Chaotic Whale Crow Optimization Algorithm for Secure Routing in the IoT Environment

Chaotic Whale Crow Optimization Algorithm for Secure Routing in the IoT Environment

Meghana Gopal Raj, Santosh Kumar Pani
Copyright: © 2022 |Pages: 25
DOI: 10.4018/IJSWIS.300824
Article PDF Download
Open access articles are freely available for download

Abstract

This paper solves the internet of things (IoT) security issues by introducing a chaotic whale crow (CWC) optimization, which is the integration of chaotic whale optimization algorithm (CWOA) in crow search algorithm (CSA). The framework operates on two crucial aspects: one is to select the secure nodes, and the other is to implement secure routing using the selected trusted nodes. First, the selection of trusted nodes is performed based on trust factors like direct, indirect, forwarding rate, integrity, and availability factors. Then, the selected trusted nodes are adapted for trust-based secure routing, which is optimally performed using the proposed CWC, based on the fitness parameters trust and energy. Finally, the proposed CWC is evaluated, which revealed high performance with a minimal delay of 191.46ms, which shows 14.87%, 7.35%, 6.82%, 4.19%, and 5.74% improved performance compared to existing LaSeR, PM Ipv6, secTrust-RPL RISA, and LSDAR techniques. Similarly, the proposed method obtained the maximal energy of 71.25J and maximal throughput of 129.77kbps.
Article Preview
Top

1. Introduction

The innovation of advanced services and the development of information on the internet have escorted to novel ideas, conceptions, and paradigms, like the Internet of Things (IoT). However, the conventional network infrastructures require high-level configuring protocols and network policies and are ineffective and pose noteworthy drawbacks for supporting high level scalability, huge traffic, and mobility (Liu, et al., 2017). IoT is considered an advanced technology whose goal is to connect anything, anywhere, and anytime. The objects connected with the IoT must be addressable and hold a unique Identifier (ID) for connecting the internet. An IoT can be anything, which includes humans, light bulbs, computers, and cars. IoT offers a virtual image of the physical objects that are connected with the internet. IoT is progressed in various domains, like machine-machine technologies, networking, hardware, and software, contributing to the emergence of IoT (Kalkan & Zeadally, 2017). IoT is the extensive usage of systems that poses heterogeneous technologies and novel paradigms for connecting the devices with the help of Transmission Control Protocol/Internet Protocol (TCP/IP) (Bellovin, 1989) using the physical environments (Airehrour, et al., 2016). IoT is applicable in water grids, management automation, building, industrial smart grid systems, smart cities, and agriculture. The sensors are deployed in the energy-constrained networks, and they achieve computational functions and storage by communicating through the lossy channels (Airehrour, et al., 2019).

IoT has significantly implicated people's day-to-day lives with heterogeneous devices, like homogeneous devices that include most sensor networks and smart homes. IoT produced tremendous convenience in handling the energy-constrained sensors (Rathee, et al., 2019). The dynamic forces of IoT in networking and routing provide effective device interconnections (Airehrour, et al., 2019; Miorandi, et al., 2012). The foremost contemplation in IoT routing is autonomy, scalability, energy efficiency, and secured communication. However, the exceptional features of IoT networks made them susceptible to attacks. As a result, secure data communication and routing are the two barriers in the IoT network. These barriers need to be resolved using the network topologies with different networks for general understanding. Consistency plays a vital role in routing a packet that arrives from the IoT-enabled device. Thus, the security of an IoT system is a major aspect that engages in detailed research due to the secure networks that are imperative in the IoT systems (Airehrour, et al., 2019). In secure routing, the reputation computes the routing and forwarding rate based on the authentication and encryption mechanisms with the appropriate broadcast of acknowledgments per transmitted packet (Hatzivasilis, et al., 2017). Trust is considered as the confidence level of an entity, which holds about others in routing. Moreover, trust is considered the collection of all reputation values, which the entity holds for other contributors (Hatzivasilis, et al., 2017). The Semantic technologies integrate and the interoperability of sensor nodes and hence the organization, management, and controlling of high level specifications. The IoT is flexible and has good scalability of processing applications. However, the semantic solution requires more mechanisms. Besides, in the romantic review, the searching of the title doesn't provide all related publications. Real time data streaming is not available in the IoT (Harlamova,et al., 2017).

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024)
Volume 19: 1 Issue (2023)
Volume 18: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing