Skip to main content

A Scheme to Improve the Security of IoT Communication

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2022)

Abstract

In the Internet of Vehicles scenario of the Internet of Things, the security of transmission has become a big challenge. In order to deal with such security risks, we add AES encryption mechanism to the classic Ad hoc On-Demand Distance Vector Routing (AODV) routing protocol in mobile sensor networks and design an AODV-AES encrypted communication protocol, which can be applied to wireless sensor networks of Internet of Vehicles. The protocol has the following advantages: low delay, low energy consumption, and high security. The above advantages show that the AODV-AES encryption communication protocol meets the characteristics of low delay, limited memory, and energy storage of mobile sensor nodes. We also compare several protocols through NS2 simulation software, add blackhole attacked in malicious node attacks, and analyze the average end-to-end delay when attacked by different numbers of nodes. In addition, we also analyze the changing trend of source node energy consumption when attacked in different scenarios. The experimental results show that the AODV-AES encryption communication protocol can not only meet the function of encrypting and decrypting privacy information, but also effectively reduce the average end-to-end delay and reduce the energy consumption of the source node when attacked. It shows that the AODV-AES encryption communication protocol can be applied to the wireless mobile sensor network of the Internet of Vehicles, and improve communication security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Agarwal, H.K., Tripathi, M.: OLWS: optimized light weight secure clustering protocol for wireless sensor networks. In: 2019 4th International Conference on Information Systems and Computer Networks (ISCON), pp. 799–804 (2019)

    Google Scholar 

  2. Ajaykumar, N., Sarvagya, M.: Secure and energy efficient routing protocol in wireless sensor network: a survey. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2313–2322 (2017)

    Google Scholar 

  3. Baroudi, U.: Robot-assisted maintenance of wireless sensor networks using wireless energy transfer. IEEE Sens. J. 17(14), 4661–4671 (2017)

    Article  Google Scholar 

  4. Boakye-Boateng, K., Kuada, E., Antwi-Boasiako, E., Djaba, E.: Encryption protocol for resource-constrained devices in fog-based IOT using one-time pads. IEEE Internet Things J. 6(2), 3925–3933 (2019)

    Article  Google Scholar 

  5. Chakeres, I., Belding-Royer, E.: AODV routing protocol implementation design. In: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops, 2004, pp. 698–703 (2004)

    Google Scholar 

  6. Chu, S.I., Huang, Y.J., Lin, W.C.: Authentication protocol design and low-cost key encryption function implementation for wireless sensor networks. IEEE Syst. J. 11(4), 2718–2725 (2017)

    Article  Google Scholar 

  7. Geetha, B., Monika, R., Thejasvi, R., Vibaasundari, N.: A study of different routing protocols and encryption algorithms in wireless networks. In: 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), pp. 1213–1217 (2017)

    Google Scholar 

  8. Gowda, S.N.: Innovative enhancement of the Caesar Cipher algorithm for cryptography. In: International Conference on Advances in Computing, pp. 1–4 (2016)

    Google Scholar 

  9. Hammi, M.T., Livolant, E., Bellot, P., Serhrouchni, A., Minet, P.: A lightweight IOT security protocol. In: 2017 1st Cyber Security in Networking Conference (CSNet), pp. 1–8 (2017)

    Google Scholar 

  10. Jasim, A.A., Idris, M.Y.I.B., Azzuhri, S.R.B., Issa, N.R., Mohamed Noor, N.B.E.A.: Secure and energy-efficient data aggregation method based on an access control model. IEEE Access 7, 164327–164343 (2019)

    Google Scholar 

  11. Kumari, A., Krishnan, S.: Analysis of malicious behavior of blackhole and rushing attack in manet. In: 2019 International Conference on Nascent Technologies in Engineering (ICNTE), pp. 1–6 (2019)

    Google Scholar 

  12. Lee, J., Yu, S., Kim, M., Park, Y., Das, A.K.: On the design of secure and efficient three-factor authentication protocol using honey list for wireless sensor networks. IEEE Access 8, 107046–107062 (2020)

    Article  Google Scholar 

  13. Liang, Y., Wu, X., Meng, X., Zhang, K.: Design and implementation of a 780 mhz wireless sensor network for electric vehicle management system. In: 2019 IEEE 19th International Conference on Communication Technology (ICCT), pp. 967–971 (2019)

    Google Scholar 

  14. Nanda, A., Puthal, D., Rodrigues, J.J.P.C., Kozlov, S.A.: Internet of autonomous vehicles communications security: overview, issues, and directions. IEEE Wirel. Commun. 26(4), 60–65 (2019)

    Article  Google Scholar 

  15. Nazeer, M.I., Mallah, G.A., Memon, R.A.: A hybrid scheme for secure wireless communications in IoT. Intell. Autom. Soft Comput. 29(2), 633–648 (2021)

    Article  Google Scholar 

  16. Piran, M.J., Verma, V.G.M.S., Suh, D.Y.: Energy-efficient transmission range optimization model for WSN-based internet of things. Comput. Mater. Continua 67(3), 2989–3007 (2021)

    Google Scholar 

  17. Singh, A.K., Alshehri, M., Bhushan, S., Kumar, M., et al.: Secure and energy efficient data transmission model for WSN. Intell. Autom. Soft Comput. 27(3), 761–769 (2021)

    Google Scholar 

  18. Butt, T.M., Riaz, R., Paul, A.C.C.S.S.R.: Cogent and energy efficient authentication protocol for WSN in IOT. Comput. Mater. Continua 68(2), 1877–1898 (2021)

    Google Scholar 

  19. Tang, C.: Research and analysis of WSN node location in highway traffic based on priority. J. Quant. Comput. 2(1), 1–9 (2020)

    Article  Google Scholar 

  20. Wang, D., Ren, P., Du, Q., Sun, L., Wang, Y.: Security provisioning for miso vehicular relay networks via cooperative jamming and signal superposition. IEEE Trans. Vehicul. Technol. 66(12), 10732–10747 (2017)

    Article  Google Scholar 

  21. Wu, S.L., Ni, S.Y., Tseng, Y.C., Sheu, J.P.: Route maintenance in a wireless mobile ad hoc network. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, p. 10, vol. 2 (2000)

    Google Scholar 

  22. Yang, L., Lu, Y., Liu, S., Guo, T., Liang, Z.: A dynamic behavior monitoring game-based trust evaluation scheme for clustering in wireless sensor networks. IEEE Access 6, 71404–71412 (2018)

    Article  Google Scholar 

  23. Yassein, M.B., Aljawarneh, S., Qawasmeh, E., Mardini, W., Khamayseh, Y.: Comprehensive study of symmetric key and asymmetric key encryption algorithms. In: 2017 International Conference on Engineering and Technology (ICET), pp. 1–7 (2017)

    Google Scholar 

  24. Zhou, Q., Qin, X., Liu, G., Cheng, H., Zhao, H.: An efficient privacy and integrity preserving data aggregation scheme for multiple applications in wireless sensor networks. In: 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), pp. 291–297 (2019)

    Google Scholar 

Download references

Acknowledgements

This work is supported by the Key Project of Hunan Provincial Department of Education (20A191) and Hunan Teaching Research and Reform Project (2019).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoliang Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fu, J., Wang, X., Liu, Y., Yang, Q., Jiang, F. (2022). A Scheme to Improve the Security of IoT Communication. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2022. Lecture Notes in Computer Science, vol 13340. Springer, Cham. https://doi.org/10.1007/978-3-031-06791-4_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06791-4_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06790-7

  • Online ISBN: 978-3-031-06791-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics