Abstract
A true routing system for the Internet of Things (IoT), Routing Protocol for Low Power and Lossy Networks (RPL) offers protection against many types of routing threats. The attacker can exploit the routing structure of RPL for launching devastating and destructive attacks counter to an IoT network. Moreover, Sybil and Rank attacks are most familiar among IoT attacks. Additionally, the resource-constrained design of IoT devices results in a routing protocol for RPL that is susceptible to a number of assaults. Even though the RPL condition offers encryption protection for controlling messages, RPL is susceptible to selfish behaviors and also internal attackers. In this research, the Battle Competitive Swarm Optimisation (BCSO) algorithm is developed to address the absence of reliable security measures in RPL. This approach principally encompasses two segments, namely IoT simulation and RPL routing, whereas Destination Oriented Directed Acyclic Graph is also applied in RPL. In this approach, different fitness functions, such as node energy, delay, trust, and distance are considered. The devised BCSO_RPL achieved better performance than other conventional techniques with energy consumption, throughput, delay, link quality, and packet loss of 0.7038 J, 0.2964Gbps, 0.6950 s, 2.178, and 0.0950, respectively.
Similar content being viewed by others
References
Airehrour D, Gutierrez J, Ray SK (2016) Secure routing for Internet of things: a survey. J Netw Comput Appl 66:198–213
Airehrour D, Gutierrez JA, Ray SK (2019) SecTrust-RPL: a secure trust-aware rpl routing protocol for internet of things. Futur Gener Comput Syst 93:860–876
Arena A, Perazzo P, Vallati C, Dini G, Anastasi G (2020) Evaluating and improving the scalability of RPL security in the Internet of things. Comput Commun 151:119–132
Bouaziz M, Rachedi A, Belghith A (2019) EKF-MRPL: advanced mobility support routing protocol for internet of mobile things: movement prediction approach. Futur Gener Comput Syst 93:822–832
Cheng R, Jin Y (2014) A competitive swarm optimizer for large scale optimization. IEEE Trans Cybern 45(2):191–204
Din IU, Awan KA, Almogren A, Rodrigues JJPC (2023) Swarmtrust: a swarm optimization-based approach to enhance trustworthiness in smart homes. Phys Commun 58:102064
Djedjig N, Tandjaoui D, Medjek F, Romdhani I (2020) Trust-aware and cooperative routing protocol for IoT security. J Information Secur Appl 52:102467
Fotouhi H, Moreira D, Alves M (2015) mRPL: boosting mobility in the Internet of things. Ad Hoc Netw 26:17–35
George A, Ravindran A, Mendieta M (2021) Tabkhi H (2021) Mez: an adaptive messaging system for latency-sensitive multi-camera machine vision at the IoT edge. IEEE Access 9:21457–21473
Hoghooghi S, Javidan R (2020) Proposing a new method for improving RPL to support mobility in the Internet of things. IET Networks 9(2):48–55
Homaei MH, Salwana E, Shamshirband S (2019) An enhanced distributed data aggregation method in the internet of things. Sensors 19(14):3173
Hui TK, Sherratt RS, Sánchez DD (2017) Major requirements for building smart homes in smart cities based on internet of things technologies. Futur Gener Comput Syst 76:358–369
Khalid NA, Bai Q, Al-Anbuky A (2019) Adaptive trust-based routing protocol for large scale WSNs: IEEE. Access 7:143539–143549
Khalid NA (2019) Distributed trust-based routing decision making for WSN. Doctoral Dissertation, Auckland University of Technology
Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516
Nguyen TD, Khan JY, Ngo DT (2017) An effective energy-harvesting-aware routing algorithm for WSN-based IoT applications. In Proceedings of 2017 IEEE International Conference on Communications (ICC), pp. 1–6.
Palaniappan S, Chellan K (2015) Energy-efficient stable routing using QoS monitoring agents in MANET. EURASIP J Wirel Commun Netw 1:1–11
Pingale RP, Shinde SN (2021) Multi-objective sunflower based grey wolf optimization algorithm for multipath routing in IoT network. Wireless Pers Commun 117(3):1909–1930
Pister K, Dejean N, Barthel D (2012) Routing metrics used for path calculation in low-power and lossy networks. RFC, p. 6551.
RahkarFarshi T (2021) Battle royale optimization algorithm”. Neural Comput Appl 33(4):1139–1157
Rakesh B (2021) Novel authentication and secure trust based rpl routing in mobile sink supported internet of things. Cyber-Phys Syst. https://doi.org/10.1080/23335777.2021.1933194
Rehman A, Awan KA, Din IU, Almogren AS (2023) FogTrust: fog-integrated multi-leveled trust management mechanism for internet of things. Technologies. https://doi.org/10.3390/technologies11010027
Sahraoui S, Henni N (2021) SAMP-RPL: secure and adaptive multipath RPL for enhanced security and reliability in heterogeneous IoT-connected low power and lossy networks. J Ambient Intell Hum Comput. https://doi.org/10.1007/s12652-021-03303-9
Salehi M, Boukerche A, Darehshoorzadeh A, Mammeri A (2016) Towards a novel trust-based opportunistic routing protocol for wireless networks. Wireless Netw 22(3):927–943
Sankar S, Ramasubbareddy S, Luhach AK, Nayyar A, Qureshi B (2020) CT-RPL: Cluster tree-based routing protocol to maximize the lifetime of Internet of things. Sensors 20(20):5858
Sennan S, Somula R, Luhach AK, Deverajan GG, Alnumay W, Jhanjhi NZ, Ghosh U, Sharma P (2021) Energy efficient optimal parent selection based routing protocol for internet of things using firefly optimization algorithm. Trans Emerging Telecommun Technol 32(8):e4171
Sousa N, Sobral JV, Rodrigues JJ, Rabêlo RA, Solic P (2017) ERAOF: A new RPL protocol objective function for Internet of Things applications. In Proceedings of 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech) 1–5.
Tao H, Zhou J, Masdari M, Marhoon HA (2022) A hybrid marine predator algorithm for thermal-aware routing scheme in wireless body area networks. J Bionic Eng. https://doi.org/10.1007/s42235-022-00263-4
Verma A, Ranga V (2020) Security of RPL based 6LoWPAN networks in the internet of things: a review. IEEE Sens J 20(11):5666–5690
Wang B, Chen X, Chang W (2014) A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive Mob Comput 13:164–180
Xia H, Jia Z, Li X, Ju L, Sha EHM (2013) Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw 11(7):2096–2114
Yadav AK, Tripathi S (2017) QMRPRNS: design of QoS multicast routing protocol using reliable node selection scheme for MANETs. Peer-to-Peer Netw Appl 10(4):897–909
Zhu J (2018a) Wireless sensor network technology based on security trust evaluation model. Intern J Online Eng 14(4):211
Zhu J (2018b) Wireless sensor network technology based on security trust evaluation model. Int J Online Eng. https://doi.org/10.3991/ijoe.v14i04.8590
Author information
Authors and Affiliations
Contributions
All authors have made substantial contributions to conception and design, revising the manuscript, and the final approval of the version to be published. Also, all authors agreed to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rajeesh Kumar, N.V., Jaya Lakshmi, N., Mallala, B. et al. Secure trust aware multi-objective routing protocol based on battle competitive swarm optimization in IoT. Artif Intell Rev 56 (Suppl 2), 1685–1709 (2023). https://doi.org/10.1007/s10462-023-10560-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10462-023-10560-x