Evaluating Secured Routing Scheme for Mobile Systems in the Internet of Things (IoT) Environment

J. Logeshwaran, T. Kiruthiga
{"title":"Evaluating Secured Routing Scheme for Mobile Systems in the Internet of Things (IoT) Environment","authors":"J. Logeshwaran, T. Kiruthiga","doi":"10.55529/ijrise.22.8.21","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) environment presents a unique challenge in the area of secure routing for mobile systems. Unsecured routing can lead to the breach of sensitive data and compromise the overall security of an IoT network. As the IoT network is ever increasing and becoming more complex, the need for an effective and secure routing scheme is becoming more urgent. One type of secure routing scheme for mobile systems in an IoT network is the use of a two-hop approach. This approach requires the device to establish a secure link with a base station and then use the certified secure link to perform two hops to the goal node. This approach ensures that the nodes within the network are only able to access devices that they have been authorized to do so. The two-hop approach also provides an additional layer of security, as the device is able to verify the identity of each node that they hop to before granting them access to the data they seek. This approach also provides scalability for the routing protocol, as the protocol can adapt well for different topologies and network sizes. This makes it suitable for a wide range of IoT devices, from smart phones and wearable’s to consumer appliances and industrial machines. Additionally, the two-hop approach can help to increase latency and reduce power consumption of the devices in the network. The secure two hop routing protocol is an effective solution for IoT networks and provides a strong layer of security without sacrificing scalability or performance. By using this secure routing protocol, IoT networks can remain safe and secure when sending and receiving data to and from mobile devices.","PeriodicalId":263587,"journal":{"name":"International Journal of Research In Science & Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Research In Science & Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55529/ijrise.22.8.21","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The Internet of Things (IoT) environment presents a unique challenge in the area of secure routing for mobile systems. Unsecured routing can lead to the breach of sensitive data and compromise the overall security of an IoT network. As the IoT network is ever increasing and becoming more complex, the need for an effective and secure routing scheme is becoming more urgent. One type of secure routing scheme for mobile systems in an IoT network is the use of a two-hop approach. This approach requires the device to establish a secure link with a base station and then use the certified secure link to perform two hops to the goal node. This approach ensures that the nodes within the network are only able to access devices that they have been authorized to do so. The two-hop approach also provides an additional layer of security, as the device is able to verify the identity of each node that they hop to before granting them access to the data they seek. This approach also provides scalability for the routing protocol, as the protocol can adapt well for different topologies and network sizes. This makes it suitable for a wide range of IoT devices, from smart phones and wearable’s to consumer appliances and industrial machines. Additionally, the two-hop approach can help to increase latency and reduce power consumption of the devices in the network. The secure two hop routing protocol is an effective solution for IoT networks and provides a strong layer of security without sacrificing scalability or performance. By using this secure routing protocol, IoT networks can remain safe and secure when sending and receiving data to and from mobile devices.
物联网环境下移动系统安全路由方案评估
物联网(IoT)环境在移动系统的安全路由领域提出了独特的挑战。不安全的路由可能导致敏感数据泄露,并危及物联网网络的整体安全性。随着物联网网络的不断增加和复杂化,对有效和安全的路由方案的需求变得更加迫切。物联网网络中移动系统的一种安全路由方案是使用两跳方法。这种方法要求设备与基站建立安全链路,然后使用经过认证的安全链路执行到目标节点的两跳。这种方法确保网络中的节点只能访问已被授权访问的设备。两跳方法还提供了额外的安全层,因为设备能够在授予它们对所查找数据的访问权之前验证它们所跳到的每个节点的身份。这种方法还为路由协议提供了可伸缩性,因为该协议可以很好地适应不同的拓扑结构和网络大小。这使得它适用于各种物联网设备,从智能手机和可穿戴设备到消费电器和工业机器。此外,两跳方法可以帮助增加延迟并降低网络中设备的功耗。安全的两跳路由协议是物联网网络的有效解决方案,在不牺牲可扩展性或性能的情况下提供强大的安全层。通过使用这种安全路由协议,物联网网络在向移动设备发送和接收数据时可以保持安全。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信