Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks

Abstract To improve the data arrival ratio and the transmission delay and considering that the capacity for determining malicious nodes and energy are limited, a security disjoint routing-based verified message (SDRVM) scheme is proposed. The main contributions of SDRVM are as follows: (a) two connected dominating sets (a data CDS and a v-message CDS) are created for disseminating data and verified messages (v-messages), respectively, based on the remaining energy of nodes. (b) Nodes record the ID information in data packets with a specified probability, namely, the marking probability, which is adjusted according to the remaining energy of the nodes. (c) The duty cycle of the nodes is adjusted, and the energy of the nodes is divided into three levels. In the data CDS, the duty cycle of the sensor nodes is the longest and the duty cycle of the nodes that do not belong to either of the CDSs is the shortest. (d) If the energy of the sensor nodes is sufficient, data packets are transmitted several times and the v-messages that are stored in the nodes are transmitted to the destination nodes. The proposed scheme has been evaluated using different parameters where the results obtained prove its effectiveness in comparison to the existing solutions.

[1]  Jun Xu,et al.  Traceback in wireless sensor networks with packet marking and logging , 2011, Frontiers of Computer Science in China.

[2]  Arwa Alrawais,et al.  Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.

[3]  Anfeng Liu,et al.  A novel joint logging and migrating traceback scheme for achieving low storage requirement and long lifetime in WSNs , 2015 .

[4]  Terence D. Todd,et al.  Energy Provisioning in Solar-Powered Wireless Mesh Networks , 2010, IEEE Transactions on Vehicular Technology.

[5]  Zhongmin Wang,et al.  Trust-based distributed Kalman filtering for target tracking under malicious cyber attacks , 2019, Inf. Fusion.

[6]  Jemal H. Abawajy,et al.  Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks , 2017, Future Gener. Comput. Syst..

[7]  Yuan Yan Tang,et al.  Defending against the Advanced Persistent Threat: An Optimal Control Approach , 2018, Secur. Commun. Networks.

[8]  Xuemin Shen,et al.  Energy-Efficient Power Allocation With Individual and Sum Power Constraints , 2018, IEEE Transactions on Wireless Communications.

[9]  Giancarlo Fortino,et al.  Modelling and simulation of Opportunistic IoT Services with Aggregate Computing , 2019, Future Gener. Comput. Syst..

[10]  Jie Li,et al.  Distributed duty cycle control for delay improvement in wireless sensor networks , 2017, Peer-to-Peer Netw. Appl..

[11]  Ning Zhang,et al.  A Secure Charging Scheme for Electric Vehicles With Smart Communities in Energy Blockchain , 2019, IEEE Internet of Things Journal.

[12]  Jie Wu,et al.  Community-Aware Opportunistic Routing in Mobile Social Networks , 2014, IEEE Transactions on Computers.

[13]  Anfeng Liu,et al.  A Trust-Based Active Detection for Cyber-Physical Security in Industrial Environments , 2019, IEEE Transactions on Industrial Informatics.

[14]  Athanasios V. Vasilakos,et al.  IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges , 2017, IEEE Internet of Things Journal.

[15]  Jie Wu,et al.  Online Task Assignment for Crowdsensing in Predictable Mobile Social Networks , 2017, IEEE Transactions on Mobile Computing.

[16]  Iftekhar Ahmad,et al.  Acoustic sensor networks in the Internet of Things applications , 2018, Future Gener. Comput. Syst..

[17]  Anfeng Liu,et al.  Pipeline slot based fast rerouting scheme for delay optimization in duty cycle based M2M communications , 2019, Peer-to-Peer Networking and Applications.

[18]  Jie Wu,et al.  Achieving reliable and secure services in cloud computing environments , 2017, Comput. Electr. Eng..

[19]  Xiaoying Gan,et al.  An Intelligence-Driven Security-Aware Defense Mechanism for Advanced Persistent Threats , 2019, IEEE Transactions on Information Forensics and Security.

[20]  Jie Wu,et al.  Home-Based Zero-Knowledge Multi-Copy Routing in Mobile Social Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[21]  Saru Kumari,et al.  Introduction to the special section on Big data and IoT in e-healthcare , 2018, Comput. Electr. Eng..

[22]  Brijesh Kumar Rai,et al.  A Joint Routing and MAC Protocol for Transmission Delay Reduction in Many-to-One Communication Paradigm for Wireless Sensor Networks , 2017, IEEE Internet of Things Journal.

[23]  Kim-Kwang Raymond Choo,et al.  Enhancing privacy through uniform grid and caching in location-based services , 2017, Future Gener. Comput. Syst..

[24]  Laurence T. Yang,et al.  Trace malicious source to guarantee cyber security for mass monitor critical infrastructure , 2018, J. Comput. Syst. Sci..

[25]  Naixue Xiong,et al.  Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security , 2020, IEEE Transactions on Network Science and Engineering.

[26]  Kuo-Feng Ssu,et al.  Reducing Communication Delay by Finding Sink Location in Low-Duty-Cycle Wireless Sensor Networks , 2013, 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing.

[27]  Xiaohu Tang,et al.  Optimal Power Allocation for Wireless Sensor Powered by Dedicated RF Energy Source , 2019, IEEE Transactions on Vehicular Technology.

[28]  Abdulsalam Yassine,et al.  IoT big data analytics for smart homes with fog and cloud computing , 2019, Future Gener. Comput. Syst..

[29]  Xiao Liu,et al.  Big program code dissemination scheme for emergency software-define wireless sensor networks , 2018, Peer-to-Peer Netw. Appl..

[30]  Anfeng Liu,et al.  UAVs joint vehicles as data mules for fast codes dissemination for edge networking in Smart City , 2019, Peer-to-Peer Networking and Applications.

[31]  Hongwei Li,et al.  Secure Multi-Party Computation: Theory, practice and applications , 2019, Inf. Sci..

[32]  Guojun Wang,et al.  Detection of hidden data attacks combined fog computing and trust evaluation method in sensor‐cloud system , 2018, Concurr. Comput. Pract. Exp..

[33]  Hyunsoo Yoon,et al.  Secure mobile device structure for trust IoT , 2017, The Journal of Supercomputing.

[34]  Zhihui Lu,et al.  Bigdata logs analysis based on seq2seq networks for cognitive Internet of Things , 2019, Future Gener. Comput. Syst..

[35]  Rongxing Lu,et al.  Achieving Privacy-Preserving Multi Dot-Product Query in Fog Computing-Enhanced IoT , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[36]  Zhisheng Niu,et al.  Recursive Waterfilling for Wireless Links With Energy Harvesting Transmitters , 2014, IEEE Transactions on Vehicular Technology.

[37]  Mohamed Jamal Zemerly,et al.  Securing E-Seal real time tracking system for Internet of Things , 2013, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).

[38]  Anfeng Liu,et al.  Content Propagation for Content-Centric Networking Systems From Location-Based Social Networks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[39]  Xuyun Zhang,et al.  Secure Computing for the Internet of Things and Network Edges: Protecting Communication in the Worldwide Network of Devices , 2018, IEEE Consumer Electronics Magazine.

[40]  Ming Zhao,et al.  Adjusting forwarder nodes and duty cycle using packet aggregation routing for body sensor networks , 2020, Inf. Fusion.

[41]  Jie Wu,et al.  Time-Sensitive Utility-Based Single-Copy Routing in Low-Duty-Cycle Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.