DOI QR코드

DOI QR Code

Artificial Intelligence Inspired Intelligent Trust Based Routing Algorithm for IoT

  • Kajol Rana (Amity University, Waljat, College of Applied Science) ;
  • Ajay Vikram Singh (Amity University, Waljat, College of Applied Science) ;
  • P. Vijaya (Amity University, Waljat, College of Applied Science)
  • Received : 2023.11.05
  • Published : 2023.11.30

Abstract

Internet of Things (IoT) is a relatively new concept that has gained immense popularity in a short period of time due to its wide applicability in making human life more convenient and automated. As an illustration: the development of smart homes, smart cities, etc. However, it is also accompanied by a substantial number of risks and flaws. IoT makes use of low-powered devices, so secure, less time-consuming and energy-intensive transmission (routing) of messages due to the limited availability of energy is one of the many and most significant concerns for IoT developers. The following paper presents a trust-based routing scenario for the Internet of Things (IoT) that exploits the past transmission record from the cupcarbon simulator's log files. Artificial Neural Network is used to quantify knowledge of trust, calculate the value of trust, and share this information with other network devices. As a human behavioural pattern, trust provides a superior method for making routing decisions. If there is a tie in the trust values and no other path is available, the remaining battery power is used to break the tie and make a forwarding decision; this is also seen as a more efficient use of the available resources. The proposed algorithm is observed to have superior energy consumption and routing decisions compared to conventional routing algorithms, and it improves the communication pattern.

Keywords

References

  1. D. Meyer and G. Zobrist, "TCP/IP versus OSI," in IEEE Potentials, vol. 9, 1990, pp. 16-19. https://doi.org/10.1109/45.46812
  2. Tetsuya Yokotani, "Requirements on the IoT communication platform and its standardization", IEEE, 2017, p.p:- 1-4.
  3. X. Jia, Q. Feng, T. Fan and Q. Lei, "RFID technology and its applications in Internet of Things (IoT)," 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), Yichang, 2012, pp. 1282-1285.
  4. I. Turk, P. Angin and A. Cosar, "RONFC: A Novel Enabler-Independent NFC Protocol for Mobile Transactions," in IEEE Access, vol. 7, 2019, pp. 95327-95340. https://doi.org/10.1109/ACCESS.2019.2929011
  5. A. R. Chandan and V. D. Khairnar, "Bluetooth Low Energy (BLE) Crackdown Using IoT," 2018 International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, 2018, pp. 1436-1441.
  6. M. Condoluci, L. Militano, A. Orsino, J. Alonso-Zarate and G. Araniti, "LTE-direct vs. WiFi-direct for machine- type communications over LTE-A systems," 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Hong Kong, 2015, pp. 2298-2302.
  7. N. S. Zarif, H. Najafi, M. Imani and A. Q. Moghadam, "A New Hybrid Method of IPv6 Addressing in the Internet of Things," 2019 Smart Grid Conference (SGC), Tehran, Iran, 2019, pp. 1-5.
  8. RFC 8138 [Online]. Available: https://tools.ietf.org/html/rfc8138. 802.15.4 [Online]. Available:standards.ieee.org/content/dam/ieeestandards/stan dard/web/documents/erratas/802.15.4-2015-errata.pdf.
  9. M. Lukic, Z. Mihajlovic and I. Mezei, "Data Flow in Low-Power Wide-Area IoT Applications," 2018 26th Telecommunications Forum (TELFOR), Belgrade, 2018, pp. 1-4.
  10. N. Nasser, L. Karim, A. Ali, M. Anan and N. Khelifi, "Routing in the Internet of Things," GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Singapore, 2017, pp. 1-6.
  11. Behera TM, Samal UC, Mohapatra SK, "Energy efficient modified LEACH protocol for IoT applications", IET wireless sensor systems, 2018, p.p:- 223-228.
  12. M. N. Jambli, M. I. Bandan, K. S. Pillay and S. M. Suhaili, "An Analytical Study of LEACH Routing Protocol for Wireless Sensor Network," 2018 IEEE Conference on Wireless Sensors (ICWiSe), Langkawi, Malaysia, 2018, pp. 44-49.
  13. Liu, X. A Survey on Clustering Routing Protocols in Wireless Sensor Networks. Sensors 2012, pp. 11113-11153.
  14. S. Iqbal, S. B. Shagrithaya, Sandeep Gowda G.P and M. B.S, "Performance analysis of Stable Election Protocol and its extensions in WSN," 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies, Ramanathapuram, 2014, pp. 744-748.
  15. K THOMAS, Aby; R, Vallikannu; ADVAIT NARAYANAN, Sai. Minimizing the energy consumption of WSN by using modified hybrid energy efficient distributed clustering protocol. International Journal of Engineering & Technology, [S.l.], 2018, pp. 758-763.
  16. O. Younis and S. Fahmy, "HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks," in IEEE Transactions on Mobile Computing, 2004, pp. 366-379.
  17. Manjeshwar, Arati & Agrawal, Dharma. (2001). TEEN: ARouting Protocol for Enhanced Efficiency in Wireless Sensor Networks.. Intl. Proc. of 15th Parallel and Distributed Processing Symp.
  18. Galshetwar V.M., Jeyakumar A., "Energy efficient and reliable clustering algorithms HEED and ADCP of wireless sensor network : A comparative study", IEEE, 2014, p.p:-1979-1983.
  19. Neha Rani, Pardeep Kumar, "Energy efficient hierarchical routing protocols for IoT", IJEAT, 2019, p.p:- 2122-2125.
  20. Xue X., Leneutre J., Ben-Othman J. (2005) A Trust-Based Routing Protocol for Ad Hoc Networks. In: Belding-Royer E.M., Al Agha K., Pujolle G. (eds) Mobile and Wireless Communication Networks. MWCN 2004. IFIP International Federation for Information Processing, vol 162. Springer, Boston, MA, p.p : 251-262.
  21. Ajay Vikram Singh, Vandana Juyal, Ravish Saggar, "Trust based Intelligent routing algorithm for delay tolerant network using Artificial Neural Network", Springer, 2016.
  22. Bounceur, Ahcene, et al. "A new dominating tree routing algorithm for efficient leader election in IoT networks." Consumer Communications & Networking Conference (CCNC), 2018 15th IEEE Annual. IEEE, 2018.
  23. Ahcene Bounceur, Madani Bezoui, Massinissa Lounis, Reinhardt Euler, Ciprian Terodorov, "A new dominating tree routing algorithm for efficient leader election in IoT network", IEEE, 2018, p.p:- 1-2.
  24. Hessam Mocini, I-Ling Yen, Farok Bastani, "Routing in IoT network for dynamic service discovery", 2017, IEEE, p.p:-360-367.
  25. L. Qing, Q. Zhu and M. Wang, "Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks", Comput. Commun.,2006, pp. 2230-2237.
  26. S. Skiena, "Dijkstra's algorithm" in Implement. Discret. Math. Comb. Graph Theory with Math. Reading, MA:Addison-Wesley, 1990, pp. 225-227.
  27. T. Sharma, B. Kumar and G. S. Tomar, "Performance Comparision of LEACH SEP and DEEC Protocol in Wireless Sensor Network", Proc. of the Intl. Conf. on Advances in Computer Science and Electronics Engineering, 2012.
  28. T M Behera, SK Mohapatra, Proshikshya Mukherjee, HK Sahoo, "Work in Progress: DEEC-VD: A Hybrid energy utilization cluster based routing protocol for WSN for application in IoT", International Conference on Information Technology, 2017, p.p:-97-100.
  29. K Anusha, "Redundancy based WEP routing technology (IoT-WSN)", IEEE, 2015, p.p:-407-410.
  30. Bilal R. Al-Kaseem ; Hamed S. Al-Raweshidy, "Scalable M2M routing protocol for energy efficient IoT wireless applications", IEEE, 2016, p.p:- 30-35.
  31. R. Ahuja, "Simulation based Performance Evaluation and Comparison of Reactive Proactive and Hybrid Routing Protocols based on Random Waypoint Mobility Model", International Journal of Computer Applications, 2010, pp. 20-24.
  32. Yicong Tian, Rui HOU, "An improved AOMDV Routing protocol for Internet of Things", CiSE, 2010, p.p:-1-4.
  33. RFC 3626 [Online]. Available: https://tools.ietf.org/html/rfc3626.
  34. Travis Mick, Reza Tourani, Satyajayant Misra, "LASeR: Lightweight authentication and secured routing for NDN IoT in Smart cities", IEEE.
  35. RFC3626 [Online]. Available: https://tools.ietf.org/html/rfc3626.
  36. Paul Lon Ruen Chze, Kan Siew Leong, "A secure multi hop routing for IoT communication", IEEE, 2014, p.p:- 428-432.
  37. Wallgren, Linus, Shahid Raza and Thiemo Voigt. "Routing Attacks and Countermeasures in the RPL-Based Internet of Things." International Journal of Distributed Sensor Networks 9 ,2013.
  38. Guojun Ma, Xing Li, Quingqu Pei, Zi li, "A security routing protocol for Internet of Things based on RPL", International conference on networking and network applications, p.p:-209-213.
  39. Michael Frey, Friedrich Grose, Mesut Gunes, "Energy aware ant routing in wireless multi hop network", IEEE, 2014, p.p:-190-196.
  40. Sharief M.A. Otcafy, Fadi M al-Turjman and Hossam S. Hassancin, "Pruned adaptive roputing in the Heterogeneous Internet of Things", IEEE, 2012, p.p:- 214-219.
  41. Amol Dhumane, Rajesh Prasad, Jayshree Prasad, "Routing issues in Internet of Things: A survey", IMECS, 2016.
  42. Prasad P. Lokulwar, Dr. Hemant R. Deshmukh, "Threat analysis and attacks modeling in routing towards IoT", IEEE, 2017, p.p:-721-726.
  43. Abderrahim, Oumaima Ben, Mohamed Houcine Elhedhili, and Leila Saidane. "DTMS-IoT: A Dirichlet-based trust management system mitigating On-Off attacks and dishonest recommendations for the Internet of Things." In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), pp. 1-8. IEEE, 2016.
  44. Airehrour, David, Jairo Gutierrez, and Sayan Kumar Ray. "Secure routing for internet of things: A survey." Journal of Network and Computer Applications 66 (2016): 198-213. https://doi.org/10.1016/j.jnca.2016.03.006
  45. Nabil, D., D. Tandjaoui, I. Romdhani, and F. Medjek. "Trust-based defence model against mac unfairness attacks for iot." (2017).
  46. Gonzales, Dan, Jeremy M. Kaplan, Evan Saltzman, Zev Winkelman, and Dulani Woods. "Cloud-trust-A security assessment model for infrastructure as a service (IaaS) clouds." IEEE Transactions on Cloud Computing 5, no. 3 (2015): 523-536. https://doi.org/10.1109/TCC.2015.2415794
  47. Guo, Jia, Ray Chen, and Jeffrey JP Tsai. "A survey of trust computation models for service management in internet of things systems." Computer Communications 97 (2017): 1-14. https://doi.org/10.1016/j.comcom.2016.10.012
  48. Khan, Zeeshan Ali, Johanna Ullrich, Artemios G. Voyiatzis, and Peter Herrmann. "A trust-based resilient routing mechanism for the internet of things." In Proceedings of the 12th International Conference on Availability, Reliability and Security, pp. 1-6. 2017.
  49. Medjek, Faiza, Djamel Tandjaoui, Imed Romdhani, and Nabil Djedjig. "A trust-based intrusion detection system for mobile RPL based networks." In 2017 IEEE international conference on Internet of Things (IThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pp. 735-742. IEEE, 2017.
  50. Truong, Nguyen Binh, Hyunwoo Lee, Bob Askwith, and Gyu Myoung Lee. "Toward a trust evaluation mechanism in the social internet of things." Sensors 17, no. 6 (2017): 1346.
  51. Wu, Tao, Qiusong Yang, and Yeping He. "A secure and rapid response architecture for virtual machine migration from an untrusted hypervisor to a trusted one." Frontiers of Computer Science 11, no. 5 (2017): 821-835.  https://doi.org/10.1007/s11704-016-5190-6