Towards secure IoT system from a smart city perspective: An optimized algorithm and implementation

Author:

Sharma Vishal1,Beniwal Rohit1ORCID,Kumar Vinod1

Affiliation:

1. Department of Computer Science & Engineering Delhi Technological University Delhi India

Abstract

AbstractSecuring Internet of Things (IoT) systems is crucial for maintaining the resilience and trustworthiness of smart cities. In this context, the routing protocol's efficiency is pivotal for large‐scale IoT applications. However, achieving dependable and energy‐efficient routing in wireless sensor networks (WSNs) poses significant challenges due to limited and non‐rechargeable node energy resources. Also, traditional approaches often fell short of ensuring robust security and efficient data transmission. Hence, the purpose of this research was to address these shortcomings by introducing the Blowfish Honey‐Improved Spotted Hyena Optimization (BONY‐ISHO) protocol aimed at bolstering the security and efficiency of clustering and data routing in WSNs. Firstly, it introduces blockchain technology to establish secure and authenticated clustering, ensuring that only legitimate cluster heads and member nodes can participate. This innovation significantly enhances network security. Secondly, our protocol incorporates a hybrid Blowfish‐Honey cryptographic technique for data protection within the Area of Interest (AOI). This dual‐layer security approach, comprising Blowfish encryption and Honey encryption for key management, guarantees robust privacy and security. Thirdly, we have optimized data routing through the Improved Spotted Hyena Optimization (ISHO) algorithm, extending the network's lifetime and conserving energy resources. Performance evaluations confirm the superiority of the BONY‐ISHO protocol and existing solutions. It achieves a higher packet delivery ratio (99.8%), increased throughput (45 000 kbps), reduced energy consumption (1.68 joules), and minimized latency (0.068 sec) when compared to traditional methods. These performance enhancements make the BONY‐ISHO protocol a compelling choice for securing and optimizing IoT‐based WSNs. Our study concludes that the BONY‐ISHO protocol is a highly effective solution for addressing security and efficiency challenges in IoT‐based WSNs. By combining blockchain‐based authentication, hybrid cryptography, and intelligent routing algorithms, we have achieved a comprehensive enhancement of network security and data transmission efficiency. The protocol's ability to thwart malicious nodes and optimize routing pathways ensures the integrity and reliability of IoT‐based WSNs.

Publisher

Wiley

Subject

Electrical and Electronic Engineering

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3