Skip to main content
Log in

An improved trust-based security framework for internet of things

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

The Internet plays a vital role in the massive growth of the emerging Internet of Things (IoT). IoT helps all electronic devices to communicate with other devices and with the human with the help of the Internet. IoT enables the devices to sense environmental changes or mission-critical data. These critical data that are sensed by the IoT devices are forwarded to the public cloud storage with the help of Gateway nodes. Later these sensed data are utilized for decision making. However, high-risk insecurity is a major concern in IoT sensed data. In this paper, a trust-based security method with Direct and Indirect trust evaluation technique has been implemented to provide highly secure data transmission in the network. The simulation result has proven that trust-based security can improve data confidentiality when compared with available protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4.
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Amin R, Kumar N, Biswas GP, Iqbal R, Chang V (2018) A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment. Fut Gener Comput Syst 78:1005–1019

    Article  Google Scholar 

  2. Barnes C, Verdier F, Pegatoquet A, Gaffe D, Cottin J (2016) Wireless sensor network protocol property validation through the system's simulation in a dedicated framework. In: 10th International Conference On Signal Processing and Communication Systems (ICSPCS), 2016.

  3. Chiang M, Zhang T (2016) Fog and IoT: an overview of research opportunities. IEEE Internet Things J 3(6):854–864. https://doi.org/10.1109/JIOT.2016.2584538

    Article  Google Scholar 

  4. Choi S, Yang C, Kwak J (2018) System hardening and security monitoring for IoT devices to mitigate IoT security vulnerabili ties and threats. 12(2): 906–918

  5. Comput JPD, Tao M, Ota K, Dong M, Qian Z (2018) AccessAuth: capacity-aware security access authentication in federated-IoT-enabled V2G networks. J Parallel Distrib Comput 118:107–117

    Article  Google Scholar 

  6. Davide M, Celesti A, Maria F, Villari M (2015) Human-computer interface based on IoT embedded systems for users with disabilities, internet of things. User-centric IoT. Springerlinks

  7. Elhoseny M, Ramírez-González G, Abu-Elnasr OM, Shawkat SA, Arunkumar N, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2817615

    Article  Google Scholar 

  8. Feng W, Qin Y, Zhao S, Feng D (2018) AAoT: lightweight attestation and authentication of low-resource things in IoT and CPS. Comput Netw 134:167–182

    Article  Google Scholar 

  9. Gedawy H, Sannan T, Abderrahmen M, Khaled H (2016) Cumulus: a distributed and flexible computing testbed for edge cloud computational offloading. In: Cloudification of the internet of things (CIoT), IEEE, pp 1–6.

  10. Girao J, Westhoff D, Mykletun E, Araki T (2007) TinyPEDS tiny persistent encrypted data storage in asynchronous wireless sensor networks. Ad Hoc Netw 5(7):1073–1089

    Article  Google Scholar 

  11. Gupta AK, Johari R (2019) IOT based electrical device surveillance and control system. In: 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India, pp. 1–5, https://doi.org/10.1109/IoT-SIU.2019.8777342

  12. Jian S, Anxi W, et al. (2017) An efficient centroid-based routing protocol for energy management in WSN-Assisted IoT. IEEE Access 5

  13. Lalitha T, Umarani R (2012) Energy efficient cluster based key management technique for wireless sensor network. Int J Adv Eng Technol 3(2):186–190

    Google Scholar 

  14. Li T, Chen W, Tang Y, Yan H (2018) A homomorphic network coding signature scheme for multiple sources and its application in IoTs.

  15. Mangia M, Pareschi F, Rovatti R, Setti G (2018) Low-cost security of IoT sensor nodes with rakeness-based compressed sensing: statistical and known-plaintext attacks. IEEE Trans Inf Foren Secur 13(2):327–340. https://doi.org/10.1109/TIFS.2017.2749982

    Article  Google Scholar 

  16. Anne HN Mario G, et al. (2017) IoT middleware: a survey on issues and enabling technologies. IEEE Internet Things J 4(1)

  17. Nikravan M, Movaghar A, Hosseinzadeh M (2018) A lightweight defense approach to mitigate version number and rank attacks in low-power and lossy networks. Wirel Pers Commun 99(2):1035–1059

    Article  Google Scholar 

  18. Patterson RE (2017) Intuitive cognition and models of human–automation interaction, human factors: the journal of the human factors and ergonomics society. Sage J 59(1)

  19. Puthal et al. (2015) A dynamic key length based approach for realtime security verification of big sensing data stream. In: Proc. web information systems engineering (Wise), pp. 93–108

  20. Rahmani Hosseinabadi AA, Vahidi J, Saemi B et al (2019) Extended genetic algorithm for solving open-shop scheduling problem. Soft Comput 23:5099–5116. https://doi.org/10.1007/s00500-018-3177-y

    Article  Google Scholar 

  21. Renjith PN (2020) Towards secure data forwarding with anfis and trust evaluation in wireless sensor networks. Wirel Person Commun. https://doi.org/10.1007/s11277-020-07392-1

    Article  Google Scholar 

  22. Roy SS, Puthal D, Sharma S, Mohanty SP, Zomaya AY (2018) Building a sustainable internet of things: energy-efficient routing using low-power sensors will meet the need. IEEE Consu Electron Mag 7(2):42–49

    Article  Google Scholar 

  23. Ruan O, Zhang Y, Zhang M, Zhou J, Harn L (2018) After-the-fact leakage-resilient identity-based. 12(2): 2017–2026

  24. Samaila MG, Sequeiros JBF, Simões T, Freire MM, Inácio PRM (2020) IoT-HarPSecA: A framework and roadmap for secure design and development of devices and applications in the IoT space. IEEE Access 8:16462–16494. https://doi.org/10.1109/ACCESS.2020.2965925

    Article  Google Scholar 

  25. Sha K, Wei W, Andrew Yang T, Wang Z, Shi W (2018) On security challenges and open issues in internet of things. Fut Gener Comput Syst 83:326–337

    Article  Google Scholar 

  26. Shin S, Kwon T (2018) Two-factor authenticated key agreement supporting unlinkability in 5G-integrated wireless sensor networks. IEEE Access 6:11229–11241

    Article  Google Scholar 

  27. Tewari A, Gupta BB (2018) Security, privacy and trust of different layers in internet-of-things (IoTs) framework. Fut Gener Comput Syst

  28. Xiao W, Li Y, Ke C (2005) SLEACH secure low energy adaptive clustering hierarchy protocol for wireless sensor networks. Wuhan Univ J Natl Sci 10(1): 127–131

  29. Zhou Q, Yang G, He L (2014) A secure enhanced data aggregation based on ECC in wireless sensor network. Sens J 14(4):6701–6721

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. N. Renjith.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Renjith, P.N., Ramesh, K. & Sasikumar, S. An improved trust-based security framework for internet of things. Int. j. inf. tecnol. 13, 677–685 (2021). https://doi.org/10.1007/s41870-020-00574-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-020-00574-x

Keywords

Navigation