Dynamic IoT Specific Inclusion Exclusion Strategic Secure Routing for Improved QoS Development in Industrial Networks
International Journal of Electronics and Communication Engineering |
© 2023 by SSRG - IJECE Journal |
Volume 10 Issue 6 |
Year of Publication : 2023 |
Authors : N. Babu, Tamilarasi Suresh |
How to Cite?
N. Babu, Tamilarasi Suresh, "Dynamic IoT Specific Inclusion Exclusion Strategic Secure Routing for Improved QoS Development in Industrial Networks," SSRG International Journal of Electronics and Communication Engineering, vol. 10, no. 6, pp. 92-103, 2023. Crossref, https://doi.org/10.14445/23488549/IJECE-V10I6P108
Abstract:
Industrial network-based secure routing has been investigated in many articles. Also, the entry of IoT devices has been adapted to different industrial environments. The presence of Internet of Things (IoT) devices would support the performance development in data transmission. Numerous approaches are discussed in the literature but struggle to achieve the expected performance. IoT devices are standalone devices not part of the network, and trust in such devices is highly questionable. However, the QoS metrics can be improved by including such devices in data transmission. On the other side, measuring the trust of such IoT devices is most important in the routing procedure. Considering this, an IoT-specific Inclusion and Exclusion Strategic Secure Routing scheme (IESSR) is presented in this article. The routes available to reach the destination are identified initially. Further, a list of IoT devices in each route is identified. Also, the transmission frequency encountered is computed on different nodes and IoT devices. According to the status of transmission, and other features, the method computes the General Secure Route Measure (GSRM), Inclusion Specific Secure Route Measure (ISSRM), and Exclusion Specific Secure Route Measure (ESSRM). Using both measures, the method would compute the value of transmission strength for different routes. According to transmission strength, the optimal route for data transmission is selected.
Keywords:
Industrial network, Secure routing, IoT, Inclusion, Exclusion, IESSR, ISSRM, ESSRM, QoS.
References:
[1] Rashmita Khilar et al., “Artificial Intelligence-Based Security Protocols to Resist Attacks in Internet of Things,” Wireless Communications and Mobile Computing, vol. 2022, pp. 1-10, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Mugesh Ravi, “A Survey on Security Risks in Internet of Things (IoT) Environment,” Journal of Computational Science and Intelligent Technologies, vol. 1, no. 2, pp. 1-8, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[3] S. Menaga et al., “An Efficient Biometric Based Authenticated Geographic Opportunistic Routing for IoT Applications using Secure Wireless Sensor Network,” Materials Today: Proceedings, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Anindya Kumar Biswas, and Mou Dasgupta, “A Secure Hybrid Routing Protocol for Mobile Ad-Hoc Networks (MANETs),” 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1-7, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Duvvada Shreya Sri, and R. V. L. S. N. Sastry, “An Efficient and Secure Data Transmission of Common Randomness Routing in Adhoc Wireless Network,” International Journal of P2P Network Trends and Technology, vol. 9, no. 1, pp. 1-4, 2019.
[Publisher Link]
[6] S. Ranjithkumar, and N. Thillaiarasu, “A Survey of Secure Routing Protocols of Mobile AdHoc Network,” SSRG International Journal of Computer Science and Engineering, vol. 2, no. 2, pp. 34-39, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Gurveen Vaseer, “Multi-Attack Detection using Forensics and Neural Network Based Prevention for Secure MANETs,” 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1-6, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Majdi Alqdah, “Intrusion Detection Attacks Classification using Machine Learning Techniques,” Journal of Computational Science and Intelligent Technologies, vol. 2, no. 2, pp. 1-6, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Xiaoxiong Zhong et al., “DSOR: A Traffic-Differentiated Secure Opportunistic Routing with Game Theoretic Approach in MANETs,” 2019 IEEE Symposiums on Computer and Communication (ISCC), pp. 1-6, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Manisha Rathee et al., “Ant Colony Optimization Based Quality of Service Aware Energy Balancing Secure Routing Algorithm for Wireless Sensor Networks,” IEEE Transactions on Engineering Management, vol. 68, no. 1, pp. 170-182, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Khalid Haseeb et al., “Intrusion Prevention Framework for Secure Routing in WSN-Based Mobile Internet of Things,” IEEE Access, vol. 7, pp. 185496-185505, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[12] M. Supriya, and T. Adilakshmi, “Secure Routing using ISMO for Wireless Sensor Networks,” SSRG International Journal of Computer Science and Engineering, vol. 8, no. 12, pp. 14-20, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[13] M. S. Krishnaveni, and K. Kavitha, “Secure Routing in Wireless Sensor Network using HTARF,” SSRG International Journal of Computer Science and Engineering, vol. 3, no. 5, pp. 27-30, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Sijan Shrestha et al., “Securing Blackhole Attacks in MANETs using Modified Sequence Number in AODV Routing Protocol,” 2020 8th International Electrical Engineering Congress (iEECON), pp. 1-4, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[15] V. Sesha Bhargavi, M. Seetha, and S. Viswanadharaju, “A Trust-Based Secure Routing Scheme for MANETS,” 2016 6th International Conference - Cloud Systems and Big Data Engineering (Confluence), pp. 565-570, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Sakshi Yadav et al., “Securing AODV Routing Protocol against Black Hole Attack in MANET using Outlier Detection Scheme,” 2017 4th IEEE Uttar Pradesh Section International Conferences on Electricals, Computers and Electronics (UPCON), pp. 1-4, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Gurveen Vaseer, Garima Ghai, and Dhruva Ghai, “Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks: A Single-and Multiattack Case Study,” IEEE Consumer Electronics Magazine, vol. 8, no. 3, pp. 35-39, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[18] C. Deepa, and B. Latha, “An Energy Efficient Secure Routing (EESR) using Elliptic Curve Cryptography for Wireless Sensor Networks,” 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, India, pp. 1603-1608, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Ranu Shukla, Rekha Jain, and P. D. Vyavahare, “Combating against Wormhole Attack in Trust And Energy Aware Secure Routing Protocol (TESRP) in Wireless Sensor Network,” 2017 International Conferences on Recent Innovation in Signals Processing and Embedded System (RISE), Bhopal, India, pp. 555-561, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Rutuja Ashtikar, Deepali Javale, and Sujata Wakchaure, “Energy Efficient and Secured Data Routing through Aggregation Node in WSN,” 2017 International Conferences on Computing, Communications, Control and Automations (ICCUBEA), Pune, India, pp. 1-6, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[21] K. RupaRani, and K. Jagdeeshwara Rao, “An Improved Novel Design for User Authentication and Secure Transmission of Data in End to End Routing in Wireless Sensor Network,” International Journal of P2P Network Trends and Technology (IJPTT), vol. 8, no. 2, pp. 8-13, 2018.
[Publisher Link]
[22] C. Prasad Reddy, “Programmable Wireless Sensor Network for Industrial Automation and Environmental Safety,” SSRG International Journal of Industrial Engineering, vol. 1, no. 1, pp. 4-6, 2014.
[CrossRef] [Publisher Link]
[23] Gaosheng Liu et al., “ESRQ: An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning,” 2018 17th IEEE International Conferences on Trust, Security and Privacy in Computing and Communication/ 12th IEEE International Conferences on Big Data Sciences and Engineering (TrustCom/BigDataSE), New York, USA, pp. 149-155, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Hilmi Lazrag, Rachid Saadane, and Driss Aboutajdine, “A Game Theoretic Approach for Optimal and Secure Routing in WSN,” Proceedings of the Third International Afro-European Conferences for Industrial Advancements-AECIA 2016, vol. 565, pp. 218-228, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[25] G. M. Navami Patil, and P. I. Basarkod, “Trust Model for Secure Routing and Localizing Malicious Attackers in WSN,” Computing and Network Sustainability, pp. 1-9, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Danyang Qin et al., “Research on Trust Sensing Based Secure Routing Mechanism for Wireless Sensor Network,” IEEE Access, vol. 5, pp. 9599-9609, 2017.[CrossRef] [Google Scholar] [Publisher Link]