An improved trust-based security framework for internet of things

The Internet plays a vital role in the massive growth of the emerging Internet of Things (IoT). IoT helps all electronic devices to communicate with other devices and with the human with the help of the Internet. IoT enables the devices to sense environmental changes or mission-critical data. These critical data that are sensed by the IoT devices are forwarded to the public cloud storage with the help of Gateway nodes. Later these sensed data are utilized for decision making. However, high-risk insecurity is a major concern in IoT sensed data. In this paper, a trust-based security method with Direct and Indirect trust evaluation technique has been implemented to provide highly secure data transmission in the network. The simulation result has proven that trust-based security can improve data confidentiality when compared with available protocols.

[1]  Qiang Zhou,et al.  A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks , 2014, Sensors.

[2]  Yang Li-zhen,et al.  SLEACH: Secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks , 2008, Wuhan University Journal of Natural Sciences.

[3]  Tao Zhang,et al.  Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.

[4]  Rahul Johari,et al.  IOT based Electrical Device Surveillance and Control System , 2019, 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU).

[5]  Mehdi Hosseinzadeh,et al.  A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power and Lossy Networks , 2018, Wirel. Pers. Commun..

[6]  Vangelis Metsis,et al.  IoT Middleware: A Survey on Issues and Enabling Technologies , 2017, IEEE Internet of Things Journal.

[7]  Brij B. Gupta,et al.  Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..

[8]  Ahmed Farouk,et al.  Secure Medical Data Transmission Model for IoT-Based Healthcare Systems , 2018, IEEE Access.

[9]  Dirk Westhoff,et al.  Tinypeds: Tiny Persistent Encrypted Data Storage 3 in Asynchronous Wireless Sensor Networks 4 , 2006 .

[10]  Mingwu Zhang,et al.  After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange , 2018, IEEE Systems Journal.

[11]  Mohamed Elhoseny,et al.  Extended Genetic Algorithm for solving open-shop scheduling problem , 2019, Soft Comput..

[12]  Tong Li,et al.  A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT , 2018, Secur. Commun. Networks.

[13]  Maria Fazio,et al.  Human-Computer Interface Based on IoT Embedded Systems for Users with Disabilities , 2014, IoT360.

[14]  Alain Pegatoquet,et al.  Wireless sensor network protocol property validation through the system's simulation in a dedicated framework , 2016, 2016 10th International Conference on Signal Processing and Communication Systems (ICSPCS).

[15]  Mário M. Freire,et al.  IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space , 2020, IEEE Access.

[16]  Albert Y. Zomaya,et al.  Building a Sustainable Internet of Things: Energy-Efficient Routing Using Low-Power Sensors Will Meet the Need , 2018, IEEE Consumer Electronics Magazine.

[17]  Riccardo Rovatti,et al.  Low-Cost Security of IoT Sensor Nodes With Rakeness-Based Compressed Sensing: Statistical and Known-Plaintext Attacks , 2018, IEEE Transactions on Information Forensics and Security.

[18]  Weisong Shi,et al.  On security challenges and open issues in Internet of Things , 2018, Future Gener. Comput. Syst..

[19]  Victor I. Chang,et al.  A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment , 2018, Future Gener. Comput. Syst..

[20]  Taekyoung Kwon,et al.  Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks , 2018, IEEE Access.

[21]  P. N. Renjith Towards Secure Data Forwarding with ANFIS and Trust Evaluation in Wireless Sensor Networks , 2020, Wirel. Pers. Commun..

[22]  Robert Earl Patterson,et al.  Intuitive Cognition and Models of Human–Automation Interaction , 2017, Hum. Factors.

[23]  Dengguo Feng,et al.  AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS , 2018, Comput. Networks.

[24]  Chen Wang,et al.  An Efficient Centroid-Based Routing Protocol for Energy Management in WSN-Assisted IoT , 2017, IEEE Access.

[25]  Zhuzhong Qian,et al.  AccessAuth: Capacity-aware security access authentication in federated-IoT-enabled V2G networks , 2017, J. Parallel Distributed Comput..

[26]  Khaled A. Harras,et al.  Cumulus: A distributed and flexible computing testbed for edge cloud computational offloading , 2016, 2016 Cloudification of the Internet of Things (CIoT).

[27]  Jinjun Chen,et al.  A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream , 2015, WISE.