Lightweight Novel Trust based Framework for IoT Enabled Wireless Network Communications

Somnath Somnath

Abstract


For IoT enabled networks, the security and privacy is one of the important research challenge due to open nature of wireless communications, especially for the networks like Vehicular Ad hoc Networks (VANETs). The characteristics like heterogeneity, constrained resources, scalability requirements, uncontrolled environment etc. makes the problems of security and privacy even more challenging. Additionally, the high degree of availability needs of IoT networks may compromise the integrity and confidentially of communication data. The security threats mainly performed during the operations of data routing, hence designing the secure routing protocol main research challenge for IoT networks. In this paper, to design the lightweight security algorithm the use of Named Data Networking (NDN) which provides the benefits applicable for IoT applications like built-in data provenance assurance, stateful forwarding etc. Therefore the novel security framework NDN based Cross-layer Attack Resistant Protocol (NCARP) proposed in this paper. In NCARP, we designed the cross-layer security technique to identify the malicious attackers in network to overcome the problems like routing overhead of cryptography and trust based techniques. The parameters from the physical layer, Median Access Control (MAC) layer, and routing/network layer used to compute and averages the trust score of each highly mobility nodes while detecting the attackers and establishing the communication links. The simulation results of NCARP is measured and compared in terms of precision, recall, throughput, packets dropped, and overhead rate with state-of-art solutions.

Full Text:

PDF

References


Atzori L, Iera A, Morabito G., “The internet of things: a survey”, Computer networks, 54:2787–805, 2010.

Zhao, K., Ge, L., “A survey on the internet of things security”, In: Proceedings of the 9th International Conference on Computational Intelligence and Security (CIS). pp. 663–667, 2013

D. Evans, “The Internet of Things: How the Next Evolution of the Internet Is Changing Everything”, 2011

Gubbi J, Buyya R, Marusic S, Palaniswami M., “Internet of Things (IoT): a vision, architectural elements, and future directions”, Future Generation Computer System, 2013.

Abdelaziz, A.K., Nafaa, M., Salim, G., “Survey of routing attacks and counter-measures”, In: Proceedings of the 15th International Conference on Computer Modelling and Simulation (UKSim). 693–698, 2013.

A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, “Internet of things for smart cities,” IEEE Internet of Things, Journal, 1(1):22–32, 2014.

E. Baccelli, C. Mehlis, O. Hahm, T. C. Schmidt, and M.W¨ahlisch. Information centric networking in the IoT: experiments with NDN in the wild. arXiv:1406.6608, 2014.

L. Zhang, D. Estrin, J. Burke, V. Jacobson, J. D. Thornton, D. K. Smetters, B. Zhang, G. Tsudik, D. Massey, C. Papadopoulos, et al. Named data networking (NDN) project. NDN Technical Report NDN-0001, 2010.

M. Amadeo, C. Campolo, A. Iera, and A. Molinaro. Named data networking for IoT: an architectural perspective. In European Conference on Networks and Communications, 2014.

S. K. Datta and C. Bonnet. Integrating named data networking in internet of things architecture. In IEEE Intl. Conference on Consumer Electronics-Taiwan, 2016.

R. Ravindran, T. Biswas, X. Zhang, A. Chakraborti, and G. Wang. Information-centric networking based homenet. In IFIP/IEEE Intl. Symposium on Integrated Network Mgmt., 2013.

S. Buchegger and J.-Y. Le Boudec, “Performance analysis of the confidant protocol,” in Proc. 3rd ACM Int. Symp. MobiHocNetw. Comput., Lausanne, Switzerland, 2002, pp. 226–236.

P. Michiardi and R. Molva, “CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks,” in Proc. IFIP TC6/TC11 6th Joint Working Conf. Commun. Multimedia Security, Portoro˘z, Slovenia, 2002, pp. 107–121.

A. Patwardhan, A. Joshi, T. Finin, and Y. Yesha, “A data intensive reputation management scheme for vehicular ad hoc networks,” in Proc. 3rdAnnu. Int. Conf. Mobiquitous Syst. Workshops, Jul. 2006, pp. 1–8.

W. Li, A. Joshi, and T. Finin, “Coping with node misbehaviors in ad hoc networks: A multi-dimensional trust management approach,” in Proc. 11th Int. Conf. MDM, May 2010, pp. 112–121.

S. Taha and X. Shen, “A physical-layer location privacy-preserving scheme for mobile public hotspots in NEMO-based VANETs,” IEEE Trans. Intell. Transp. Syst., vol. 14, no. 4, pp. 1665–1680, Dec. 2013.

Z. Li, C. Liu, and C. Chigan, “On secure VANET-based ad dissemination with pragmatic cost and effect control,” IEEE Trans. Intell. Transp. Syst., vol. 14, no. 1, pp. 124–135, Mar. 2013.

T. Chim, S. Yiu, L. Hui, and V. Li, “OPQ: OT-based private querying in VANETs,” IEEE Trans. Intell. Transp. Syst., vol. 12, no. 4, pp. 1413–1422, Dec. 2011.

R. Lu, X. Lin, X. Liang, and X. Shen, “A dynamic privacy-preserving key management scheme for location-based services in VANETs,” IEEE Trans. Intell. Transp. Syst., vol. 13, no. 1, pp. 127–139, Mar. 2012.

G. Rebolledo-Mendez, A. Reyes, S. Paszkowicz, M. Domingo, and L. Skrypchuk, “Developing a body sensor network to detect emotions during driving,” IEEE Trans. Intell. Transp. Syst., vol. 15, no. 4, pp. 1850–1854, Aug. 2014.

L.-Y. Yeh and Y.-C. Lin, “Aproxy-based authentication and billing scheme with incentive-aware multihop forwarding for vehicular networks,” IEEE Trans. Intell. Transp. Syst., vol. 15, no. 4, pp. 1607–1621, Aug. 2014.

P.L.R. Chze and K. S. Leong, "A Secure Multi-Hop Routing for IoT Communication," IEEE World Forum on Internet of Things (WF-IoT), pp. 428-432, 2014.

R. Hummen, J. Hiller, H. Wirtz, M. Henze, H. Shafagh, and K. Wehrle, "6LoWPAN fragmentation attacks and mitigation mechanisms," presented at the Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, Budapest, Hungary, 2013.

X. Anita, J. Martin Leo Manickam, and M. A. Bhagyaveni, "Two-Way Acknowledgment-Based Trust Framework for Wireless Sensor Networks," International Journal of Distributed Sensor Networks, vol. 2013, p. 14, 2013.

K.-F. Krentz, H. Rafiee, and C. Meinel, "6LoWPAN security: adding compromise resilience to the 802.15.4 security sublayer," presented at the Proceedings of the International Workshop on Adaptive Security, Zurich, Switzerland, 2013

G. Mulligan, "The 6LoWPAN architecture," presented at the Proceedings of the 4th workshop on Embedded networked sensors, Cork, Ireland, 2007

S. Raza, H. Shafagh, K. Hewage, R. Hummen, T. Voigt, d. o. t. Akademinför innovation, et al., "Lithe: Lightweight Secure CoAP for the Internet of Things," IEEE Sensors Journal, vol. 13, pp. 3711-3720, 2013

S. Raza, S. Duquennoy, J. Höglund, U. Roedig, and T. Voigt, "Secure communication for the Internet of Things—a comparison of link‐layer security and IPsec for 6LoWPAN," Security and Communication Networks, vol. 7, pp. 2654-2668, 2014

Indira Muhic, Migdat Hodzic “Internet of Things: Current Technological Review” PERIODICALS OF ENGINEERING AND NATURAL SCIENCES Vol. 2 No. 2 (2014)

Wenjia Li, Member, IEEE, and Houbing Song, "ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks", IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 17, NO. 4, APRIL 2016

ManelElleuchi, ManelBoujeleben, Mohamed Abid, “Securing RPL-Based Internet of Things applied for water pipeline monitoring”, 5th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2017

Wenjia Li, Member, IEEE, and Houbing Song, Senior Member, IEEE, and FengZeng, "Policy-based Secure and Trustworthy Sensing for Internet of Things in Smart Cities", IEEE Internet of Things Journal ( Volume: 5, Issue: 2, April 2018 )

Travis Mick, Reza Tourani, and SatyajayantMisra, “LASeR: Lightweight Authentication and Secured Routing for NDN IoT in Smart Cities,” IEEE Internet of Things Journal, 2017

Md. Haidar Sharif, Ivan Despot, Sahin Uyaver “A Proof of Concept for Home Automation System with Implementation of the Internet of Things Standards” Periodicals of Engineering and Natural Sciences, Vol. 6, No. 1, April 2018, pp. 95 – 106.

Hebah H. O. Nasereddin1 , Moath Jehad Mohammad Faqir2 “The impact of internet of things on customer service: A preliminary study” Periodicals of Engineering and Natural Sciences Vol. 7, No. 1, June 2019, pp.148-155.




DOI: http://dx.doi.org/10.21533/pen.v7i3.624

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Somnath Somnath

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

ISSN: 2303-4521

Digital Object Identifier DOI: 10.21533/pen

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License