Knowledge Agora



Similar Articles

Title Towards secure IoT system from a smart city perspective: An optimized algorithm and implementation
ID_Doc 41707
Authors Sharma, V; Beniwal, R; Kumar, V
Title Towards secure IoT system from a smart city perspective: An optimized algorithm and implementation
Year 2024
Published Transactions On Emerging Telecommunications Technologies, 35, 4
Abstract Securing Internet of Things (IoT) systems is crucial for maintaining the resilience and trustworthiness of smart cities. In this context, the routing protocol's efficiency is pivotal for large-scale IoT applications. However, achieving dependable and energy-efficient routing in wireless sensor networks (WSNs) poses significant challenges due to limited and non-rechargeable node energy resources. Also, traditional approaches often fell short of ensuring robust security and efficient data transmission. Hence, the purpose of this research was to address these shortcomings by introducing the Blowfish Honey-Improved Spotted Hyena Optimization (BONY-ISHO) protocol aimed at bolstering the security and efficiency of clustering and data routing in WSNs. Firstly, it introduces blockchain technology to establish secure and authenticated clustering, ensuring that only legitimate cluster heads and member nodes can participate. This innovation significantly enhances network security. Secondly, our protocol incorporates a hybrid Blowfish-Honey cryptographic technique for data protection within the Area of Interest (AOI). This dual-layer security approach, comprising Blowfish encryption and Honey encryption for key management, guarantees robust privacy and security. Thirdly, we have optimized data routing through the Improved Spotted Hyena Optimization (ISHO) algorithm, extending the network's lifetime and conserving energy resources. Performance evaluations confirm the superiority of the BONY-ISHO protocol and existing solutions. It achieves a higher packet delivery ratio (99.8%), increased throughput (45 000 kbps), reduced energy consumption (1.68 joules), and minimized latency (0.068 sec) when compared to traditional methods. These performance enhancements make the BONY-ISHO protocol a compelling choice for securing and optimizing IoT-based WSNs. Our study concludes that the BONY-ISHO protocol is a highly effective solution for addressing security and efficiency challenges in IoT-based WSNs. By combining blockchain-based authentication, hybrid cryptography, and intelligent routing algorithms, we have achieved a comprehensive enhancement of network security and data transmission efficiency. The protocol's ability to thwart malicious nodes and optimize routing pathways ensures the integrity and reliability of IoT-based WSNs.
PDF

Similar Articles

ID Score Article
39764 Hundera, NW; Jin, CJ; Geressu, DM; Aftab, MU; Olanrewaju, OA; Xiong, H Proxy-based public-key cryptosystem for secure and efficient IoT-based cloud data sharing in the smart city(2022)Multimedia Tools And Applications, 81, 21
41223 Irshad, RR; Hussain, S; Hussain, I; Ahmad, I; Yousif, A; Alwayle, IM; Alattab, AA; Alalayah, KM; Breslin, JG; Badr, MM; Rodrigues, JJPC An Intelligent Buffalo-Based Secure Edge-Enabled Computing Platform for Heterogeneous IoT Network in Smart Cities(2023)
44136 Li, N; Liu, DX; Nepal, S Lightweight Mutual Authentication for IoT and Its Applications(2017)Ieee Transactions On Sustainable Computing, 2, 4
35845 Paul, R; Ghosh, N; Sau, S; Chakrabarti, A; Mohapatra, P Blockchain based secure smart city architecture using low resource IoTs(2021)
37922 Gupta, S; Alharbi, F; Alshahrani, R; Arya, PK; Vyas, S; Elkamchouchi, DH; Soufiene, B Secure and Lightweight Authentication Protocol for Privacy Preserving Communications in Smart City Applications(2023)Sustainability, 15, 6
38430 Alandjani, G Features and Potential Security Challenges for IoT Enabled Devices in Smart City Environment(2018)International Journal Of Advanced Computer Science And Applications, 9, 8
Scroll