Skip to main content
Top

2024 | OriginalPaper | Chapter

Intuitionistic Fuzzy-Based Trust Computation for Secure Routing in IoT

Authors : Renu Mishra, Sandeep Saxena, Arun Kumar Singh, Varun Shukla

Published in: Cryptology and Network Security with Machine Learning

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

IoTs are being very popular these days due to their application in a number of areas. However, they are also used in some sensitive applications where security is a prime concern like military operations, whereby if the network is compromised then the outcomes can be disastrous. Secure routing is a challenging task in mobile ad hoc networks where no fixed infrastructure exists. Trust can be a solution to handle the soft security intimidation. The identities on the IoT networks should be verified using an effective trust management method to ensure secure and reliable routing. However, the nodes feature and task complexity perform managing trust a difficult process. The proposed trust-based proposed approach includes various dimensions of trust such as direct trust, behavioral, and recommendation in trusting with the gap filling purpose along with dishonest recommendation for neighbors and energy efficiency. This paper proposed a secured route selection approach for IoT environment by using very popular Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS). Moreover, Intuitionistic fuzzy is applied to manage not only numerical trust value but linguistic data also. The results of experiments specify that the proposed framework utilize the parameters under consideration. The current work in addition, compute the total trust by considering all three dimensions The trusted value of indirect nature is derived with the help of trust value indicated by the recommending nodes based on their trustworthiness with the evaluating, and the direct trust value is determined with the supporting of existing contacts between the evaluating and evaluated. The direct trust value is reliable and resistant to untruthful recommendations. The dishonest suggestions of the other nearby nodes, however, can make an indirect recommendation vulnerable. The use of intuitionistic fuzzy approach can solve the problem of dishonest advice. Finally trust values are used in data maintained as well moving toward trust value trust value for each neighbors node to opt for the secured path between two nodes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hossain MS, Muhammad G, Alamri A (2019) Smart healthcare monitoring: a voice pathology detection paradigm for smart cities. Multimedia Syst 25:565–575CrossRef Hossain MS, Muhammad G, Alamri A (2019) Smart healthcare monitoring: a voice pathology detection paradigm for smart cities. Multimedia Syst 25:565–575CrossRef
2.
go back to reference Mollah MB, Islam KR, Islam SS (2012) Next generation of computing through cloud computing technology. In: 2012 25th IEEE Canadian conference on electrical computer engineering (CCECE), pp 1–6 Mollah MB, Islam KR, Islam SS (2012) Next generation of computing through cloud computing technology. In: 2012 25th IEEE Canadian conference on electrical computer engineering (CCECE), pp 1–6
3.
go back to reference Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable and fine-grained data access control in cloud computing. In: IN-FOCOM, 2010 proceedings IEEE, pp 1–94 Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable and fine-grained data access control in cloud computing. In: IN-FOCOM, 2010 proceedings IEEE, pp 1–94
4.
go back to reference Arun Kumar S, Dhanasekar S (2014) A literature survey on key aggregation system for secure sharing of cloud data. Int J Adv Res Electron Commun Eng 3(12) Arun Kumar S, Dhanasekar S (2014) A literature survey on key aggregation system for secure sharing of cloud data. Int J Adv Res Electron Commun Eng 3(12)
5.
go back to reference Kim H, Lee H, Kim W, Kim Y A trust evaluation model for QoS guarantee in cloud systems. Dept. of Information and Communication Engineering, Dongguk University Seoul, 100–715, South Korea Kim H, Lee H, Kim W, Kim Y A trust evaluation model for QoS guarantee in cloud systems. Dept. of Information and Communication Engineering, Dongguk University Seoul, 100–715, South Korea
6.
go back to reference Sreedevi G, Rajendra C (2012) ICCC: information correctness to the customers in cloud data storage Sreedevi G, Rajendra C (2012) ICCC: information correctness to the customers in cloud data storage
7.
go back to reference Batra K, Sunitha C, Kumar S (2013) An effective data storage security scheme for cloud computing. Batra K, Sunitha C, Kumar S (2013) An effective data storage security scheme for cloud computing.
8.
go back to reference Rajasekar K, Kamalanathan C (2012) Towards of secured cost-effective multi-cloud storage in cloud computing Rajasekar K, Kamalanathan C (2012) Towards of secured cost-effective multi-cloud storage in cloud computing
9.
go back to reference Wang Q, Wang C, Ren K, Lou W, Li J Enabling public auditability and data dynamics for storage security in cloud computing Wang Q, Wang C, Ren K, Lou W, Li J Enabling public auditability and data dynamics for storage security in cloud computing
10.
go back to reference Huang J, Nicol DM Trust mechanisms for cloud computing. In: Qu C, Buyya R (eds) A cloud trust evaluation system using hierarchical fuzzy inference system for service selection Huang J, Nicol DM Trust mechanisms for cloud computing. In: Qu C, Buyya R (eds) A cloud trust evaluation system using hierarchical fuzzy inference system for service selection
11.
go back to reference Bohli J-M, Gruschka N, Jensen M, Lacono LL, Marnau N (2013) Security and privacy-enhancing multicloud architectures. In: IEEE transactions on dependable and secure computing, vol 10, no 4 Bohli J-M, Gruschka N, Jensen M, Lacono LL, Marnau N (2013) Security and privacy-enhancing multicloud architectures. In: IEEE transactions on dependable and secure computing, vol 10, no 4
12.
go back to reference Chan H, Perrig A, Song D (2006) Secure hierarchical in-network aggregation in sensor networks. In: Proceedings of ACM conference on computer and communications security (CCS), pp 278–287 Chan H, Perrig A, Song D (2006) Secure hierarchical in-network aggregation in sensor networks. In: Proceedings of ACM conference on computer and communications security (CCS), pp 278–287
13.
go back to reference Wagner D (2004) Resilient aggregation in sensor networks. In: Proceedings of ACM workshop security sensor ad hoc network (SASN), pp 68–79 Wagner D (2004) Resilient aggregation in sensor networks. In: Proceedings of ACM workshop security sensor ad hoc network (SASN), pp 68–79
14.
go back to reference Chen B, Yu H (2011) Secure aggregation with malicious node revocation in sensor networks. In: Proceedings of 31st international conference on distributed computing systems workshops (ICDCS), pp 581–592 Chen B, Yu H (2011) Secure aggregation with malicious node revocation in sensor networks. In: Proceedings of 31st international conference on distributed computing systems workshops (ICDCS), pp 581–592
15.
go back to reference Przydatek B, Song D, Perrig A (2003) SIA: secure information aggregation in sensor networks. In: Proceedings of 1st international conference on embedded networked sensor systems (SenSys), pp 255–265 Przydatek B, Song D, Perrig A (2003) SIA: secure information aggregation in sensor networks. In: Proceedings of 1st international conference on embedded networked sensor systems (SenSys), pp 255–265
16.
go back to reference Sharma S, Mishra R, Kaur I (2010) New trust based security approach for ad-hoc networks in proceeding of 3rd International Conference on Computer Science and Information Technology, Chengdu, China, pp 428–431 Sharma S, Mishra R, Kaur I (2010) New trust based security approach for ad-hoc networks in proceeding of 3rd International Conference on Computer Science and Information Technology, Chengdu, China, pp 428–431
17.
go back to reference Hu L, Evans D (2003) Secure aggregation for wireless networks. In: Proceedings on workshop security assurance ad hoc network, pp 384–391 Hu L, Evans D (2003) Secure aggregation for wireless networks. In: Proceedings on workshop security assurance ad hoc network, pp 384–391
18.
go back to reference Mishra R, Kaur I, Saxena S, Mishra R, Shree T, Sachdeva M (2023) Trust-aware mitigation of various security threats for internet of things. In: Proceedings of ICISSI 2022 (1st ed.). CRC, pp 331–336 Mishra R, Kaur I, Saxena S, Mishra R, Shree T, Sachdeva M (2023) Trust-aware mitigation of various security threats for internet of things. In: Proceedings of ICISSI 2022 (1st ed.). CRC, pp 331–336
19.
go back to reference Mishra R, Saxena S (2023) Blockchain technology based security for UAV IoT environment. In: Jain K, Mishra V, Pradhan B (eds) Proceedings of UASG 2021: Wings 4 sustainability. UASG 2021. Lecture notes in civil engineering, vol 304. Springer, Cham Mishra R, Saxena S (2023) Blockchain technology based security for UAV IoT environment. In: Jain K, Mishra V, Pradhan B (eds) Proceedings of UASG 2021: Wings 4 sustainability. UASG 2021. Lecture notes in civil engineering, vol 304. Springer, Cham
20.
go back to reference Gurout T, Medjiah S, Costa GD, Monteil T (2014) Quality of service modeling for green scheduling in clouds. Sustain Comput Inf Syst 4(4):225–240 Gurout T, Medjiah S, Costa GD, Monteil T (2014) Quality of service modeling for green scheduling in clouds. Sustain Comput Inf Syst 4(4):225–240
21.
go back to reference Frikken, Dougherty JA (2008) An efficient integrity-preserving scheme for hierarchical sensor aggregation. In Proceedings of 1st ACM conference on wireless network security (WiSec), pp 68–76 Frikken, Dougherty JA (2008) An efficient integrity-preserving scheme for hierarchical sensor aggregation. In Proceedings of 1st ACM conference on wireless network security (WiSec), pp 68–76
22.
go back to reference Nath S, Yu H, Chan H (2009) Secure outsourced aggregation via one-way chains. In: Proceedings of 35th SIGMOD international conference on management data, pp 31–44 Nath S, Yu H, Chan H (2009) Secure outsourced aggregation via one-way chains. In: Proceedings of 35th SIGMOD international conference on management data, pp 31–44
23.
go back to reference Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD (2001) SPINS: security protocols for sensor networks. In: Proceedings of the annual international conference on mobile computing and networking (MobiCOM), pp 189–199 Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD (2001) SPINS: security protocols for sensor networks. In: Proceedings of the annual international conference on mobile computing and networking (MobiCOM), pp 189–199
24.
go back to reference He W, Liu X, Nguyen H, Nahrstedt K, Abdelzaher TF (2007) PDA: privacy-preserving data aggregation in wireless sensor networks. In: Proceedings of IEEE international conference on computer communications (INFOCOM), pp 2045–2053 He W, Liu X, Nguyen H, Nahrstedt K, Abdelzaher TF (2007) PDA: privacy-preserving data aggregation in wireless sensor networks. In: Proceedings of IEEE international conference on computer communications (INFOCOM), pp 2045–2053
25.
go back to reference Roy S, Conti M, Setia S, Jajodia S (2013) Secure data aggregation in wireless sensor networks: filtering out the attacker’s impact Roy S, Conti M, Setia S, Jajodia S (2013) Secure data aggregation in wireless sensor networks: filtering out the attacker’s impact
26.
go back to reference Hojabri M (2012) Ensuring data storage security in cloud computing with effect of Kerberos Hojabri M (2012) Ensuring data storage security in cloud computing with effect of Kerberos
27.
go back to reference Vairagade RS, Vairagade NA (2012) Cloud computing data storage and security enhancement Vairagade RS, Vairagade NA (2012) Cloud computing data storage and security enhancement
28.
go back to reference Flajolet P, Martin GN (1985) Probabilistic counting algorithms for data base applications. J Comput Syst Sci 31(2):182–209MathSciNetCrossRef Flajolet P, Martin GN (1985) Probabilistic counting algorithms for data base applications. J Comput Syst Sci 31(2):182–209MathSciNetCrossRef
Metadata
Title
Intuitionistic Fuzzy-Based Trust Computation for Secure Routing in IoT
Authors
Renu Mishra
Sandeep Saxena
Arun Kumar Singh
Varun Shukla
Copyright Year
2024
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_50