Security in IoT Mesh Networks Based on Trust Similarity

Internet of Things (IoT) Mesh networks are becoming very popular to enable IoT devices to communicate without relying on dedicated PC services. The Internet of Things (IoT) implicitly uses mesh networks. IoT connectivity to cloud and edge computing is in vogue. A Wireless Mesh Network (WMN) is a mul...

Full description

Bibliographic Details
Main Authors: Athota Kavitha, Vijender Busi Reddy, Ninni Singh, Vinit Kumar Gunjan, Kuruva Lakshmanna, Arfat Ahmad Khan, Chitapong Wechtaisong
Format: Article
Language:English
Published: IEEE 2022-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9941141/
_version_ 1828127763964362752
author Athota Kavitha
Vijender Busi Reddy
Ninni Singh
Vinit Kumar Gunjan
Kuruva Lakshmanna
Arfat Ahmad Khan
Chitapong Wechtaisong
author_facet Athota Kavitha
Vijender Busi Reddy
Ninni Singh
Vinit Kumar Gunjan
Kuruva Lakshmanna
Arfat Ahmad Khan
Chitapong Wechtaisong
author_sort Athota Kavitha
collection DOAJ
description Internet of Things (IoT) Mesh networks are becoming very popular to enable IoT devices to communicate without relying on dedicated PC services. The Internet of Things (IoT) implicitly uses mesh networks. IoT connectivity to cloud and edge computing is in vogue. A Wireless Mesh Network (WMN) is a multi-hop and distributed wireless network with mesh routers and mesh clients. Data originating from mesh clients are forwarded to destinations through mesh routers. In IoT Mesh networks, mesh clients are IoT devices. The crucial security issue with these networks is the lack of a trusted third party for validation. However, trust between nodes is required for the proper functioning of the network. WMNs are particularly vulnerable as they rely upon cooperative forwarding. In this research work, a secure and sustainable novel trust mechanism framework is proposed. This framework identifies the malicious nodes in WMNs and improves the nodes’ cooperation. The proposed framework or model differentiates between legitimate and malicious nodes using direct trust and indirect trust. Direct trust is computed based on the packet-forwarding behavior of a node. Mesh routers have multi-radios, so the promiscuous mode may not work. A new two-hop mechanism is proposed to observe the neighbors’ packet forwarding behavior. Indirect trust is computed by aggregating the recommendations using the weighted D-S theory, where weight is computed using a novel similarity mechanism that correlates the recommendations received from different neighbors. Dynamic weight computation calculates the overall trust by using several interactions. We present the evaluations to show the effectiveness of the proposed approach in the presence of packet drop/modification attacks, bad-mouthing attacks, on- off attacks, and collusion attacks by using the ns-2 simulator.
first_indexed 2024-04-11T15:54:25Z
format Article
id doaj.art-38f60d005d724a878e24bdd2a36a9dd7
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-04-11T15:54:25Z
publishDate 2022-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-38f60d005d724a878e24bdd2a36a9dd72022-12-22T04:15:12ZengIEEEIEEE Access2169-35362022-01-011012171212172410.1109/ACCESS.2022.32206789941141Security in IoT Mesh Networks Based on Trust SimilarityAthota Kavitha0Vijender Busi Reddy1Ninni Singh2Vinit Kumar Gunjan3https://orcid.org/0000-0002-3222-4186Kuruva Lakshmanna4https://orcid.org/0000-0003-3480-4851Arfat Ahmad Khan5https://orcid.org/0000-0003-0918-8874Chitapong Wechtaisong6https://orcid.org/0000-0002-4143-2227JNTUH College of Engineering, JNTU University, Hyderabad, Telangana, IndiaAdvanced Data Processing Research Institute, Secunderabad, Telangana, IndiaCMR Institute of Technology, Hyderabad, Telangana, IndiaCMR Institute of Technology, Hyderabad, Telangana, IndiaSchool of Information Technology and Engineering, VIT, Vellore, IndiaDepartment of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, ThailandSchool of Telecommunication Engineering, Suranaree University of Technology, Nakhon Ratchasima, ThailandInternet of Things (IoT) Mesh networks are becoming very popular to enable IoT devices to communicate without relying on dedicated PC services. The Internet of Things (IoT) implicitly uses mesh networks. IoT connectivity to cloud and edge computing is in vogue. A Wireless Mesh Network (WMN) is a multi-hop and distributed wireless network with mesh routers and mesh clients. Data originating from mesh clients are forwarded to destinations through mesh routers. In IoT Mesh networks, mesh clients are IoT devices. The crucial security issue with these networks is the lack of a trusted third party for validation. However, trust between nodes is required for the proper functioning of the network. WMNs are particularly vulnerable as they rely upon cooperative forwarding. In this research work, a secure and sustainable novel trust mechanism framework is proposed. This framework identifies the malicious nodes in WMNs and improves the nodes’ cooperation. The proposed framework or model differentiates between legitimate and malicious nodes using direct trust and indirect trust. Direct trust is computed based on the packet-forwarding behavior of a node. Mesh routers have multi-radios, so the promiscuous mode may not work. A new two-hop mechanism is proposed to observe the neighbors’ packet forwarding behavior. Indirect trust is computed by aggregating the recommendations using the weighted D-S theory, where weight is computed using a novel similarity mechanism that correlates the recommendations received from different neighbors. Dynamic weight computation calculates the overall trust by using several interactions. We present the evaluations to show the effectiveness of the proposed approach in the presence of packet drop/modification attacks, bad-mouthing attacks, on- off attacks, and collusion attacks by using the ns-2 simulator.https://ieeexplore.ieee.org/document/9941141/Sustainable networkmesh networksIoTtrustsimilarityrecommendation based trust
spellingShingle Athota Kavitha
Vijender Busi Reddy
Ninni Singh
Vinit Kumar Gunjan
Kuruva Lakshmanna
Arfat Ahmad Khan
Chitapong Wechtaisong
Security in IoT Mesh Networks Based on Trust Similarity
IEEE Access
Sustainable network
mesh networks
IoT
trust
similarity
recommendation based trust
title Security in IoT Mesh Networks Based on Trust Similarity
title_full Security in IoT Mesh Networks Based on Trust Similarity
title_fullStr Security in IoT Mesh Networks Based on Trust Similarity
title_full_unstemmed Security in IoT Mesh Networks Based on Trust Similarity
title_short Security in IoT Mesh Networks Based on Trust Similarity
title_sort security in iot mesh networks based on trust similarity
topic Sustainable network
mesh networks
IoT
trust
similarity
recommendation based trust
url https://ieeexplore.ieee.org/document/9941141/
work_keys_str_mv AT athotakavitha securityiniotmeshnetworksbasedontrustsimilarity
AT vijenderbusireddy securityiniotmeshnetworksbasedontrustsimilarity
AT ninnisingh securityiniotmeshnetworksbasedontrustsimilarity
AT vinitkumargunjan securityiniotmeshnetworksbasedontrustsimilarity
AT kuruvalakshmanna securityiniotmeshnetworksbasedontrustsimilarity
AT arfatahmadkhan securityiniotmeshnetworksbasedontrustsimilarity
AT chitapongwechtaisong securityiniotmeshnetworksbasedontrustsimilarity