{"title":"A Trusted Routing Schemes for IoT","authors":"Zipeng Diao, Bei Gong, Haotian Zhu, Yong Wu","doi":"10.1109/ICCCS57501.2023.10150714","DOIUrl":null,"url":null,"abstract":"The Internet of Things has become an essential part of human life. When an IoT node transmits data, it needs to go through multiple hops to reach its destination, which relies on the support of routing algorithms. The IoT network architecture itself is deficient. It is easy to various routing attacks. For requirements of secure routing for IoT, we propose an intra-domain trusted routing scheme. Our trusted routing scheme is based on-demand routing protocol and references to link trust values. For routing functions, it includes a route negotiation process and pathfinding mechanism based on a modified heap optimization method. For security functions, the security of routing is protected by trusted computing mechanism. In the sybil attack experiment, our routing schemes provide well protection effect.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCS57501.2023.10150714","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The Internet of Things has become an essential part of human life. When an IoT node transmits data, it needs to go through multiple hops to reach its destination, which relies on the support of routing algorithms. The IoT network architecture itself is deficient. It is easy to various routing attacks. For requirements of secure routing for IoT, we propose an intra-domain trusted routing scheme. Our trusted routing scheme is based on-demand routing protocol and references to link trust values. For routing functions, it includes a route negotiation process and pathfinding mechanism based on a modified heap optimization method. For security functions, the security of routing is protected by trusted computing mechanism. In the sybil attack experiment, our routing schemes provide well protection effect.