Security in IoT Mesh Networks Based on Trust Similarity
Internet of Things (IoT) Mesh networks are becoming very popular to enable IoT devices to communicate without relying on dedicated PC services. The Internet of Things (IoT) implicitly uses mesh networks. IoT connectivity to cloud and edge computing is in vogue. A Wireless Mesh Network (WMN) is a mul...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2022-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9941141/ |
_version_ | 1828127763964362752 |
---|---|
author | Athota Kavitha Vijender Busi Reddy Ninni Singh Vinit Kumar Gunjan Kuruva Lakshmanna Arfat Ahmad Khan Chitapong Wechtaisong |
author_facet | Athota Kavitha Vijender Busi Reddy Ninni Singh Vinit Kumar Gunjan Kuruva Lakshmanna Arfat Ahmad Khan Chitapong Wechtaisong |
author_sort | Athota Kavitha |
collection | DOAJ |
description | Internet of Things (IoT) Mesh networks are becoming very popular to enable IoT devices to communicate without relying on dedicated PC services. The Internet of Things (IoT) implicitly uses mesh networks. IoT connectivity to cloud and edge computing is in vogue. A Wireless Mesh Network (WMN) is a multi-hop and distributed wireless network with mesh routers and mesh clients. Data originating from mesh clients are forwarded to destinations through mesh routers. In IoT Mesh networks, mesh clients are IoT devices. The crucial security issue with these networks is the lack of a trusted third party for validation. However, trust between nodes is required for the proper functioning of the network. WMNs are particularly vulnerable as they rely upon cooperative forwarding. In this research work, a secure and sustainable novel trust mechanism framework is proposed. This framework identifies the malicious nodes in WMNs and improves the nodes’ cooperation. The proposed framework or model differentiates between legitimate and malicious nodes using direct trust and indirect trust. Direct trust is computed based on the packet-forwarding behavior of a node. Mesh routers have multi-radios, so the promiscuous mode may not work. A new two-hop mechanism is proposed to observe the neighbors’ packet forwarding behavior. Indirect trust is computed by aggregating the recommendations using the weighted D-S theory, where weight is computed using a novel similarity mechanism that correlates the recommendations received from different neighbors. Dynamic weight computation calculates the overall trust by using several interactions. We present the evaluations to show the effectiveness of the proposed approach in the presence of packet drop/modification attacks, bad-mouthing attacks, on- off attacks, and collusion attacks by using the ns-2 simulator. |
first_indexed | 2024-04-11T15:54:25Z |
format | Article |
id | doaj.art-38f60d005d724a878e24bdd2a36a9dd7 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-04-11T15:54:25Z |
publishDate | 2022-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-38f60d005d724a878e24bdd2a36a9dd72022-12-22T04:15:12ZengIEEEIEEE Access2169-35362022-01-011012171212172410.1109/ACCESS.2022.32206789941141Security in IoT Mesh Networks Based on Trust SimilarityAthota Kavitha0Vijender Busi Reddy1Ninni Singh2Vinit Kumar Gunjan3https://orcid.org/0000-0002-3222-4186Kuruva Lakshmanna4https://orcid.org/0000-0003-3480-4851Arfat Ahmad Khan5https://orcid.org/0000-0003-0918-8874Chitapong Wechtaisong6https://orcid.org/0000-0002-4143-2227JNTUH College of Engineering, JNTU University, Hyderabad, Telangana, IndiaAdvanced Data Processing Research Institute, Secunderabad, Telangana, IndiaCMR Institute of Technology, Hyderabad, Telangana, IndiaCMR Institute of Technology, Hyderabad, Telangana, IndiaSchool of Information Technology and Engineering, VIT, Vellore, IndiaDepartment of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, ThailandSchool of Telecommunication Engineering, Suranaree University of Technology, Nakhon Ratchasima, ThailandInternet of Things (IoT) Mesh networks are becoming very popular to enable IoT devices to communicate without relying on dedicated PC services. The Internet of Things (IoT) implicitly uses mesh networks. IoT connectivity to cloud and edge computing is in vogue. A Wireless Mesh Network (WMN) is a multi-hop and distributed wireless network with mesh routers and mesh clients. Data originating from mesh clients are forwarded to destinations through mesh routers. In IoT Mesh networks, mesh clients are IoT devices. The crucial security issue with these networks is the lack of a trusted third party for validation. However, trust between nodes is required for the proper functioning of the network. WMNs are particularly vulnerable as they rely upon cooperative forwarding. In this research work, a secure and sustainable novel trust mechanism framework is proposed. This framework identifies the malicious nodes in WMNs and improves the nodes’ cooperation. The proposed framework or model differentiates between legitimate and malicious nodes using direct trust and indirect trust. Direct trust is computed based on the packet-forwarding behavior of a node. Mesh routers have multi-radios, so the promiscuous mode may not work. A new two-hop mechanism is proposed to observe the neighbors’ packet forwarding behavior. Indirect trust is computed by aggregating the recommendations using the weighted D-S theory, where weight is computed using a novel similarity mechanism that correlates the recommendations received from different neighbors. Dynamic weight computation calculates the overall trust by using several interactions. We present the evaluations to show the effectiveness of the proposed approach in the presence of packet drop/modification attacks, bad-mouthing attacks, on- off attacks, and collusion attacks by using the ns-2 simulator.https://ieeexplore.ieee.org/document/9941141/Sustainable networkmesh networksIoTtrustsimilarityrecommendation based trust |
spellingShingle | Athota Kavitha Vijender Busi Reddy Ninni Singh Vinit Kumar Gunjan Kuruva Lakshmanna Arfat Ahmad Khan Chitapong Wechtaisong Security in IoT Mesh Networks Based on Trust Similarity IEEE Access Sustainable network mesh networks IoT trust similarity recommendation based trust |
title | Security in IoT Mesh Networks Based on Trust Similarity |
title_full | Security in IoT Mesh Networks Based on Trust Similarity |
title_fullStr | Security in IoT Mesh Networks Based on Trust Similarity |
title_full_unstemmed | Security in IoT Mesh Networks Based on Trust Similarity |
title_short | Security in IoT Mesh Networks Based on Trust Similarity |
title_sort | security in iot mesh networks based on trust similarity |
topic | Sustainable network mesh networks IoT trust similarity recommendation based trust |
url | https://ieeexplore.ieee.org/document/9941141/ |
work_keys_str_mv | AT athotakavitha securityiniotmeshnetworksbasedontrustsimilarity AT vijenderbusireddy securityiniotmeshnetworksbasedontrustsimilarity AT ninnisingh securityiniotmeshnetworksbasedontrustsimilarity AT vinitkumargunjan securityiniotmeshnetworksbasedontrustsimilarity AT kuruvalakshmanna securityiniotmeshnetworksbasedontrustsimilarity AT arfatahmadkhan securityiniotmeshnetworksbasedontrustsimilarity AT chitapongwechtaisong securityiniotmeshnetworksbasedontrustsimilarity |