Skip to main content

2024 | OriginalPaper | Buchkapitel

Intuitionistic Fuzzy-Based Trust Computation for Secure Routing in IoT

verfasst von : Renu Mishra, Sandeep Saxena, Arun Kumar Singh, Varun Shukla

Erschienen in: Cryptology and Network Security with Machine Learning

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

IoTs are being very popular these days due to their application in a number of areas. However, they are also used in some sensitive applications where security is a prime concern like military operations, whereby if the network is compromised then the outcomes can be disastrous. Secure routing is a challenging task in mobile ad hoc networks where no fixed infrastructure exists. Trust can be a solution to handle the soft security intimidation. The identities on the IoT networks should be verified using an effective trust management method to ensure secure and reliable routing. However, the nodes feature and task complexity perform managing trust a difficult process. The proposed trust-based proposed approach includes various dimensions of trust such as direct trust, behavioral, and recommendation in trusting with the gap filling purpose along with dishonest recommendation for neighbors and energy efficiency. This paper proposed a secured route selection approach for IoT environment by using very popular Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS). Moreover, Intuitionistic fuzzy is applied to manage not only numerical trust value but linguistic data also. The results of experiments specify that the proposed framework utilize the parameters under consideration. The current work in addition, compute the total trust by considering all three dimensions The trusted value of indirect nature is derived with the help of trust value indicated by the recommending nodes based on their trustworthiness with the evaluating, and the direct trust value is determined with the supporting of existing contacts between the evaluating and evaluated. The direct trust value is reliable and resistant to untruthful recommendations. The dishonest suggestions of the other nearby nodes, however, can make an indirect recommendation vulnerable. The use of intuitionistic fuzzy approach can solve the problem of dishonest advice. Finally trust values are used in data maintained as well moving toward trust value trust value for each neighbors node to opt for the secured path between two nodes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hossain MS, Muhammad G, Alamri A (2019) Smart healthcare monitoring: a voice pathology detection paradigm for smart cities. Multimedia Syst 25:565–575CrossRef Hossain MS, Muhammad G, Alamri A (2019) Smart healthcare monitoring: a voice pathology detection paradigm for smart cities. Multimedia Syst 25:565–575CrossRef
2.
Zurück zum Zitat Mollah MB, Islam KR, Islam SS (2012) Next generation of computing through cloud computing technology. In: 2012 25th IEEE Canadian conference on electrical computer engineering (CCECE), pp 1–6 Mollah MB, Islam KR, Islam SS (2012) Next generation of computing through cloud computing technology. In: 2012 25th IEEE Canadian conference on electrical computer engineering (CCECE), pp 1–6
3.
Zurück zum Zitat Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable and fine-grained data access control in cloud computing. In: IN-FOCOM, 2010 proceedings IEEE, pp 1–94 Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable and fine-grained data access control in cloud computing. In: IN-FOCOM, 2010 proceedings IEEE, pp 1–94
4.
Zurück zum Zitat Arun Kumar S, Dhanasekar S (2014) A literature survey on key aggregation system for secure sharing of cloud data. Int J Adv Res Electron Commun Eng 3(12) Arun Kumar S, Dhanasekar S (2014) A literature survey on key aggregation system for secure sharing of cloud data. Int J Adv Res Electron Commun Eng 3(12)
5.
Zurück zum Zitat Kim H, Lee H, Kim W, Kim Y A trust evaluation model for QoS guarantee in cloud systems. Dept. of Information and Communication Engineering, Dongguk University Seoul, 100–715, South Korea Kim H, Lee H, Kim W, Kim Y A trust evaluation model for QoS guarantee in cloud systems. Dept. of Information and Communication Engineering, Dongguk University Seoul, 100–715, South Korea
6.
Zurück zum Zitat Sreedevi G, Rajendra C (2012) ICCC: information correctness to the customers in cloud data storage Sreedevi G, Rajendra C (2012) ICCC: information correctness to the customers in cloud data storage
7.
Zurück zum Zitat Batra K, Sunitha C, Kumar S (2013) An effective data storage security scheme for cloud computing. Batra K, Sunitha C, Kumar S (2013) An effective data storage security scheme for cloud computing.
8.
Zurück zum Zitat Rajasekar K, Kamalanathan C (2012) Towards of secured cost-effective multi-cloud storage in cloud computing Rajasekar K, Kamalanathan C (2012) Towards of secured cost-effective multi-cloud storage in cloud computing
9.
Zurück zum Zitat Wang Q, Wang C, Ren K, Lou W, Li J Enabling public auditability and data dynamics for storage security in cloud computing Wang Q, Wang C, Ren K, Lou W, Li J Enabling public auditability and data dynamics for storage security in cloud computing
10.
Zurück zum Zitat Huang J, Nicol DM Trust mechanisms for cloud computing. In: Qu C, Buyya R (eds) A cloud trust evaluation system using hierarchical fuzzy inference system for service selection Huang J, Nicol DM Trust mechanisms for cloud computing. In: Qu C, Buyya R (eds) A cloud trust evaluation system using hierarchical fuzzy inference system for service selection
11.
Zurück zum Zitat Bohli J-M, Gruschka N, Jensen M, Lacono LL, Marnau N (2013) Security and privacy-enhancing multicloud architectures. In: IEEE transactions on dependable and secure computing, vol 10, no 4 Bohli J-M, Gruschka N, Jensen M, Lacono LL, Marnau N (2013) Security and privacy-enhancing multicloud architectures. In: IEEE transactions on dependable and secure computing, vol 10, no 4
12.
Zurück zum Zitat Chan H, Perrig A, Song D (2006) Secure hierarchical in-network aggregation in sensor networks. In: Proceedings of ACM conference on computer and communications security (CCS), pp 278–287 Chan H, Perrig A, Song D (2006) Secure hierarchical in-network aggregation in sensor networks. In: Proceedings of ACM conference on computer and communications security (CCS), pp 278–287
13.
Zurück zum Zitat Wagner D (2004) Resilient aggregation in sensor networks. In: Proceedings of ACM workshop security sensor ad hoc network (SASN), pp 68–79 Wagner D (2004) Resilient aggregation in sensor networks. In: Proceedings of ACM workshop security sensor ad hoc network (SASN), pp 68–79
14.
Zurück zum Zitat Chen B, Yu H (2011) Secure aggregation with malicious node revocation in sensor networks. In: Proceedings of 31st international conference on distributed computing systems workshops (ICDCS), pp 581–592 Chen B, Yu H (2011) Secure aggregation with malicious node revocation in sensor networks. In: Proceedings of 31st international conference on distributed computing systems workshops (ICDCS), pp 581–592
15.
Zurück zum Zitat Przydatek B, Song D, Perrig A (2003) SIA: secure information aggregation in sensor networks. In: Proceedings of 1st international conference on embedded networked sensor systems (SenSys), pp 255–265 Przydatek B, Song D, Perrig A (2003) SIA: secure information aggregation in sensor networks. In: Proceedings of 1st international conference on embedded networked sensor systems (SenSys), pp 255–265
16.
Zurück zum Zitat Sharma S, Mishra R, Kaur I (2010) New trust based security approach for ad-hoc networks in proceeding of 3rd International Conference on Computer Science and Information Technology, Chengdu, China, pp 428–431 Sharma S, Mishra R, Kaur I (2010) New trust based security approach for ad-hoc networks in proceeding of 3rd International Conference on Computer Science and Information Technology, Chengdu, China, pp 428–431
17.
Zurück zum Zitat Hu L, Evans D (2003) Secure aggregation for wireless networks. In: Proceedings on workshop security assurance ad hoc network, pp 384–391 Hu L, Evans D (2003) Secure aggregation for wireless networks. In: Proceedings on workshop security assurance ad hoc network, pp 384–391
18.
Zurück zum Zitat Mishra R, Kaur I, Saxena S, Mishra R, Shree T, Sachdeva M (2023) Trust-aware mitigation of various security threats for internet of things. In: Proceedings of ICISSI 2022 (1st ed.). CRC, pp 331–336 Mishra R, Kaur I, Saxena S, Mishra R, Shree T, Sachdeva M (2023) Trust-aware mitigation of various security threats for internet of things. In: Proceedings of ICISSI 2022 (1st ed.). CRC, pp 331–336
19.
Zurück zum Zitat Mishra R, Saxena S (2023) Blockchain technology based security for UAV IoT environment. In: Jain K, Mishra V, Pradhan B (eds) Proceedings of UASG 2021: Wings 4 sustainability. UASG 2021. Lecture notes in civil engineering, vol 304. Springer, Cham Mishra R, Saxena S (2023) Blockchain technology based security for UAV IoT environment. In: Jain K, Mishra V, Pradhan B (eds) Proceedings of UASG 2021: Wings 4 sustainability. UASG 2021. Lecture notes in civil engineering, vol 304. Springer, Cham
20.
Zurück zum Zitat Gurout T, Medjiah S, Costa GD, Monteil T (2014) Quality of service modeling for green scheduling in clouds. Sustain Comput Inf Syst 4(4):225–240 Gurout T, Medjiah S, Costa GD, Monteil T (2014) Quality of service modeling for green scheduling in clouds. Sustain Comput Inf Syst 4(4):225–240
21.
Zurück zum Zitat Frikken, Dougherty JA (2008) An efficient integrity-preserving scheme for hierarchical sensor aggregation. In Proceedings of 1st ACM conference on wireless network security (WiSec), pp 68–76 Frikken, Dougherty JA (2008) An efficient integrity-preserving scheme for hierarchical sensor aggregation. In Proceedings of 1st ACM conference on wireless network security (WiSec), pp 68–76
22.
Zurück zum Zitat Nath S, Yu H, Chan H (2009) Secure outsourced aggregation via one-way chains. In: Proceedings of 35th SIGMOD international conference on management data, pp 31–44 Nath S, Yu H, Chan H (2009) Secure outsourced aggregation via one-way chains. In: Proceedings of 35th SIGMOD international conference on management data, pp 31–44
23.
Zurück zum Zitat Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD (2001) SPINS: security protocols for sensor networks. In: Proceedings of the annual international conference on mobile computing and networking (MobiCOM), pp 189–199 Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD (2001) SPINS: security protocols for sensor networks. In: Proceedings of the annual international conference on mobile computing and networking (MobiCOM), pp 189–199
24.
Zurück zum Zitat He W, Liu X, Nguyen H, Nahrstedt K, Abdelzaher TF (2007) PDA: privacy-preserving data aggregation in wireless sensor networks. In: Proceedings of IEEE international conference on computer communications (INFOCOM), pp 2045–2053 He W, Liu X, Nguyen H, Nahrstedt K, Abdelzaher TF (2007) PDA: privacy-preserving data aggregation in wireless sensor networks. In: Proceedings of IEEE international conference on computer communications (INFOCOM), pp 2045–2053
25.
Zurück zum Zitat Roy S, Conti M, Setia S, Jajodia S (2013) Secure data aggregation in wireless sensor networks: filtering out the attacker’s impact Roy S, Conti M, Setia S, Jajodia S (2013) Secure data aggregation in wireless sensor networks: filtering out the attacker’s impact
26.
Zurück zum Zitat Hojabri M (2012) Ensuring data storage security in cloud computing with effect of Kerberos Hojabri M (2012) Ensuring data storage security in cloud computing with effect of Kerberos
27.
Zurück zum Zitat Vairagade RS, Vairagade NA (2012) Cloud computing data storage and security enhancement Vairagade RS, Vairagade NA (2012) Cloud computing data storage and security enhancement
28.
Zurück zum Zitat Flajolet P, Martin GN (1985) Probabilistic counting algorithms for data base applications. J Comput Syst Sci 31(2):182–209MathSciNetCrossRef Flajolet P, Martin GN (1985) Probabilistic counting algorithms for data base applications. J Comput Syst Sci 31(2):182–209MathSciNetCrossRef
Metadaten
Titel
Intuitionistic Fuzzy-Based Trust Computation for Secure Routing in IoT
verfasst von
Renu Mishra
Sandeep Saxena
Arun Kumar Singh
Varun Shukla
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_50

Neuer Inhalt