Knowledge Agora



Scientific Article details

Title Towards secure IoT system from a smart city perspective: An optimized algorithm and implementation
ID_Doc 41707
Authors Sharma, V; Beniwal, R; Kumar, V
Title Towards secure IoT system from a smart city perspective: An optimized algorithm and implementation
Year 2024
Published Transactions On Emerging Telecommunications Technologies, 35, 4
DOI 10.1002/ett.4883
Abstract Securing Internet of Things (IoT) systems is crucial for maintaining the resilience and trustworthiness of smart cities. In this context, the routing protocol's efficiency is pivotal for large-scale IoT applications. However, achieving dependable and energy-efficient routing in wireless sensor networks (WSNs) poses significant challenges due to limited and non-rechargeable node energy resources. Also, traditional approaches often fell short of ensuring robust security and efficient data transmission. Hence, the purpose of this research was to address these shortcomings by introducing the Blowfish Honey-Improved Spotted Hyena Optimization (BONY-ISHO) protocol aimed at bolstering the security and efficiency of clustering and data routing in WSNs. Firstly, it introduces blockchain technology to establish secure and authenticated clustering, ensuring that only legitimate cluster heads and member nodes can participate. This innovation significantly enhances network security. Secondly, our protocol incorporates a hybrid Blowfish-Honey cryptographic technique for data protection within the Area of Interest (AOI). This dual-layer security approach, comprising Blowfish encryption and Honey encryption for key management, guarantees robust privacy and security. Thirdly, we have optimized data routing through the Improved Spotted Hyena Optimization (ISHO) algorithm, extending the network's lifetime and conserving energy resources. Performance evaluations confirm the superiority of the BONY-ISHO protocol and existing solutions. It achieves a higher packet delivery ratio (99.8%), increased throughput (45 000 kbps), reduced energy consumption (1.68 joules), and minimized latency (0.068 sec) when compared to traditional methods. These performance enhancements make the BONY-ISHO protocol a compelling choice for securing and optimizing IoT-based WSNs. Our study concludes that the BONY-ISHO protocol is a highly effective solution for addressing security and efficiency challenges in IoT-based WSNs. By combining blockchain-based authentication, hybrid cryptography, and intelligent routing algorithms, we have achieved a comprehensive enhancement of network security and data transmission efficiency. The protocol's ability to thwart malicious nodes and optimize routing pathways ensures the integrity and reliability of IoT-based WSNs.
Author Keywords
Index Keywords Index Keywords
Document Type Other
Open Access Open Access
Source Science Citation Index Expanded (SCI-EXPANDED)
EID WOS:001089611000001
WoS Category Telecommunications
Research Area Telecommunications
PDF
Similar atricles
Scroll