Skip to main content

Robust Routing for Secure Communication in Internet of Things Enabled Networks

  • Conference paper
  • First Online:
Techno-Societal 2018

Abstract

The Internet of Things (IoT) is emerging technology as the global and pervasive paradigm that aids and gives component to the monitoring and controlling the physical world by playing out the errands for information gathering, handling, and examination from the IoT sensor devices. There are several concerns about IoT networks’ design such as quality of service, security, scalability, and reliability. Security and privacy is the most critical problem for IoT networks. Hence designing the secure routing protocol is the main research challenge for IoT networks. In this paper, we have mentined the review on the recent security mechanisms for IoT enabled wireless networks. Secondly, we have designed two recent secure techniques for IoT enabled networks and evaluated them with networks designed in terms of various QoS parameters such as throughput, overhead, delay etc. The outcome of this paper is the current challenges and future directions for designing the robust security protocol for IoT networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54:2787–2805

    Article  Google Scholar 

  2. Zhao K, Ge L (2013) A survey on the internet of things security. In: Proceedings of the 9th international conference on Computational Intelligence and Security (CIS), pp 663–667

    Google Scholar 

  3. Evans D (2011) The internet of things: how the next evolution of the internet is changing everything

    Google Scholar 

  4. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29:1645–1660

    Article  Google Scholar 

  5. Abdelaziz AK, Nafaa M, Salim G (2013) Survey of routing attacks and counter-measures. In: Proceedings of the 15th international conference on computer modelling and simulation (UKSim), pp 693–698

    Google Scholar 

  6. Chze PLR, Leong KS (2014) A secure multi-hop routing for IoT communication. IEEE World Forum Internet Things (WF-IoT):428–32

    Google Scholar 

  7. Chze PLR, Leong KS (2014) A secure multi-hop routing for IoT communication. IEEE World Forum on the Internet of Things (WF-IoT), pp 428–432

    Google Scholar 

  8. Hummen R, Hiller J, Wirtz H, Henze M, Shafagh H, Wehrle K (2013), 6LoWPAN fragmentation attacks and mitigation mechanisms. In: Presented at the proceedings of the sixth ACM conference on security and privacy in wireless and mobile networks, Budapest, Hungary

    Google Scholar 

  9. Anita X, Martin Leo Manickam J, Bhagyaveni MA (2013) Two-way acknowledgment-based trust framework for wireless sensor networks. Int J Distrib Sens Netw 2013:14

    Google Scholar 

  10. Krentz KF, Rafiee H, Meinel C (2013) 6LoWPAN security: adding compromise resilience to the 802.15.4 security sublayer. In: Presented at the proceedings of the international workshop on adaptive security, Zurich, Switzerland

    Google Scholar 

  11. Mulligan G (2007) The 6LoWPAN architecture. In: Presented at the proceedings of the 4th workshop on embedded networked sensors, Cork, Ireland

    Google Scholar 

  12. Raza S, Shafagh H, Hewage K, Hummen R, Voigt T, d. o. t. Akademin för innovation et al (2013) Lithe: lightweight secure CoAP for the internet of things. IEEE Sensors J 13:3711–3720

    Article  Google Scholar 

  13. Raza S, Duquennoy S, Höglund J, Roedig U, Voigt T (2014) Secure communication for the internet of things—a comparison of link-layer security and IPsec for 6LoWPAN. Secur Commun Netw 7:2654–2668

    Article  Google Scholar 

  14. Li W, Member, IEEE, Song H (2016) ART: an attack-resistant trust management scheme for securing vehicular Ad Hoc networks. IEEE Trans Intell Transp Sys 17(4)

    Article  Google Scholar 

  15. Elleuchi M, Boujeleben M, Abid M (2017) Securing RPL-based internet of things applied for water pipeline monitoring. 5th international conference on Software, Telecommunications and Computer Networks (SoftCOM)

    Google Scholar 

  16. Li W, Member, IEEE, Song H, Senior Member, IEEE, Zeng F (2018) Policy-based secure and trustworthy sensing for an internet of things in smart cities. IEEE Internet Things J 5(2):716–723

    Article  Google Scholar 

  17. http://sys.cs.uos.de/bonnmotion/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Thigale, S.B., Pandey, R., Dhotre, V.A. (2020). Robust Routing for Secure Communication in Internet of Things Enabled Networks. In: Pawar, P., Ronge, B., Balasubramaniam, R., Vibhute, A., Apte, S. (eds) Techno-Societal 2018 . Springer, Cham. https://doi.org/10.1007/978-3-030-16962-6_9

Download citation

Publish with us

Policies and ethics