Author:
T. Arpitha,Chouhan Dharamendra,J. Shreyas
Abstract
AbstractThe Internet of Things (IoT) is now an essential component of our day-to-day lives. In any case, the association of various devices presents numerous security challenges in IoT. In some cases, ubiquitous data or traffic may be collected by certain smart devices which threatens the privacy of a source node location. To address this issue, a hybrid DL technique named Deep Q Learning Neural network (DQ-NN) is proposed for the Source Location Privacy (SLP) in IoT networks based on phantom routing. Here, an IoT network with multiple sources and destinations is considered first, and then the phantom node is chosen by analyzing neighbor list, energy, distance, and trust heterogeneity parameters. After that, multiple routes are created from the source node to the sink node via the phantom node. Finally, path selection is performed by the proposed DQ-NN. Moreover, DQ-NN is obtained by merging the Deep Q Learning Network (DQN) and Deep Neural Network (DNN). A simulation environment consisting of 150 nodes is created to study the effectiveness of performance and scalability. The proposed novel DQ-NN outperforms other existing algorithms, by recording a high network lifetime is 111.912, a safety period of 664970.7 m, an energy is 0.034 J, and a distance is 56.594 m.
Funder
Manipal Academy of Higher Education, Manipal
Publisher
Springer Science and Business Media LLC
Reference29 articles.
1. L. Almuqren, H. Alqahtani, S.S. Aljameel, A.S. Salama, I. Yaseen, A.A. Alneil, Hybrid metaheuristics with machine learning based botnet detection in cloud assisted internet of things environment. Int. J. Comput. Netw. Appl. (2023). https://doi.org/10.1109/ACCESS.2023.3322369
2. T. Arpitha, D. Chouhan, J. Shreyas, Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications. J. Eng. Appl. Sci. 71, 8 (2024). https://doi.org/10.1186/s44147-023-00342-1
3. C. Arunachalaperumal, E. Mary Anita et al., Improved reptile search algorithm with sequential assignment routing based false packet forwarding scheme for source location privacy protection on wireless sensor networks. J. Intell. Fuzzy Syst. (Preprint) 47, 1–12 (2024)
4. P.R. Bhaladhare, D.C. Jinwala, A clustering approach for the l-diversity model in privacy preserving data mining using fractional calculus-bacterial foraging optimization algorithm. Adv. Comput. Eng. 2014(1), 396529 (2014). https://doi.org/10.1155/2014/396529
5. M. Bradbury, A. Jhumka, in 2017 IEEE Trustcom/BigDataSE/ICESS, A near-optimal source location privacy scheme for wireless sensor networks (IEEE, Sydney, 2017), pp.409–416