Abstract

AbstractSecuring Internet of Things (IoT) systems is crucial for maintaining the resilience and trustworthiness of smart cities. In this context, the routing protocol's efficiency is pivotal for large‐scale IoT applications. However, achieving dependable and energy‐efficient routing in wireless sensor networks (WSNs) poses significant challenges due to limited and non‐rechargeable node energy resources. Also, traditional approaches often fell short of ensuring robust security and efficient data transmission. Hence, the purpose of this research was to address these shortcomings by introducing the Blowfish Honey‐Improved Spotted Hyena Optimization (BONY‐ISHO) protocol aimed at bolstering the security and efficiency of clustering and data routing in WSNs. Firstly, it introduces blockchain technology to establish secure and authenticated clustering, ensuring that only legitimate cluster heads and member nodes can participate. This innovation significantly enhances network security. Secondly, our protocol incorporates a hybrid Blowfish‐Honey cryptographic technique for data protection within the Area of Interest (AOI). This dual‐layer security approach, comprising Blowfish encryption and Honey encryption for key management, guarantees robust privacy and security. Thirdly, we have optimized data routing through the Improved Spotted Hyena Optimization (ISHO) algorithm, extending the network's lifetime and conserving energy resources. Performance evaluations confirm the superiority of the BONY‐ISHO protocol and existing solutions. It achieves a higher packet delivery ratio (99.8%), increased throughput (45 000 kbps), reduced energy consumption (1.68 joules), and minimized latency (0.068 sec) when compared to traditional methods. These performance enhancements make the BONY‐ISHO protocol a compelling choice for securing and optimizing IoT‐based WSNs. Our study concludes that the BONY‐ISHO protocol is a highly effective solution for addressing security and efficiency challenges in IoT‐based WSNs. By combining blockchain‐based authentication, hybrid cryptography, and intelligent routing algorithms, we have achieved a comprehensive enhancement of network security and data transmission efficiency. The protocol's ability to thwart malicious nodes and optimize routing pathways ensures the integrity and reliability of IoT‐based WSNs.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.