Sachin Sharma, Mohammad Yahya, Anupriya Jain, Ahmed I. Alutaibi, Abdullah Baihan, Papiya Dutta, Ahed Abugabah
{"title":"信息中心网络中基于节能信任管理方案的物联网设备合法性评估","authors":"Sachin Sharma, Mohammad Yahya, Anupriya Jain, Ahmed I. Alutaibi, Abdullah Baihan, Papiya Dutta, Ahed Abugabah","doi":"10.1002/dac.70085","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>A rapidly developing future technology, wireless sensor networks (WSNs) have promise for a wide range of military and business applications. Potential safety issues could affect WSN technology because it combines wireless communications with processing capacity. A novel networking architecture on the Internet of Things (IoT) called information-centric networking (ICN) provides more security than standard Internet Protocol (IP) networks. However, it still experiences a lot of security issues, particularly from internal attacks. Applying trust management technologies is an effective way to secure against internal threats. Therefore, an evolutionary particle swarm optimization energy-efficient trust management scheme (EPSO-EETMS) is proposed to evaluate the legitimacy of IoT devices and nodes. The data regarding routing pathways using trust can identify various types of attacked solutions. The proposed solution is thoroughly evaluated using some networking parameters, such as the distance between devices, energy use, and information loss during data transmission. These practical factors include energy consumption when transmitting data between nodes, message delivery to previous or subsequent nodes, and distance between two devices. According to the evaluation results, the proposed strategy outperforms standard techniques in terms of response time, authentication delays, and the number of requests from fake nodes. The accuracy of the proposed technique is obtained to be 98.66% for 100 nodes, which is higher than that of existing routing techniques.</p>\n </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 9","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2025-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Evaluation of Legitimacy of IoT Devices Based on an Energy-Efficient Trust Management Scheme in Information-Centric Networking\",\"authors\":\"Sachin Sharma, Mohammad Yahya, Anupriya Jain, Ahmed I. Alutaibi, Abdullah Baihan, Papiya Dutta, Ahed Abugabah\",\"doi\":\"10.1002/dac.70085\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>A rapidly developing future technology, wireless sensor networks (WSNs) have promise for a wide range of military and business applications. Potential safety issues could affect WSN technology because it combines wireless communications with processing capacity. A novel networking architecture on the Internet of Things (IoT) called information-centric networking (ICN) provides more security than standard Internet Protocol (IP) networks. However, it still experiences a lot of security issues, particularly from internal attacks. Applying trust management technologies is an effective way to secure against internal threats. Therefore, an evolutionary particle swarm optimization energy-efficient trust management scheme (EPSO-EETMS) is proposed to evaluate the legitimacy of IoT devices and nodes. The data regarding routing pathways using trust can identify various types of attacked solutions. The proposed solution is thoroughly evaluated using some networking parameters, such as the distance between devices, energy use, and information loss during data transmission. These practical factors include energy consumption when transmitting data between nodes, message delivery to previous or subsequent nodes, and distance between two devices. According to the evaluation results, the proposed strategy outperforms standard techniques in terms of response time, authentication delays, and the number of requests from fake nodes. The accuracy of the proposed technique is obtained to be 98.66% for 100 nodes, which is higher than that of existing routing techniques.</p>\\n </div>\",\"PeriodicalId\":13946,\"journal\":{\"name\":\"International Journal of Communication Systems\",\"volume\":\"38 9\",\"pages\":\"\"},\"PeriodicalIF\":1.7000,\"publicationDate\":\"2025-04-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Communication Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/dac.70085\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Communication Systems","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/dac.70085","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
Evaluation of Legitimacy of IoT Devices Based on an Energy-Efficient Trust Management Scheme in Information-Centric Networking
A rapidly developing future technology, wireless sensor networks (WSNs) have promise for a wide range of military and business applications. Potential safety issues could affect WSN technology because it combines wireless communications with processing capacity. A novel networking architecture on the Internet of Things (IoT) called information-centric networking (ICN) provides more security than standard Internet Protocol (IP) networks. However, it still experiences a lot of security issues, particularly from internal attacks. Applying trust management technologies is an effective way to secure against internal threats. Therefore, an evolutionary particle swarm optimization energy-efficient trust management scheme (EPSO-EETMS) is proposed to evaluate the legitimacy of IoT devices and nodes. The data regarding routing pathways using trust can identify various types of attacked solutions. The proposed solution is thoroughly evaluated using some networking parameters, such as the distance between devices, energy use, and information loss during data transmission. These practical factors include energy consumption when transmitting data between nodes, message delivery to previous or subsequent nodes, and distance between two devices. According to the evaluation results, the proposed strategy outperforms standard techniques in terms of response time, authentication delays, and the number of requests from fake nodes. The accuracy of the proposed technique is obtained to be 98.66% for 100 nodes, which is higher than that of existing routing techniques.
期刊介绍:
The International Journal of Communication Systems provides a forum for R&D, open to researchers from all types of institutions and organisations worldwide, aimed at the increasingly important area of communication technology. The Journal''s emphasis is particularly on the issues impacting behaviour at the system, service and management levels. Published twelve times a year, it provides coverage of advances that have a significant potential to impact the immense technical and commercial opportunities in the communications sector. The International Journal of Communication Systems strives to select a balance of contributions that promotes technical innovation allied to practical relevance across the range of system types and issues.
The Journal addresses both public communication systems (Telecommunication, mobile, Internet, and Cable TV) and private systems (Intranets, enterprise networks, LANs, MANs, WANs). The following key areas and issues are regularly covered:
-Transmission/Switching/Distribution technologies (ATM, SDH, TCP/IP, routers, DSL, cable modems, VoD, VoIP, WDM, etc.)
-System control, network/service management
-Network and Internet protocols and standards
-Client-server, distributed and Web-based communication systems
-Broadband and multimedia systems and applications, with a focus on increased service variety and interactivity
-Trials of advanced systems and services; their implementation and evaluation
-Novel concepts and improvements in technique; their theoretical basis and performance analysis using measurement/testing, modelling and simulation
-Performance evaluation issues and methods.