A SECURE AND ENERGY-EFFICIENT DATA TRANSMISSION FRAMEWORK FOR THE INTERNET OF THINGS

Main Article Content

K. PRADEEPA
Dr.M.Parveen

Abstract

The idea of the Internet of Things (IoT) has recently received a lot of attention from both businesses and academics. In the IoT, a base station receives data from millions of sensor devices and processes it before using it to build various smart systems, such as the smart grid, smart city, and smart healthcare. To ensure the accuracy of the data gathered, a secure link must be established between base station and sensor devices. The findings of the data analysis will be erroneous and cause much more severe harm if the data that was collected is corrupt. Additionally, due to their extremely low-power computational processors, these IoT devices have a very low level of interactivity. These devices perceive their surroundings, produce data, and transmit the data to the base station through intermediary devices. Using some routing algorithms with the aim of low power consumption, the data is delivered to the base station. Energy efficiency should be taken into account as a crucial performance metric when utilizing low-power IoT devices to create a routing algorithm. Therefore, this paper proposed a secure and energy-efficient data transmission framework (SE-DTF) for IoT. This framework consists of three phases. The first phase is a public and secret key with a token sharing (IoT-PSKTS) algorithm which is used to prevent key leakages in the IoT. The second phase focuses on low power consumption using the Hierarchical Fuzzy Logic Clustering (HFLC) algorithm and Minimum Power Consumption Routing (MPCR) algorithm. The third phase focuses on safe data transfer employing two-tier cryptography with ciphertext shifting and token-based access control, together with HMAC-SHA1 signature. The experimental findings demonstrate how securely the IoT-PSKTS algorithm can share both a public and a secret key with a token. It also demonstrates that the MPCR with the HFLC algorithm outperforms other existing algorithms in terms of throughput, packet delivery ratio, and power utilization. Additionally, it demonstrates that the two-tier cryptography technique uses less energy and requires less computation time for encryption and decryption than other cryptography techniques now in use.

Article Details

How to Cite
PRADEEPA, K. ., & Dr.M.Parveen. (2023). A SECURE AND ENERGY-EFFICIENT DATA TRANSMISSION FRAMEWORK FOR THE INTERNET OF THINGS. INFOCOMP Journal of Computer Science, 22(1). Retrieved from https://infocomp.dcc.ufla.br/index.php/infocomp/article/view/2447
Section
Network, Communication, Operating Systems, Parallel and Distributed Computing

References

Sankar, S., & Srinivasan, P. (2018). Multi-layer cluster-based energy-aware routing protocol for the IoT. Cybern. Inf. Technol, 18(3), 75-92.

Sujanthi, S., & Kalyani, S. N. (2020). SecDL: QoS-aware secure deep learning approach for dynamic cluster-based routing in WSN-assisted IoT. Wireless Personal Communications, 114(3), 2135-2169.

Aranzazu-Suescun, C., & Cardei, M. (2019). Anchor-based routing protocol with dynamic clustering for IoT WSNs. EURASIP Journal on Wireless Communications and Networking, 2019(1), 1-12.

Maheswar, R., Jayarajan, P., Sampathkumar, A., Kanagachidambaresan, G. R., Hindia, M. N., Tilwari, V., ... & Amiri, I. S. (2021). CBPR: A cluster-based backpressure routing for the IoT. Wireless Personal Communications, 1-19.

Li, J., Silva, B. N., Diyan, M., Cao, Z., & Han, K. (2018). A clustering-based routing algorithm in IoT-aware Wireless Mesh Networks. Sustainable cities and society, 40, 657-666.

J. Tang, H. Song, A. Xu, Y. Jiang, H. Wen, Y. Zhang, K. Qin, “Secret Sharing Simultaneously on the Internet of Thing”, 2020 IEEE International Conference on Power, Intelligent Computing and Systems, ISBN: 978-1-7281-9874-3, Jul 2020.

M. Farhadi, H. Bypour, R. Mortazavi, “An efficient secret sharing-based storage system for cloud-based IoT”, 2019 IEEE 16th International ISC Conference on Information Security and Cryptology, ISBN: 978-1-7281-4374-3, Aug 2019.

Maheswar, R., Jayarajan, P., Sampathkumar, A., Kanagachidambaresan, G. R., Hindia, M. N., Tilwari, V., ... & Amiri, I. S. (2021). CBPR: A cluster-based backpressure routing for the IoT. Wireless Personal Communications, 1-19.

Kumar, N. P. R., & Gnanadhas, J. B. (2020). Cluster Centroid-Based Energy Efficient Routing Protocol for WSN-Assisted IoT. Advances in Science, Technology and Engineering Systems Journal, 5(4), 296-313.

Sankar, S., & Srinivasan, P. (2018). Multi-layer cluster-based energy-aware routing protocol for the IoT. Cybern. Inf. Technol, 18(3), 75-92.

Zhang, K., Long, J., Wang, X., Dai, H. N., Liang, K., & Imran, M. (2020). Lightweight searchable encryption protocol for the industrial IoT. IEEE Transactions on Industrial Informatics, 17(6), 4248-4259.

A. Yousefi, S. M. Jameii, “Improving the security of IoT using encryption algorithm”, 2017 IEEE International Conference on IoT and Application, ISBN: 978-1-5386-1698-7, May 2017.

Choudhary, K., Gaba, G. S., Butun, I., & Kumar, P. (2020). Make-it—a lightweight mutual authentication and key exchange protocol for the industrial IoT. Sensors, 20(18), 5166.

Schuster, R., Shmatikov, V., & Tromer, E. (2018, October). Situational access control in the IoT. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 1056-1073).

A. Terkawi, N. Innab, S. A. Amri, A. A. Amri, “IoT Increasing the Necessity to Adopt Specific Type of Access Control Technique”, 2018 IEEE 21st Saudi Computer Society National Computer Conference, ISBN: 978-1-5386-4110-1, Apr 2018.

W. J. Buchanan, D. Lanc, E. Ukwandu, L. Fan, G. Russell and O. Lo, “The Future Internet: A World of Secret Share”, Future Internet 2015, 7, 445-464, DOI:10.3390/fi7040445.

Maheswar, R., Jayarajan, P., Sampathkumar, A., Kanagachidambaresan, G. R., Hindia, M. N., Tilwari, V., ... & Amiri, I. S. (2021). CBPR: A cluster-based backpressure routing for the IoT. Wireless Personal Communications, 1-19.

Preethi, R., & Sughasiny, M. (2018, December). AKCSS: An Asymmetric Key Cryptography Based on Secret Sharing in Mobile Ad Hoc Network. In International Conference on Intelligent Systems Design and Applications (pp. 73-86). Springer, Cham.