Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Fuzzy, Dynamic and Trust Based Routing Protocol for IoT - 2020

Research Area:  Internet of Things

Abstract:

Internet of Things (IoT) could be described as the pervasive and global network where real-world entities augmented with computing devices, sensors and actuators are connected to the Internet, enabling them to publish their generated data. Thus, an efficient and secure routing service is required to enable efficient communication of information among IoT nodes. This sophisticated, dynamic, and ultra-large-scale network requires the use of contextual information, attention to security issues and the consideration of service quality to make proper routing decisions. The routing protocol for low-power and lossy networks (RPL) and improved versions of it are experiencing severe performance gaps under network attacks such as BLACKHOLE, SYBIL and RANK. This paper uses the concept of trust as an umbrella to cover countermeasures for addressing the consequences of attacks. Accordingly, a multi-fuzzy, dynamic and hierarchical trust model (FDTM-IoT) is proposed. The main dimensions of this model are contextual information (CI), quality of service (QoS) and quality of P2P communication (QPC). Each dimension also has its own sub-dimensions or criteria. FDTM-IoT is integrated into RPL (FDTM-RPL) as objective function. FDTM-RPL use trust to deal with attacks. In the proposed method, fuzzy logic has been used in trust calculations to consider uncertainty as one of the most important inherent characteristics of trust. The efficiency of FDTM-RPL in various scenarios (including small-scale to large-scale networks, mobile environment as well as different transmission rates and under different attacks) has been compared with standard RPL protocols. FDTM-RPL provides high performance in detecting attacks. Additionally, it improves network performance in a variety of criteria, including end-to-end delay and packet loss rates.

Author(s) Name:  Seyyed Yasser Hashemi, Fereidoon Shams Aliee

Journal name:  Journal of Network and Systems Management

Conferrence name:  

Publisher name:  ACM

DOI:  https://doi.org/10.1007/s10922-020-09535-y

Volume Information:  Volume 28,, Issue 4, pp 1248–1278