Reliable data dissemination for the Internet of Things using Harris hawks optimization

Internet of Things (IoT) entities compile a massive volume of sensing data and transmit it to the cloud for processing and reasoning. Reliable and secure data aggregation and forwarding in IoT incorporates resource-constrained low-power and lossy devices that served diverse and sensitive applications with special obligations is a significant challenge for IoT. This paper proposes Reliable Data Dissemination for the Internet of Things Using Harris Hawks Optimization (RDDI) scheme, which is a secure data diffusion mechanism that accoutered a fuzzy hierarchical network model for Wireless Sensor Networks (WSN) based IoT. RDDI discloses attacks and monitors the behavior of nodes information exchange processes. Our scheme prowls to synthesize routing capabilities, energy-aware and geographic data circulation, and fuzzy clustering to provide a reliable, nature-inspired optimized routing called Harris Hawks Optimization (HHO) algorithm for IoT. The performance of RDDI, under five metrics of reliability, end-to-end delay, energy consumption, computational overhead as well as packet forwarding distance in multi-cluster scenarios, is evaluated with three comparative approaches. Findings of simulations reveal that RDDI achieves a reliable strategy and preferable achievement over the other three disposals.

[1]  Samad Najjar-Ghabel,et al.  Reliable data gathering in the Internet of Things using artificial bee colony , 2018, Turkish J. Electr. Eng. Comput. Sci..

[2]  Mauro Conti,et al.  Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks , 2016, IEEE Transactions on Information Forensics and Security.

[3]  An Braeken,et al.  BMRF: Bidirectional Multicast RPL Forwarding , 2017, Ad Hoc Networks.

[4]  Muhammad Sher,et al.  Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN , 2020, Peer-to-Peer Netw. Appl..

[5]  Deborah Estrin,et al.  Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks , 2002 .

[6]  Mauro Conti,et al.  SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things , 2018, 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[7]  Fadi Al-Turjman,et al.  A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks , 2020, Ad Hoc Networks.

[8]  J. Bednarz,et al.  Cooperative Hunting Harris' Hawks (Parabuteo unicinctus) , 1988, Science.

[9]  GhaffariAli Congestion control mechanisms in wireless sensor networks , 2015 .

[10]  NavimipourNima Jafari,et al.  Data aggregation mechanisms in the Internet of things , 2017 .

[11]  Jenn-Wei Lin,et al.  Efficient Fault-Tolerant Routing in IoT Wireless Sensor Networks Based on Bipartite-Flow Graph Modeling , 2019, IEEE Access.

[12]  Ali Ghaffari,et al.  Real-time routing algorithm for mobile ad hoc networks using reinforcement learning and heuristic algorithms , 2017, Wirel. Networks.

[13]  Ali Ghaffari,et al.  Controlling Congestion in Wireless Sensor Networks Through Imperialist Competitive Algorithm , 2018, Wirel. Pers. Commun..

[14]  AirehrourDavid,et al.  Secure routing for internet of things , 2016 .

[15]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[16]  Kumbesan Sandrasegaran,et al.  A survey on data aggregation techniques in IoT sensor networks , 2020, Wirel. Networks.

[17]  Brij B. Gupta,et al.  A novel ECC-based lightweight authentication protocol for internet of things devices , 2019 .

[18]  Fadi Al-Turjman,et al.  An overview of security and privacy in smart cities' IoT communications , 2019, Trans. Emerg. Telecommun. Technol..

[19]  Mirza Mohd. Sufyan Beg,et al.  Using Vehicles as Fog Infrastructures for Transportation Cyber-Physical Systems (T-CPS): Fog Computing for Vehicular Networks , 2019, Int. J. Softw. Sci. Comput. Intell..

[20]  Nima Jafari Navimipour,et al.  Data aggregation mechanisms in the Internet of things: A systematic review of the literature and recommendations for future research , 2017, J. Netw. Comput. Appl..

[21]  Fadi Al-Turjman,et al.  Intelligence and security in big 5G-oriented IoNT: An overview , 2020, Future Gener. Comput. Syst..

[22]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[23]  J. Rifkin The Zero Marginal Cost Society: The Internet of Things, the Collaborative Commons, and the Eclipse of Capitalism , 2014 .

[24]  Jie Yuan,et al.  A trustworthiness-enhanced reliable forwarding scheme in mobile Internet of Things , 2019, J. Netw. Comput. Appl..

[25]  Lake Bu,et al.  A secure and robust scheme for sharing confidential information in IoT systems , 2019, Ad Hoc Networks.

[26]  Mesud Hadzialic,et al.  Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues , 2018, Comput. Networks.

[27]  Fatih Alagöz,et al.  Cost-aware securing of IoT systems using attack graphs , 2019, Ad Hoc Networks.

[28]  Fei Song,et al.  A Smart Collaborative Routing Protocol for Reliable Data Diffusion in IoT Scenarios , 2018, Sensors.

[29]  Ali Ghaffari,et al.  Energy-Aware Clustering-Based Routing in Wireless Sensor Networks Using Cuckoo Optimization Algorithm , 2018, Wirel. Pers. Commun..

[30]  David E. Culler,et al.  Reliable transfer on wireless sensor networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[31]  Sean Carlisto de Alvarenga,et al.  A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..

[32]  Hossam Faris,et al.  Harris hawks optimization: Algorithm and applications , 2019, Future Gener. Comput. Syst..

[33]  Sergio Takeo Kofuji,et al.  IoT6Sec: reliability model for Internet of Things security focused on anomalous measurements identification with energy analysis , 2019, Wirel. Networks.

[34]  R. Selvakumar,et al.  Reliable and secure data communication in wireless sensor networks using optimal locally recoverable codes , 2020, Peer-to-Peer Netw. Appl..

[35]  Ali Ghaffari,et al.  Congestion control mechanisms in wireless sensor networks: A survey , 2015, J. Netw. Comput. Appl..

[36]  Rajni Gupta,et al.  Resource Provisioning and Scheduling Techniques of IoT Based Applications in Fog Computing , 2019, Int. J. Fog Comput..

[37]  Ali Dehghantanha,et al.  Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[38]  Mauro Conti,et al.  REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks , 2017, ARES.

[39]  Adam Dunkels,et al.  Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[40]  Adam Dunkels,et al.  Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[41]  Meisen Pan,et al.  MEDICAL IMAGE REGISTRATION BASED ON IMPROVED FUZZY C-MEANS CLUSTERING , 2015 .

[42]  Shahram Babaie,et al.  DEHCIC: A distributed energy-aware hexagon based clustering algorithm to improve coverage in wireless sensor networks , 2018, Peer-to-Peer Netw. Appl..

[43]  Sayan Kumar Ray,et al.  Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..

[44]  Vahideh Hayyolalam,et al.  Black Widow Optimization Algorithm: A novel meta-heuristic approach for solving engineering optimization problems , 2020, Eng. Appl. Artif. Intell..

[45]  P. Uma Maheswari,et al.  Repetitive node categorization technique based reliable clustering and energy efficient communication in P2P wireless sensor network , 2020, Peer Peer Netw. Appl..

[46]  Inam Ullah Khan,et al.  Energy and interoperable aware routing for throughput optimization in clustered IoT-wireless sensor networks , 2018, Future Gener. Comput. Syst..

[47]  Hicham Lakhlef,et al.  Internet of things security: A top-down survey , 2018, Comput. Networks.

[48]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[49]  H. Taheri,et al.  Optimum Reed-Solomon Erasure Coding in Fault Tolerant Sensor Networks , 2007, 2007 4th International Symposium on Wireless Communication Systems.

[50]  Sanjay P. Ahuja,et al.  Architecture of Fog-Enabled and Cloud-Enhanced Internet of Things Applications , 2020, Int. J. Cloud Appl. Comput..