Loading…

Cooperative and feedback based authentic routing protocol for energy efficient IoT systems

The open communication medium of the Internet of Things (IoT) is more vulnerable to security attacks. As the IoT environment consists of distributed power limited units, the routing protocol used for distributed routing should be light‐weighted compared to other centralized networks. In this situati...

Full description

Saved in:
Bibliographic Details
Published in:Concurrency and computation 2022-05, Vol.34 (11), p.n/a
Main Authors: Gayathri, A., Prabu, A. V., Rajasoundaran, S., Routray, Sidheswar, Narayanasamy, P., Kumar, Naween, Qi, Yinan
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c2936-69ffb706e037a34f05f19faac45c20a50e8ec7baa2e89692ecb5c6dfa695856b3
cites cdi_FETCH-LOGICAL-c2936-69ffb706e037a34f05f19faac45c20a50e8ec7baa2e89692ecb5c6dfa695856b3
container_end_page n/a
container_issue 11
container_start_page
container_title Concurrency and computation
container_volume 34
creator Gayathri, A.
Prabu, A. V.
Rajasoundaran, S.
Routray, Sidheswar
Narayanasamy, P.
Kumar, Naween
Qi, Yinan
description The open communication medium of the Internet of Things (IoT) is more vulnerable to security attacks. As the IoT environment consists of distributed power limited units, the routing protocol used for distributed routing should be light‐weighted compared to other centralized networks. In this situation, complex security algorithms and routing mechanisms affect the generic data communications in IoT platforms. To handle this problem, this proposed system develops a cooperative and feedback‐based trustable energy‐efficient routing protocol (CFTEERP). This protocol calculates local trust value (LTV) and global trust value (GTV) of each node using node attributes and K‐means‐based feedback evaluation procedures. The K‐means clustering algorithm leaves out the distorted node routing metrics and misbehaving node metrics for all channels. This proposed CFTEERP uses the nearest secure node costs to increase the network lifetime without selecting the nearest nodes for routing the data. In this work, secure routing is initiated using multipath routing strategy that analyses LTV, GTV, next trustable node, average throughput, energy consumption, average packet delivery ratio (PDR) and traffic various metrics of entire IoT communication. The technical aspects of proposed system are implemented to solve different existing techniques' limitations. In the comparative experiment, the proposed method provides 90% of PDR and a minimal energy consumption rate of 25% lesser than the existing systems against different malicious attacks.
doi_str_mv 10.1002/cpe.6886
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2651502097</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2651502097</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2936-69ffb706e037a34f05f19faac45c20a50e8ec7baa2e89692ecb5c6dfa695856b3</originalsourceid><addsrcrecordid>eNp10LFOwzAQBmALgUQpSDyCJRaWlLNTO8mIogKVKsFQFhbLcc4lpY2D7YDy9gSK2Jjuhk__nX5CLhnMGAC_MR3OZJ7LIzJhIuUJyHR-_LdzeUrOQtgCMAYpm5CX0rkOvY7NB1Ld1tQi1pU2b7TSAWuq-_iKbWwM9a6PTbuhnXfRGbej1nmKLfrNQNHaxjSjo0u3pmEIEffhnJxYvQt48Tun5PlusS4fktXj_bK8XSWGF6lMZGFtlYFESDOdzi0IywqrtZkLw0ELwBxNVmnNMS9kwdFUwsjaalmIXMgqnZKrQ-742XuPIaqt6307nlRcCiaAQ5GN6vqgjHcheLSq881e-0ExUN_NqbE59d3cSJMD_Wx2OPzrVPm0-PFfmfNwZw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2651502097</pqid></control><display><type>article</type><title>Cooperative and feedback based authentic routing protocol for energy efficient IoT systems</title><source>Wiley</source><creator>Gayathri, A. ; Prabu, A. V. ; Rajasoundaran, S. ; Routray, Sidheswar ; Narayanasamy, P. ; Kumar, Naween ; Qi, Yinan</creator><creatorcontrib>Gayathri, A. ; Prabu, A. V. ; Rajasoundaran, S. ; Routray, Sidheswar ; Narayanasamy, P. ; Kumar, Naween ; Qi, Yinan</creatorcontrib><description>The open communication medium of the Internet of Things (IoT) is more vulnerable to security attacks. As the IoT environment consists of distributed power limited units, the routing protocol used for distributed routing should be light‐weighted compared to other centralized networks. In this situation, complex security algorithms and routing mechanisms affect the generic data communications in IoT platforms. To handle this problem, this proposed system develops a cooperative and feedback‐based trustable energy‐efficient routing protocol (CFTEERP). This protocol calculates local trust value (LTV) and global trust value (GTV) of each node using node attributes and K‐means‐based feedback evaluation procedures. The K‐means clustering algorithm leaves out the distorted node routing metrics and misbehaving node metrics for all channels. This proposed CFTEERP uses the nearest secure node costs to increase the network lifetime without selecting the nearest nodes for routing the data. In this work, secure routing is initiated using multipath routing strategy that analyses LTV, GTV, next trustable node, average throughput, energy consumption, average packet delivery ratio (PDR) and traffic various metrics of entire IoT communication. The technical aspects of proposed system are implemented to solve different existing techniques' limitations. In the comparative experiment, the proposed method provides 90% of PDR and a minimal energy consumption rate of 25% lesser than the existing systems against different malicious attacks.</description><identifier>ISSN: 1532-0626</identifier><identifier>EISSN: 1532-0634</identifier><identifier>DOI: 10.1002/cpe.6886</identifier><language>eng</language><publisher>Hoboken, USA: John Wiley &amp; Sons, Inc</publisher><subject>Algorithms ; Clustering ; Data communication ; Energy consumption ; Feedback ; Internet of Things ; network lifetime ; next‐trustable route ; Nodes ; routing ; Routing (telecommunications) ; Security ; security attacks ; trust value</subject><ispartof>Concurrency and computation, 2022-05, Vol.34 (11), p.n/a</ispartof><rights>2022 John Wiley &amp; Sons Ltd.</rights><rights>2022 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2936-69ffb706e037a34f05f19faac45c20a50e8ec7baa2e89692ecb5c6dfa695856b3</citedby><cites>FETCH-LOGICAL-c2936-69ffb706e037a34f05f19faac45c20a50e8ec7baa2e89692ecb5c6dfa695856b3</cites><orcidid>0000-0002-3658-3514</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Gayathri, A.</creatorcontrib><creatorcontrib>Prabu, A. V.</creatorcontrib><creatorcontrib>Rajasoundaran, S.</creatorcontrib><creatorcontrib>Routray, Sidheswar</creatorcontrib><creatorcontrib>Narayanasamy, P.</creatorcontrib><creatorcontrib>Kumar, Naween</creatorcontrib><creatorcontrib>Qi, Yinan</creatorcontrib><title>Cooperative and feedback based authentic routing protocol for energy efficient IoT systems</title><title>Concurrency and computation</title><description>The open communication medium of the Internet of Things (IoT) is more vulnerable to security attacks. As the IoT environment consists of distributed power limited units, the routing protocol used for distributed routing should be light‐weighted compared to other centralized networks. In this situation, complex security algorithms and routing mechanisms affect the generic data communications in IoT platforms. To handle this problem, this proposed system develops a cooperative and feedback‐based trustable energy‐efficient routing protocol (CFTEERP). This protocol calculates local trust value (LTV) and global trust value (GTV) of each node using node attributes and K‐means‐based feedback evaluation procedures. The K‐means clustering algorithm leaves out the distorted node routing metrics and misbehaving node metrics for all channels. This proposed CFTEERP uses the nearest secure node costs to increase the network lifetime without selecting the nearest nodes for routing the data. In this work, secure routing is initiated using multipath routing strategy that analyses LTV, GTV, next trustable node, average throughput, energy consumption, average packet delivery ratio (PDR) and traffic various metrics of entire IoT communication. The technical aspects of proposed system are implemented to solve different existing techniques' limitations. In the comparative experiment, the proposed method provides 90% of PDR and a minimal energy consumption rate of 25% lesser than the existing systems against different malicious attacks.</description><subject>Algorithms</subject><subject>Clustering</subject><subject>Data communication</subject><subject>Energy consumption</subject><subject>Feedback</subject><subject>Internet of Things</subject><subject>network lifetime</subject><subject>next‐trustable route</subject><subject>Nodes</subject><subject>routing</subject><subject>Routing (telecommunications)</subject><subject>Security</subject><subject>security attacks</subject><subject>trust value</subject><issn>1532-0626</issn><issn>1532-0634</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp10LFOwzAQBmALgUQpSDyCJRaWlLNTO8mIogKVKsFQFhbLcc4lpY2D7YDy9gSK2Jjuhk__nX5CLhnMGAC_MR3OZJ7LIzJhIuUJyHR-_LdzeUrOQtgCMAYpm5CX0rkOvY7NB1Ld1tQi1pU2b7TSAWuq-_iKbWwM9a6PTbuhnXfRGbej1nmKLfrNQNHaxjSjo0u3pmEIEffhnJxYvQt48Tun5PlusS4fktXj_bK8XSWGF6lMZGFtlYFESDOdzi0IywqrtZkLw0ELwBxNVmnNMS9kwdFUwsjaalmIXMgqnZKrQ-742XuPIaqt6307nlRcCiaAQ5GN6vqgjHcheLSq881e-0ExUN_NqbE59d3cSJMD_Wx2OPzrVPm0-PFfmfNwZw</recordid><startdate>20220515</startdate><enddate>20220515</enddate><creator>Gayathri, A.</creator><creator>Prabu, A. V.</creator><creator>Rajasoundaran, S.</creator><creator>Routray, Sidheswar</creator><creator>Narayanasamy, P.</creator><creator>Kumar, Naween</creator><creator>Qi, Yinan</creator><general>John Wiley &amp; Sons, Inc</general><general>Wiley Subscription Services, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-3658-3514</orcidid></search><sort><creationdate>20220515</creationdate><title>Cooperative and feedback based authentic routing protocol for energy efficient IoT systems</title><author>Gayathri, A. ; Prabu, A. V. ; Rajasoundaran, S. ; Routray, Sidheswar ; Narayanasamy, P. ; Kumar, Naween ; Qi, Yinan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2936-69ffb706e037a34f05f19faac45c20a50e8ec7baa2e89692ecb5c6dfa695856b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Clustering</topic><topic>Data communication</topic><topic>Energy consumption</topic><topic>Feedback</topic><topic>Internet of Things</topic><topic>network lifetime</topic><topic>next‐trustable route</topic><topic>Nodes</topic><topic>routing</topic><topic>Routing (telecommunications)</topic><topic>Security</topic><topic>security attacks</topic><topic>trust value</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gayathri, A.</creatorcontrib><creatorcontrib>Prabu, A. V.</creatorcontrib><creatorcontrib>Rajasoundaran, S.</creatorcontrib><creatorcontrib>Routray, Sidheswar</creatorcontrib><creatorcontrib>Narayanasamy, P.</creatorcontrib><creatorcontrib>Kumar, Naween</creatorcontrib><creatorcontrib>Qi, Yinan</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Concurrency and computation</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gayathri, A.</au><au>Prabu, A. V.</au><au>Rajasoundaran, S.</au><au>Routray, Sidheswar</au><au>Narayanasamy, P.</au><au>Kumar, Naween</au><au>Qi, Yinan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cooperative and feedback based authentic routing protocol for energy efficient IoT systems</atitle><jtitle>Concurrency and computation</jtitle><date>2022-05-15</date><risdate>2022</risdate><volume>34</volume><issue>11</issue><epage>n/a</epage><issn>1532-0626</issn><eissn>1532-0634</eissn><abstract>The open communication medium of the Internet of Things (IoT) is more vulnerable to security attacks. As the IoT environment consists of distributed power limited units, the routing protocol used for distributed routing should be light‐weighted compared to other centralized networks. In this situation, complex security algorithms and routing mechanisms affect the generic data communications in IoT platforms. To handle this problem, this proposed system develops a cooperative and feedback‐based trustable energy‐efficient routing protocol (CFTEERP). This protocol calculates local trust value (LTV) and global trust value (GTV) of each node using node attributes and K‐means‐based feedback evaluation procedures. The K‐means clustering algorithm leaves out the distorted node routing metrics and misbehaving node metrics for all channels. This proposed CFTEERP uses the nearest secure node costs to increase the network lifetime without selecting the nearest nodes for routing the data. In this work, secure routing is initiated using multipath routing strategy that analyses LTV, GTV, next trustable node, average throughput, energy consumption, average packet delivery ratio (PDR) and traffic various metrics of entire IoT communication. The technical aspects of proposed system are implemented to solve different existing techniques' limitations. In the comparative experiment, the proposed method provides 90% of PDR and a minimal energy consumption rate of 25% lesser than the existing systems against different malicious attacks.</abstract><cop>Hoboken, USA</cop><pub>John Wiley &amp; Sons, Inc</pub><doi>10.1002/cpe.6886</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0002-3658-3514</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1532-0626
ispartof Concurrency and computation, 2022-05, Vol.34 (11), p.n/a
issn 1532-0626
1532-0634
language eng
recordid cdi_proquest_journals_2651502097
source Wiley
subjects Algorithms
Clustering
Data communication
Energy consumption
Feedback
Internet of Things
network lifetime
next‐trustable route
Nodes
routing
Routing (telecommunications)
Security
security attacks
trust value
title Cooperative and feedback based authentic routing protocol for energy efficient IoT systems
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T08%3A07%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cooperative%20and%20feedback%20based%20authentic%20routing%20protocol%20for%20energy%20efficient%20IoT%20systems&rft.jtitle=Concurrency%20and%20computation&rft.au=Gayathri,%20A.&rft.date=2022-05-15&rft.volume=34&rft.issue=11&rft.epage=n/a&rft.issn=1532-0626&rft.eissn=1532-0634&rft_id=info:doi/10.1002/cpe.6886&rft_dat=%3Cproquest_cross%3E2651502097%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c2936-69ffb706e037a34f05f19faac45c20a50e8ec7baa2e89692ecb5c6dfa695856b3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2651502097&rft_id=info:pmid/&rfr_iscdi=true