMAYpm5CX0rkOvY7NB1Ld1tQi1pU2b7TSAWuq-_iKbWwM9a6PTbuhnXfRGbej1nmKLfrNQNHaxjSjo0u3pmEIEffhnJxYvQt48Tun5PlusS4fktXj_bK8XSWGF6lMZGFtlYFESDOdzi0IywqrtZkLw0ELwBxNVmnNMS9kwdFUwsjaalmIXMgqnZKrQ-742XuPIaqt6307nlRcCiaAQ5GN6vqgjHcheLSq881e-0ExUN_NqbE59d3cSJMD_Wx2OPzrVPm0-PFfmfNwZw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2651502097</pqid></control><display><type>article</type><title>Cooperative and feedback based authentic routing protocol for energy efficient IoT systems</title><source>Wiley</source><creator>Gayathri, A. ; Prabu, A. V. ; Rajasoundaran, S. ; Routray, Sidheswar ; Narayanasamy, P. ; Kumar, Naween ; Qi, Yinan</creator><creatorcontrib>Gayathri, A. ; Prabu, A. V. ; Rajasoundaran, S. ; Routray, Sidheswar ; Narayanasamy, P. ; Kumar, Naween ; Qi, Yinan</creatorcontrib><description>The open communication medium of the Internet of Things (IoT) is more vulnerable to security attacks. As the IoT environment consists of distributed power limited units, the routing protocol used for distributed routing should be light‐weighted compared to other centralized networks. In this situation, complex security algorithms and routing mechanisms affect the generic data communications in IoT platforms. To handle this problem, this proposed system develops a cooperative and feedback‐based trustable energy‐efficient routing protocol (CFTEERP). This protocol calculates local trust value (LTV) and global trust value (GTV) of each node using node attributes and K‐means‐based feedback evaluation procedures. The K‐means clustering algorithm leaves out the distorted node routing metrics and misbehaving node metrics for all channels. This proposed CFTEERP uses the nearest secure node costs to increase the network lifetime without selecting the nearest nodes for routing the data. In this work, secure routing is initiated using multipath routing strategy that analyses LTV, GTV, next trustable node, average throughput, energy consumption, average packet delivery ratio (PDR) and traffic various metrics of entire IoT communication. The technical aspects of proposed system are implemented to solve different existing techniques' limitations. In the comparative experiment, the proposed method provides 90% of PDR and a minimal energy consumption rate of 25% lesser than the existing systems against different malicious attacks.</description><identifier>ISSN: 1532-0626</identifier><identifier>EISSN: 1532-0634</identifier><identifier>DOI: 10.1002/cpe.6886</identifier><language>eng</language><publisher>Hoboken, USA: John Wiley & Sons, Inc</publisher><subject>Algorithms ; Clustering ; Data communication ; Energy consumption ; Feedback ; Internet of Things ; network lifetime ; next‐trustable route ; Nodes ; routing ; Routing (telecommunications) ; Security ; security attacks ; trust value</subject><ispartof>Concurrency and computation, 2022-05, Vol.34 (11), p.n/a</ispartof><rights>2022 John Wiley & Sons Ltd.</rights><rights>2022 John Wiley & Sons, Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2936-69ffb706e037a34f05f19faac45c20a50e8ec7baa2e89692ecb5c6dfa695856b3</citedby><cites>FETCH-LOGICAL-c2936-69ffb706e037a34f05f19faac45c20a50e8ec7baa2e89692ecb5c6dfa695856b3</cites><orcidid>0000-0002-3658-3514</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Gayathri, A.</creatorcontrib><creatorcontrib>Prabu, A. V.</creatorcontrib><creatorcontrib>Rajasoundaran, S.</creatorcontrib><creatorcontrib>Routray, Sidheswar</creatorcontrib><creatorcontrib>Narayanasamy, P.</creatorcontrib><creatorcontrib>Kumar, Naween</creatorcontrib><creatorcontrib>Qi, Yinan</creatorcontrib><title>Cooperative and feedback based authentic routing protocol for energy efficient IoT systems</title><title>Concurrency and computation</title><description>The open communication medium of the Internet of Things (IoT) is more vulnerable to security attacks. As the IoT environment consists of distributed power limited units, the routing protocol used for distributed routing should be light‐weighted compared to other centralized networks. In this situation, complex security algorithms and routing mechanisms affect the generic data communications in IoT platforms. To handle this problem, this proposed system develops a cooperative and feedback‐based trustable energy‐efficient routing protocol (CFTEERP). This protocol calculates local trust value (LTV) and global trust value (GTV) of each node using node attributes and K‐means‐based feedback evaluation procedures. The K‐means clustering algorithm leaves out the distorted node routing metrics and misbehaving node metrics for all channels. This proposed CFTEERP uses the nearest secure node costs to increase the network lifetime without selecting the nearest nodes for routing the data. In this work, secure routing is initiated using multipath routing strategy that analyses LTV, GTV, next trustable node, average throughput, energy consumption, average packet delivery ratio (PDR) and traffic various metrics of entire IoT communication. The technical aspects of proposed system are implemented to solve different existing techniques' limitations. In the comparative experiment, the proposed method provides 90% of PDR and a minimal energy consumption rate of 25% lesser than the existing systems against different malicious attacks.</description><subject>Algorithms</subject><subject>Clustering</subject><subject>Data communication</subject><subject>Energy consumption</subject><subject>Feedback</subject><subject>Internet of Things</subject><subject>network lifetime</subject><subject>next‐trustable route</subject><subject>Nodes</subject><subject>routing</subject><subject>Routing (telecommunications)</subject><subject>Security</subject><subject>security attacks</subject><subject>trust value</subject><issn>1532-0626</issn><issn>1532-0634</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp10LFOwzAQBmALgUQpSDyCJRaWlLNTO8mIogKVKsFQFhbLcc4lpY2D7YDy9gSK2Jjuhk__nX5CLhnMGAC_MR3OZJ7LIzJhIuUJyHR-_LdzeUrOQtgCMAYpm5CX0rkOvY7NB1Ld1tQi1pU2b7TSAWuq-_iKbWwM9a6PTbuhnXfRGbej1nmKLfrNQNHaxjSjo0u3pmEIEffhnJxYvQt48Tun5PlusS4fktXj_bK8XSWGF6lMZGFtlYFESDOdzi0IywqrtZkLw0ELwBxNVmnNMS9kwdFUwsjaalmIXMgqnZKrQ-742XuPIaqt6307nlRcCiaAQ5GN6vqgjHcheLSq881e-0ExUN_NqbE59d3cSJMD_Wx2OPzrVPm0-PFfmfNwZw</recordid><startdate>20220515</startdate><enddate>20220515</enddate><creator>Gayathri, A.</creator><creator>Prabu, A. V.</creator><creator>Rajasoundaran, S.</creator><creator>Routray, Sidheswar</creator><creator>Narayanasamy, P.</creator><creator>Kumar, Naween</creator><creator>Qi, Yinan</creator><general>John Wiley & Sons, Inc</general><general>Wiley Subscription Services, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-3658-3514</orcidid></search><sort><creationdate>20220515</creationdate><title>Cooperative and feedback based authentic routing protocol for energy efficient IoT systems</title><author>Gayathri, A. ; Prabu, A. V. ; Rajasoundaran, S. ; Routray, Sidheswar ; Narayanasamy, P. ; Kumar, Naween ; Qi, Yinan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2936-69ffb706e037a34f05f19faac45c20a50e8ec7baa2e89692ecb5c6dfa695856b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Clustering</topic><topic>Data communication</topic><topic>Energy consumption</topic><topic>Feedback</topic><topic>Internet of Things</topic><topic>network lifetime</topic><topic>next‐trustable route</topic><topic>Nodes</topic><topic>routing</topic><topic>Routing (telecommunications)</topic><topic>Security</topic><topic>security attacks</topic><topic>trust value</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gayathri, A.</creatorcontrib><creatorcontrib>Prabu, A. V.</creatorcontrib><creatorcontrib>Rajasoundaran, S.</creatorcontrib><creatorcontrib>Routray, Sidheswar</creatorcontrib><creatorcontrib>Narayanasamy, P.</creatorcontrib><creatorcontrib>Kumar, Naween</creatorcontrib><creatorcontrib>Qi, Yinan</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Concurrency and computation</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gayathri, A.</au><au>Prabu, A. V.</au><au>Rajasoundaran, S.</au><au>Routray, Sidheswar</au><au>Narayanasamy, P.</au><au>Kumar, Naween</au><au>Qi, Yinan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cooperative and feedback based authentic routing protocol for energy efficient IoT systems</atitle><jtitle>Concurrency and computation</jtitle><date>2022-05-15</date><risdate>2022</risdate><volume>34</volume><issue>11</issue><epage>n/a</epage><issn>1532-0626</issn><eissn>1532-0634</eissn><abstract>The open communication medium of the Internet of Things (IoT) is more vulnerable to security attacks. As the IoT environment consists of distributed power limited units, the routing protocol used for distributed routing should be light‐weighted compared to other centralized networks. In this situation, complex security algorithms and routing mechanisms affect the generic data communications in IoT platforms. To handle this problem, this proposed system develops a cooperative and feedback‐based trustable energy‐efficient routing protocol (CFTEERP). This protocol calculates local trust value (LTV) and global trust value (GTV) of each node using node attributes and K‐means‐based feedback evaluation procedures. The K‐means clustering algorithm leaves out the distorted node routing metrics and misbehaving node metrics for all channels. This proposed CFTEERP uses the nearest secure node costs to increase the network lifetime without selecting the nearest nodes for routing the data. In this work, secure routing is initiated using multipath routing strategy that analyses LTV, GTV, next trustable node, average throughput, energy consumption, average packet delivery ratio (PDR) and traffic various metrics of entire IoT communication. The technical aspects of proposed system are implemented to solve different existing techniques' limitations. In the comparative experiment, the proposed method provides 90% of PDR and a minimal energy consumption rate of 25% lesser than the existing systems against different malicious attacks.</abstract><cop>Hoboken, USA</cop><pub>John Wiley & Sons, Inc</pub><doi>10.1002/cpe.6886</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0002-3658-3514</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1532-0626 |
ispartof | Concurrency and computation, 2022-05, Vol.34 (11), p.n/a |
issn | 1532-0626 1532-0634 |
language | eng |
recordid | cdi_proquest_journals_2651502097 |
source | Wiley |
subjects | Algorithms Clustering Data communication Energy consumption Feedback Internet of Things network lifetime next‐trustable route Nodes routing Routing (telecommunications) Security security attacks trust value |
title | Cooperative and feedback based authentic routing protocol for energy efficient IoT systems |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T08%3A07%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cooperative%20and%20feedback%20based%20authentic%20routing%20protocol%20for%20energy%20efficient%20IoT%20systems&rft.jtitle=Concurrency%20and%20computation&rft.au=Gayathri,%20A.&rft.date=2022-05-15&rft.volume=34&rft.issue=11&rft.epage=n/a&rft.issn=1532-0626&rft.eissn=1532-0634&rft_id=info:doi/10.1002/cpe.6886&rft_dat=%3Cproquest_cross%3E2651502097%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c2936-69ffb706e037a34f05f19faac45c20a50e8ec7baa2e89692ecb5c6dfa695856b3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2651502097&rft_id=info:pmid/&rfr_iscdi=true |