Abstract

Internet of Things (IoT) has gained popularity with the growth and prospects of smart networks. It is intended to exploit the network edges, which enables smart service and assessment for IoT. Moreover, this exploitation not only improves the user experiences but also provides service resiliencies at any catastrophe. The IoT appliances deploy distributed structure and proximity of end-users to offer quicker responses and improved quality of service (QoS). Nevertheless, security is mainly considered to resist the susceptibility of attacks. This work aims to introduce a novel secure routing model by carrying out optimal path selection and encryption. Initially, optimal link-state multipath routing takes place, where optimal paths or nodes are chosen for secure transmission. For optimal path selection destination and source, a Crossover Mutated Marriage in Honey Bee (CM-MH) algorithm is developed and proposed in this work. Next, encryption takes place that ensures secure transmission. In this research, an Improved Blowfish algorithm (IBFA) is proposed for secured authentication. Finally, the updates are monitored. At last, the supremacy of the developed approach is examined via evaluation over numerous existing techniques.

Highlights

  • Description Advanced Encryption Standard Authentication and Encryption Model Application Programming Interface Chosen-Plaintext Attack Crossover Mutated Marriage in Honey Bee Chosen-Ciphertext Attack CrowWhale optimization algorithm Crow Whale-energy trust routing Energy Efficiency ETR Crow Whale-energy trust routing Firefly Genetic Algorithm Improved Blowfish algorithm Internet of Things Intrusion Detection System Marriage in Honey Bee Optimization Particle Swarm Optimization Perceptron Detection with Enhancement Packet Drop Rate quality of service (QoS)-based Cross-layer Multichannel Multi-sink Routing protocol Quality Of Service Routing Protocol for Low-Power and Loss Network Rivest–Shamir–Adleman Secure and Scalable Routing Protocol Two-Fish

  • The introduced secure routing model via Crossover Mutated Marriage in Honey Bee (CM-MH) was executed in Matlab with ThingSpeak

  • The enhancement of the developed CM-MH model was measured by evaluating it over extant schemes, namely PSO [36], FF [37], GA [38] and MHBO [21], Taylor-based Grey Wolf Optimization algorithm (TGWOA) [39], and CWOA [40] models

Read more

Summary

Introduction

Description Advanced Encryption Standard Authentication and Encryption Model Application Programming Interface Chosen-Plaintext Attack Crossover Mutated Marriage in Honey Bee Chosen-Ciphertext Attack CrowWhale optimization algorithm Crow Whale-energy trust routing Energy Efficiency ETR Crow Whale-energy trust routing Firefly Genetic Algorithm Improved Blowfish algorithm Internet of Things Intrusion Detection System Marriage in Honey Bee Optimization Particle Swarm Optimization Perceptron Detection with Enhancement Packet Drop Rate QoS-based Cross-layer Multichannel Multi-sink Routing protocol Quality Of Service Routing Protocol for Low-Power and Loss Network Rivest–Shamir–Adleman Secure and Scalable Routing Protocol Two-Fish. IoT can be utilized together with vehicles using VANETs and it could be deployed for data collection routing [6,7,8]. WSNs play an important role in the growth of the Internet of Things, and they are made up of low-cost smart devices that collect data. Smart gadgets have limitations in terms of computing, processing, memory, and energy. To overcome such susceptible attacks or activities, IDS is deployed practically. It is essential to model the WSN nodes with EE, to formulate the associated protocols to enhance entire network quality with security while routing [20,21,22,23,24]. This work proposes a new Crossover Mutated Marriage in Honey Bee model for optimal path selection between destination and source

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.