Skip to main content
Log in

Secure trust aware multi-objective routing protocol based on battle competitive swarm optimization in IoT

  • Published:
Artificial Intelligence Review Aims and scope Submit manuscript

Abstract

A true routing system for the Internet of Things (IoT), Routing Protocol for Low Power and Lossy Networks (RPL) offers protection against many types of routing threats. The attacker can exploit the routing structure of RPL for launching devastating and destructive attacks counter to an IoT network. Moreover, Sybil and Rank attacks are most familiar among IoT attacks. Additionally, the resource-constrained design of IoT devices results in a routing protocol for RPL that is susceptible to a number of assaults. Even though the RPL condition offers encryption protection for controlling messages, RPL is susceptible to selfish behaviors and also internal attackers. In this research, the Battle Competitive Swarm Optimisation (BCSO) algorithm is developed to address the absence of reliable security measures in RPL. This approach principally encompasses two segments, namely IoT simulation and RPL routing, whereas Destination Oriented Directed Acyclic Graph is also applied in RPL. In this approach, different fitness functions, such as node energy, delay, trust, and distance are considered. The devised BCSO_RPL achieved better performance than other conventional techniques with energy consumption, throughput, delay, link quality, and packet loss of 0.7038 J, 0.2964Gbps, 0.6950 s, 2.178, and 0.0950, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Airehrour D, Gutierrez J, Ray SK (2016) Secure routing for Internet of things: a survey. J Netw Comput Appl 66:198–213

    Article  Google Scholar 

  • Airehrour D, Gutierrez JA, Ray SK (2019) SecTrust-RPL: a secure trust-aware rpl routing protocol for internet of things. Futur Gener Comput Syst 93:860–876

    Article  Google Scholar 

  • Arena A, Perazzo P, Vallati C, Dini G, Anastasi G (2020) Evaluating and improving the scalability of RPL security in the Internet of things. Comput Commun 151:119–132

    Article  Google Scholar 

  • Bouaziz M, Rachedi A, Belghith A (2019) EKF-MRPL: advanced mobility support routing protocol for internet of mobile things: movement prediction approach. Futur Gener Comput Syst 93:822–832

    Article  Google Scholar 

  • Cheng R, Jin Y (2014) A competitive swarm optimizer for large scale optimization. IEEE Trans Cybern 45(2):191–204

    Article  Google Scholar 

  • Din IU, Awan KA, Almogren A, Rodrigues JJPC (2023) Swarmtrust: a swarm optimization-based approach to enhance trustworthiness in smart homes. Phys Commun 58:102064

    Article  Google Scholar 

  • Djedjig N, Tandjaoui D, Medjek F, Romdhani I (2020) Trust-aware and cooperative routing protocol for IoT security. J Information Secur Appl 52:102467

    Article  Google Scholar 

  • Fotouhi H, Moreira D, Alves M (2015) mRPL: boosting mobility in the Internet of things. Ad Hoc Netw 26:17–35

    Article  Google Scholar 

  • George A, Ravindran A, Mendieta M (2021) Tabkhi H (2021) Mez: an adaptive messaging system for latency-sensitive multi-camera machine vision at the IoT edge. IEEE Access 9:21457–21473

    Article  Google Scholar 

  • Hoghooghi S, Javidan R (2020) Proposing a new method for improving RPL to support mobility in the Internet of things. IET Networks 9(2):48–55

    Article  Google Scholar 

  • Homaei MH, Salwana E, Shamshirband S (2019) An enhanced distributed data aggregation method in the internet of things. Sensors 19(14):3173

    Article  Google Scholar 

  • Hui TK, Sherratt RS, Sánchez DD (2017) Major requirements for building smart homes in smart cities based on internet of things technologies. Futur Gener Comput Syst 76:358–369

    Article  Google Scholar 

  • Khalid NA, Bai Q, Al-Anbuky A (2019) Adaptive trust-based routing protocol for large scale WSNs: IEEE. Access 7:143539–143549

    Article  Google Scholar 

  • Khalid NA (2019) Distributed trust-based routing decision making for WSN. Doctoral Dissertation, Auckland University of Technology

  • Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516

    Article  Google Scholar 

  • Nguyen TD, Khan JY, Ngo DT (2017) An effective energy-harvesting-aware routing algorithm for WSN-based IoT applications. In Proceedings of 2017 IEEE International Conference on Communications (ICC), pp. 1–6.

  • Palaniappan S, Chellan K (2015) Energy-efficient stable routing using QoS monitoring agents in MANET. EURASIP J Wirel Commun Netw 1:1–11

    Google Scholar 

  • Pingale RP, Shinde SN (2021) Multi-objective sunflower based grey wolf optimization algorithm for multipath routing in IoT network. Wireless Pers Commun 117(3):1909–1930

    Article  Google Scholar 

  • Pister K, Dejean N, Barthel D (2012) Routing metrics used for path calculation in low-power and lossy networks. RFC, p. 6551.

  • RahkarFarshi T (2021) Battle royale optimization algorithm”. Neural Comput Appl 33(4):1139–1157

    Article  Google Scholar 

  • Rakesh B (2021) Novel authentication and secure trust based rpl routing in mobile sink supported internet of things. Cyber-Phys Syst. https://doi.org/10.1080/23335777.2021.1933194

    Article  Google Scholar 

  • Rehman A, Awan KA, Din IU, Almogren AS (2023) FogTrust: fog-integrated multi-leveled trust management mechanism for internet of things. Technologies. https://doi.org/10.3390/technologies11010027

    Article  Google Scholar 

  • Sahraoui S, Henni N (2021) SAMP-RPL: secure and adaptive multipath RPL for enhanced security and reliability in heterogeneous IoT-connected low power and lossy networks. J Ambient Intell Hum Comput. https://doi.org/10.1007/s12652-021-03303-9

    Article  Google Scholar 

  • Salehi M, Boukerche A, Darehshoorzadeh A, Mammeri A (2016) Towards a novel trust-based opportunistic routing protocol for wireless networks. Wireless Netw 22(3):927–943

    Article  Google Scholar 

  • Sankar S, Ramasubbareddy S, Luhach AK, Nayyar A, Qureshi B (2020) CT-RPL: Cluster tree-based routing protocol to maximize the lifetime of Internet of things. Sensors 20(20):5858

    Article  Google Scholar 

  • Sennan S, Somula R, Luhach AK, Deverajan GG, Alnumay W, Jhanjhi NZ, Ghosh U, Sharma P (2021) Energy efficient optimal parent selection based routing protocol for internet of things using firefly optimization algorithm. Trans Emerging Telecommun Technol 32(8):e4171

    Article  Google Scholar 

  • Sousa N, Sobral JV, Rodrigues JJ, Rabêlo RA, Solic P (2017) ERAOF: A new RPL protocol objective function for Internet of Things applications. In Proceedings of 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech) 1–5.

  • Tao H, Zhou J, Masdari M, Marhoon HA (2022) A hybrid marine predator algorithm for thermal-aware routing scheme in wireless body area networks. J Bionic Eng. https://doi.org/10.1007/s42235-022-00263-4

    Article  Google Scholar 

  • Verma A, Ranga V (2020) Security of RPL based 6LoWPAN networks in the internet of things: a review. IEEE Sens J 20(11):5666–5690

    Article  Google Scholar 

  • Wang B, Chen X, Chang W (2014) A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive Mob Comput 13:164–180

    Article  Google Scholar 

  • Xia H, Jia Z, Li X, Ju L, Sha EHM (2013) Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw 11(7):2096–2114

    Article  Google Scholar 

  • Yadav AK, Tripathi S (2017) QMRPRNS: design of QoS multicast routing protocol using reliable node selection scheme for MANETs. Peer-to-Peer Netw Appl 10(4):897–909

    Article  Google Scholar 

  • Zhu J (2018a) Wireless sensor network technology based on security trust evaluation model. Intern J Online Eng 14(4):211

    Article  Google Scholar 

  • Zhu J (2018b) Wireless sensor network technology based on security trust evaluation model. Int J Online Eng. https://doi.org/10.3991/ijoe.v14i04.8590

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

All authors have made substantial contributions to conception and design, revising the manuscript, and the final approval of the version to be published. Also, all authors agreed to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved.

Corresponding author

Correspondence to N. V. Rajeesh Kumar.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajeesh Kumar, N.V., Jaya Lakshmi, N., Mallala, B. et al. Secure trust aware multi-objective routing protocol based on battle competitive swarm optimization in IoT. Artif Intell Rev 56 (Suppl 2), 1685–1709 (2023). https://doi.org/10.1007/s10462-023-10560-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10462-023-10560-x

Keywords

Navigation