Skip to main content
Log in

An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) defines the network of physical objects, commonly used to interconnect and communicate with other devices through the internet. Security is highly essential in IoT based communication owing to the massive heterogeneity of devices involved in the network. The interlinked systems in IoT, requires the trusted model for assuring security, authenticity, authorization and confidentiality of interconnected things, irrespective of the functionalities. Considering the challenges in the provision of security in the IoT network, this paper proposes a new chaotic bumble bees mating optimization (CBBMO) algorithm for secure data transmission with trust sensing model, called CBBMOR-TSM model. The BBMO is stimulated by the mating nature of a swarm of bumble bees. To improve the convergence rate of the BBMO technique, the CBBMO model is defined by the integration of chaotic concept into the classical BBMO technique. The aim of the proposed model is to design a trust sensing model and perform secure routing using the CBMO algorithm. The proposed model initially designs a trust sensing model by incorporating indirect and direct trusts that are utilized to determine the trust values of the IoT nodes and thereby the malicious node can be identified. In addition, the secure routing process is invoked using the CMBO algorithm by using the trust sensing model to determine an optimal and secure path for data transmission. To examine the superior performance of the presented method, an extensive set of experiments are performed and the results are investigated in terms of different measures. The CBBMOR-TSM model has attained a higher average PDR of 0.931 and lower average PLR of 0.069 whereas the TRM_IOT, OSEAP_IOT and MCTAR-IOT methods have achieved a maximum PLR of 0.219, 0.161 and 0.110 respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Shin, D., Sharma, V., Kim, J., Kwon, S., You, I.: Secure and efficient protocol for route optimization in PMIPv6-based smart home IoT networks. IEEE Access 5, 11100–11117 (2017)

    Article  Google Scholar 

  2. Abualigah, L., Diabat, A., Elaziz, M.A.: Intelligent workflow scheduling for Big Data applications in IoT cloud computing environments. Clust. Comput. 24, 2957–2976 (2021). https://doi.org/10.1007/s10586-021-03291-7

    Article  Google Scholar 

  3. Vivekanand, V., Thushara, V.T.: Ultra resource constrained adaptive multipath routing for meteorological sensor networks. In: 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1–6. IEEE (2016)

  4. Paulraj, D.: An automated exploring and learning model for data prediction using balanced CA-SVM. J. Ambient Intell. Hum. Comput. (2020). https://doi.org/10.1007/s12652-020-01937-9

    Article  Google Scholar 

  5. Mohammadi, V., Rahmani, A.M., Darwesh, A.M., Sahafi, A.: Trust-based recommendation systems in Internet of Things: a systematic literature review. HCIS 9(1), 1–61 (2019)

    Google Scholar 

  6. Kobayashi, G., Quilici-Gonzalez, M.E., Broens, M.C., Quilici-Gonzalez, J.A.: The ethical impact of the Internet of Things in social relationships: technological mediation and mutual trust. IEEE Consum. Electron. Mag. 5(3), 85–89 (2016)

    Article  Google Scholar 

  7. Anand, J.G.: Trust based optimal routing in MANET's. In: 2011 International Conference on Emerging Trends in Electrical and Computer Technology (pp. 1150–1156). IEEE (2011)

  8. Divyabharathi, S.: Large scale optimization to minimize network traffic using MapReduce in big data applications. In: International Conference on Computation of Power, Energy Information and Communication (ICCPEIC), pp. 193–199. https://doi.org/10.1109/ICCPEIC.2016.7557196 (2016)

  9. Kamalraj, R., Neelakandan, S., Ranjith Kumar, M., Chandra Sekhar Rao, V., Anand R., Singh, H.: Interpretable filter based convolutional neural network for glucose prediction and classification using. Measurement 183, 184 (2021)

  10. Yiğit, B., Gür, G., Alagöz, F., Tellenbach, B.: Cost-aware securing of IoT systems using attack graphs. Ad Hoc Netw. 86, 23–35 (2019)

    Article  Google Scholar 

  11. Berlin, M.A., Tripathi, S., et al.: IoT-based traffic prediction and traffic signal control system for smart city. Soft. Comput. (2021). https://doi.org/10.1007/s00500-021-05896-x

    Article  Google Scholar 

  12. Almobaideen, W., Krayshan, R., Allan, M., Saadeh, M.: Internet of Things: geographical routing based on healthcare centers vicinity for mobile smart tourism destination. Technol. Forecast. Soc. Chang. 123, 342–350 (2017)

    Article  Google Scholar 

  13. Shende, D.K. and Sonavane, S.S., 2020. CrowWhale-ETR CrowWhale optimization algorithm for energy and trust aware multicast routing in WSN for IoT applications. Wireless Networks 1:1–19. Doi: https://doi.org/10.1007/s11276-020-02299-y(0123456789(

  14. Malchi, S.K., Kallam, S., Al-Turjman, F., Patan, R.: A trust-based fuzzy neural network for smart data fusion in internet of things. Comput. Electr. Eng. 89, 106901 (2021)

    Article  Google Scholar 

  15. Seyfollahi, A., Ghaffari, A.: Reliable data dissemination for the Internet of Things using Harris hawks optimization. Peer-to-Peer Netw. Appl. 13(6), 1886–1902 (2020)

    Article  Google Scholar 

  16. Wang, Y., Zhang, M., Shu, W.: An emerging intelligent optimization algorithm based on trust sensing model for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2018(1), 1–10 (2018)

    Article  Google Scholar 

  17. Gali, S., Nidumolu, V.: Multi-context trust aware routing for internet of things. Int. J. Intell. Eng. Syst. 12(1), 189–200 (2018)

    Google Scholar 

  18. Mabodi, K., Yusefi, M., Zandiyan, S., Irankhah, L., Fotohi, R.: Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. J. Supercomput. 76, 7081–7106 (2020)

  19. Mo, W., Wang, T., Zhang, S., Zhang, J.: An active and verifiable trust evaluation approach for edge computing. J. Cloud Comput. 9(1), 1–19 (2020)

    Article  Google Scholar 

  20. Djedjig, N., Tandjaoui, D., Medjek, F., Romdhani, I.: Trust-aware and cooperative routing protocol for IoT security. J. Inf. Secur. Appl. 52, 102467 (2020)

    Google Scholar 

  21. Tandon, A., Srivastava, P.: Trust-based enhanced secure routing against rank and sybil attacks in IoT. In: 2019 Twelfth International Conference on Contemporary Computing (IC3), pp. 1–7. IEEE (2019).

  22. Stavrinides, G.L., Karatza, H.D.: Orchestrating real-time IoT workflows in a fog computing environment utilizing partial computations with end-to-end error propagation. Clust. Comput. 24, 3629–3650 (2021). https://doi.org/10.1007/s10586-021-03327-y

    Article  Google Scholar 

  23. Ghamry, W.K., Shukry, S.: Spectrum access in cognitive IoT using reinforcement learning. Clust. Comput. 24, 2909–2925 (2021). https://doi.org/10.1007/s10586-021-03306-3

    Article  Google Scholar 

  24. Etemadi, M., Ghobaei-Arani, M., Shahidinejad, A.: A cost-efficient auto-scaling mechanism for IoT applications in fog computing environment: a deep learning-based approach. Clust. Comput. 24, 3277–3292 (2021)

    Article  Google Scholar 

  25. Denko, M.K., Sun, T., Woungang, I.: Trust management in ubiquitous computing: a Bayesian approach. Comput. Commun. 34(3), 398–406 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sowmya Gali.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gali, S., Nidumolu, V. An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things. Cluster Comput 25, 1779–1789 (2022). https://doi.org/10.1007/s10586-021-03473-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-021-03473-3

Keywords

Navigation