A QoS-aware Secured Communication Scheme for IoT-based Networks

The Internet of Things (IoT) is an emerging technology that aims to enable the interconnection of a large number of smart devices and heterogeneous networks. Ad hoc networks play an important role in the designing of IoT-enabled platforms due to their efficient, flexible, low-cost, and dynamic infrastructures. These networks utilize the available resources efficiently to maintain the Quality of Service (QoS) in a multi-hop communication. However, in a multi-hop communication, the relay nodes can be malicious, thus requiring a secured and reliable data transmission. In this paper, we propose a QoS-aware secured communication scheme for IoT-based networks (QoS-IoT). In QoS-IoT, a Sybil attack detection mechanism is used for the identification of Sybil nodes and their forged identities in multi-hop communication. After Sybil nodes detection, an optimal contention window (CW) is selected for QoS provisioning, i.e., to achieve per-flow fairness and efficient utilization of the available bandwidth. In a multi-hop communication, the MAC layer protocols do not perform well in terms of fairness and throughput, especially when the nodes generate a large amount of data. It is because the MAC layer has no capability of providing QoS to prioritized or forwarding flows. We evaluate the performance of QoS-IoT in terms of Sybil attack detection, fairness, throughput, and buffer utilization. The simulation results show that the proposed scheme outperforms the existing schemes and significantly enhances the performance of the network with a large volume of data. Moreover, the proposed scheme is resilient against Sybil attack.

[1]  Jiangbin Zheng,et al.  Mobile crowdsensing: A survey on privacy-preservation, task management, assignment models, and incentives mechanisms , 2019, Future Gener. Comput. Syst..

[2]  Laurence T. Yang,et al.  Analytical Model for Sybil Attack Phases in Internet of Things , 2019, IEEE Internet of Things Journal.

[3]  John S. Baras,et al.  Performance-Aware Cross-Layer Design in Wireless Multihop Networks Via a Weighted Backpressure Approach , 2016, IEEE/ACM Transactions on Networking.

[4]  Bruno Baynat,et al.  Performance analysis of multi-hop flows in IEEE 802.11 networks: A flexible and accurate modeling framework , 2016, Perform. Evaluation.

[5]  Narjes Boulila,et al.  Enhanced EDCA with Deterministic Transmission Collision Resolution for Real-Time Communication in Vehicular Ad Hoc Networks , 2018, Wirel. Pers. Commun..

[6]  Laurence T. Yang,et al.  Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things , 2015, IEEE Transactions on Parallel and Distributed Systems.

[7]  Xiangjian He,et al.  A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..

[8]  Mohammad Reza Meybodi,et al.  A Precise Algorithm for Detecting Malicious Sybil Nodes in Mobile Wireless Sensor Networks , 2018 .

[9]  Kenji Nakagawa,et al.  Cross-Layer Scheme to Control Contention Window for Per-Flow in Asymmetric Multi-Hop Networks , 2010, IEICE Trans. Commun..

[10]  Mohammad Reza Meybodi,et al.  A Novel Model of Sybil Attack in Cluster-Based Wireless Sensor Networks and Propose a Distributed Algorithm to Defend It , 2018, Wirel. Pers. Commun..

[11]  Michele Nogueira Lima,et al.  Evaluation of Sybil attack detection approaches in the Internet of Things content dissemination , 2016, 2016 Wireless Days (WD).

[12]  Jie Wu,et al.  Congestion-Free Rerouting of Multiple Flows in Timed SDNs , 2019, IEEE Journal on Selected Areas in Communications.

[13]  Subir Kumar Sarkar,et al.  Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications , 2007 .

[14]  Fazlullah Khan Fairness and throughput improvement in multihop wireless ad hoc networks , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).

[15]  Yi Sun,et al.  A thorough analysis of the performance of delay distribution models for IEEE 802.11 DCF , 2015, Ad Hoc Networks.

[16]  Eun-Chan Park,et al.  Cross-Layer Design for Exposed Node Reduction in Ad Hoc WLANs , 2018, IEICE Trans. Commun..

[17]  Liqun Fu,et al.  Hidden-Node Problem in Full-Duplex Enabled CSMA Networks , 2020, IEEE Transactions on Mobile Computing.

[18]  Xue Liu,et al.  Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI , 2019, IEEE Transactions on Mobile Computing.

[19]  Kenji Nakagawa,et al.  Improving Fairness in Wireless Ad Hoc Networks by Channel Access Sensing at Link Layer and Packet Rate Control , 2017, IEICE Trans. Commun..

[20]  Takefumi Hiraguri,et al.  A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment , 2015, 2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS).

[21]  Qiang Liu,et al.  Fairness and high-throughput scheduling for multihop wireless ad hoc networks , 2016, Ad Hoc Networks.

[22]  Karim Faez,et al.  A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs , 2018, Future Internet.

[23]  Kenji Nakagawa,et al.  Cooperation between Channel Access Control and TCP Rate Adaptation in Multi-Hop Ad Hoc Networks , 2015, IEICE Trans. Commun..

[24]  Fahim Arif,et al.  Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[25]  Aduwati Sali,et al.  Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS) , 2017, Comput. Commun..

[26]  Wei Dong,et al.  Robust and Secure Time-Synchronization Against Sybil Attacks for Sensor Networks , 2015, IEEE Transactions on Industrial Informatics.