Document Type : Special Issue on Pragmatic Approaches of Software Engineering for Big Data Analytics, Applications and Development
Authors
1 Research Scholar, Department of Computer Science and Engineering, Centurion University of Technology and Management, Odisha, India.
2 School of Applied Sciences, Centurion University of Technology and Management, Odisha, India.
3 Department of Computer Science and Engineering, Chaitanya College of science and Technology, Madhapatnam, Kakinada, India.
Abstract
Keywords
Introduction
IoT, a new paradigm in networking world shifted the industries and researcher’s focus from wireless sensor network to more complex and heterogeneous environment, involves different components such as smart devices, gateways, clouds, predictive/prescriptive analytics and then finally, application reports. Currently millions of devices are interconnected to provide customer-oriented services to ease the human life, for this purpose there are different domains where the contributions of IoT are very significant to influence decision making system, reduces the manual intervention to monitor the application objectives, therefore providing Intelligent solutions to the real time application through smart devices is the main vision of this network. Additionally, smart devices operate on different environmental and application factors which decide type of connectivity needed at this stage to achieve the goals. Mostly the widely used device-oriented communication protocols for connectivity are Wi-Fi, Bluetooth, ZigBee and 6LoWPAN suitable for short range IoT physical elements like sensors, actuators, and small computing systems and gateway or end devices, but in some cases, these devices’ boards are embedded with multiple communications protocols provision.
Table 1. IoT Communication Protocols
Wireless IOT Connectivity |
|
Short Range Protocols |
Long Range Protocols |
Wi-Fi Bluetooth 6LoWPAN Z-wave ZigBee ANTIANT Thread NFC RFID EnOcean |
Cellular 2G(GSM) 3G(GSM/CDMA) 4G(LTE) 5G(Available 2020) LTE Cat 0,1 & 3 LTE M1 LTE NB1 NB IOT LPWAN LoRaWAN Weightless N SigFox Ingenu Neul N Wave |
These protocols as mentioned in Table 1 vary from each other, based on frequency, range, and data transmission rate parameters and the edge computing translates this communication protocols instruction to internet protocols to send the collected data to the cloud. There are many virtual or physical components started mapping from things layer to People and Process Layer, builds the type of application levels required for the scenario, it could be simple or complex level from level 1 to level 6 where each level contains distinct local and cloud components (Table 2). Mainly, the devices used in WSN (Wireless Sensor Network) aims to collect unformatted data from environment interaction, also need to aggregate the collected data and send to the nearest station. Devices with different types of data, memory capacity, processing capability, transmission range and communication protocols make these contrasting to its properties to the data link layer. Current IoT challenges are quite serious to adopt in real time, in addition to win the trust of different components which are facilitating the application functions either local or cloud level to system makes it more vulnerable.
In the literature review on existing approaches, survey on new prototypes and research on security mechanism, the summary is trust mechanism, which is the alternative solution to build the security gaps and provides the flexibility to nodes to communicate under uncertain circumstances. Such situations further deteriorate with more troublesome when nodes are involved in delivering fake recommendation to promote/demote nodes to alter trust value to influence the interactions. This fake recommendation initiates different type of attacks inside trust-based system.
Based on the previous research motivation in forming clusters in the network, our proposed approach here is extending the cluster to trustworthy zones formation, i.e. group of clusters entails to the concept of node migration with help of cluster heads under supervision of gateways. Average trust value level of cluster head is compared individual nodes trust level and the node’s level falls below average value of CH, then node is pushed to the CH migration list, therefore segregation of nodes inside clusters could be achieved through the trust evaluation process. Node migration is not possible if there are no other clusters to accept it or not having enough energy to move to the other cluster. In case, no node migration cases, the cluster head will exclude such nodes from interaction for specific duration/period of operational time, further these excluded nodes can be included back and stays within their cluster zone after their connection request initiation acknowledged by cluster head. Instead exclude from interaction, cluster head also drops the nodes permanently if these are nodes fall below average trust threshold level and also its remaining energy less than the cut off level, therefore these nodes are marked as malicious, immediately updated their reputation value and prevented these nodes in any means involved in trustworthy operations. Every cluster head can advertise its external requirements and send it to neighbor cluster heads which may accept or reject it. As per our current knowledge base, it is kind of first time that our proposed approach initiates share one CH trusted nodes to other CHs to accomplish its purposes.
Table 2. IoT System Components
IoT Component |
Component Roles |
IoT Layer |
Resources |
Software components plays crucial role connect to network, communicate datalink protocols, access & store the data and controlling actuators |
Things Layer |
Controller Services |
Runs on device and communicates with webs service to handle application commands |
Connectivity/Edge Computing Layer |
Local/Could Database |
Stores Data generated by Devices and application logs |
Data Ingestion Layer |
Web Services |
Bridges between application and device, also reaches to database to store through end points |
Global Infrastructure Layer |
Analytics/Artificial Intelligence |
Analysing the massive device data stored in cloud and draws inferences for decision system |
Data Analysis Layer |
Web Application/Mobile app |
Gather data based on the requirement and monitor the collected data, pushes the data for further analysis |
Application Layer |
Business Reports |
Reports are generated based on previous step analysis and shared with customers. It can be stored either local or cloud platforms. |
People and Process Layer |
Finally, the remaining of this paper is structured as follows; Section 2 presents current state of art related to trust management and security issues in IoT network. Discussion on our proposed protocol is outlined in Section 3 and provides new direction creating trustworthy zones to avoid malicious attacks of nodes. Section 4 presents the results achieved in the simulation considering different network impacted parameters then followed by our current research work conclusion and, the direction of future works cited as well.
Literature review
Shah et al. (2015) proposed fuzzy logic controller to achieve expected network lifetime at cost of real time communication and energy consumption. Basically, it controls each node’s energy consumption and guarantees it should be optimal to reach the objective. It maintains balanced energy among the nodes by selecting active nodes in each round and use sleep schedule in an efficient way. In each stage fuzzy controller selects active nodes based on remaining energy and active time; also expand the transmission power to reduce number of hops between source and destination. The general semantic based trust mechanism in Wang et al. (2013) involves extracting trust information, calculating the trust value, sharing calculated information and finally decision making for self-organizing set of nodes which going to stay for providing the service to service requester. In extracting trust information, it will extract trust information from each layer sensor, core and application layers, so overall trust value is calculated by the weighted sum of each element with giving different importance of each layer and users preference.
The application layer security provided by Abhijit and Prasad (2018) is trust model for IoT and fog ecosystem. Trust based data communication along with other security approaches are employed to filter out security attacks. There are four layers in this IoT and fog system where trust-based security is implemented at fog layer that communicates only authenticated data to the cloud. Authentication, access control, and light weight cryptography algorithms are used to setup initial IoT network and fog nodes before actual data transmission starts.
Designed framework by Fernandez-Gago et al. (2017) considered interoperability, dynamicity and fragmented research to address IoT challenges related to trust, privacy, and security. Framework having tools and services are providing benefits to the end users of IoT which includes the trust concerns. This framework advocates the trust calculation at run time helpful to leverage the reconfiguration in self adaptive system. Its four-layer architecture where trust framework layer includes package of services can be used in different context of system, exposed as API for designers and developers, further it can be extended through its base components, public methods and configuration files.
Trustworthiness of device in Tragos et al. (2016) calculated based on different criteria such as communication-based trust, Security-based Trust, Data-Reliability based Trust, Social Relationship based Trust, and Reputation based Trust. The Trust value obtained through different approaches can be used as IoT services for data sharing, access control, authorization, indoor positioning solution, and routing. Further, IoT domain includes many scenarios which can use the trust prominently for the exchanging information from users to devices, for actuating commands from device to user and for information and commands between devices. Design of trust model aiming to find malicious activities/malfunctioning nodes considers the following steps observation, scoring, selection, transaction reward and punishes to be incorporated.
The selection of cluster head is to balance the load in the network and also, helps to reduce the energy consumption and increase the lifetime of networks. This algorithm in Behera et al. (2019) considers initial energy, residual energy and optimal value of CH to be elected cluster head for the next level of operation. R-LEACH model adopted in this approach shows better network performance in terms of more packets delivery to Base Station (BS), of network, throughput, reduce latency, optimal use of residual energy.
Oumaima Ben Abderrahim et al. (2016) provided security solution through trust management clustering algorithm to protect the network from malicious attacks most likely caused by cluster head and also improved the network lifetime. It considers parameters such as trust level, energy, connectivity, stability and Community Interest to select the cluster head. Since IoT having heterogeneous and anonymous, hence clustering algorithm is based on the context and stability. Same context is required as it helps high level of interactions among the devices for having common settings and grouping of objects happening based on their locations to prevent loss connection and in memory data frequently.
Alshehri et al. (2018) focused on scalability of trust solution to billions of IoT nodes which addresses trust-based clustering, counter trust related attacks, trust value computation and trust migration. This proposed IoT-TM includes four algorithms part of IoT trust management includes filtering bad mouthing of trust values, determines the node to join the cluster, cluster formation, and finally migration of nodes. The simulation shows evenly distributed nodes based on their trust value creates smaller difference in average trust values among the master nodes.
Layer architecture used in Dedeoglu et al. (2019) for improving end to end trust from data observation to block validation in block chained based IoT applications. This approach initiates the trust validation at data link and block chained layers separately, in data link layer it considers evidence, reputation of source and confidence on its collected data and in BC layer inter node interactions termed as transactions are evaluated through the customized block chain architecture with the following steps block generation, block validation, and distributed consensus mechanism.
The trust architecture for soft defined network (SDN) in IoT called IoT trust integrated with cross layer authorization protocol Chen et al. (2019). Further, trust evaluations methods depend behavior-based reputation evaluation scheme for the Node and an organization reputation evaluation scheme for organization, both together decides whether node will get access of the tag or not. Cross layer authorization protocol authorizes the node to access to the tag related organization based on the node and organization’s reputation. With the gain of popularity of IoT in real time scenario connected with multiple heterogeneous devices, Mohan and Bhanu (2018) sensed the challenges inherent inside IoT life early and proposed the multi-dimensional trust aware routing framework considering social trust (direct and indirect trust) and also information trust to select next hop node. The other network parameters, for increased network lifetime and less average energy consumption, this framework adopted clustered strategy and all the communication responsibilities are allocated to the cluster heads. This approach is effective in securing the IoT network against the attacks proved through the simulation by varying from malicious rates.
Meng et al. (2017) proposed new intrusion detection systems (IDSs) to safeguard against inside attacks using trust management mechanism. Packet based trust management mechanism may not be effective in case of heavy traffic, therefore Bayesian-based trust management is used in this model. From the above literature survey, it is quite evident that none of the above approaches firmly addressed the issues of cyber-attacks, scalability, and energy utilization of nodes in IoT. Today’s generation IoT applications demand high accuracy of privacy/security protection against mischievous nodes and to give trust and confident to the user to participate in IoT uncertainty world.
Maddar et al. (2018) has presented the effective model of distributed trust management approach in the application of IoT. This approach evaluates the human interaction of 1000 to 5000 datasets. Here, various components in IoTs selected from the object, which performs the dynamic characteristic based real world applications. Security model of WSN performed with internet based applications. Intrusion detection on WSN performs the various attack reduction by functions used in network model. The internet attack represented as manufacturing attack, selective forwarding attack, Sinkhole attack, Black hole attack and jamming attack. This review analysis the various attack detection models to get the better algorithm.
Pourghebleh & Hayyolalam (2019) has presented the review analysis of systematic approach of load balancing in IoT application. The utility of IoT application single system performance leads the network overhead problem; so, the optimized IoT designed to reduce the imbalance traffic analysis. Centralized and distributed approach on load balancing scheme utilized to get the result of scalability, routing, reliability and security. Krishna, (2017) has designed the security management approach of IoT with RFID network analyzer. Here, it utilizes the Web of Thins with heterogeneous systems. This adopts the communication technology on wireless network, which utilize the cyber physical network for different approaches in IoT. Trust management, delay, network overhead, security and reliability parameters are determined to obtain the better security based trust management protocol.
Table 3. Trust model comparisons
Trust model category |
Trust model |
Approach |
Trust computation technique |
Performance |
||
Centralized |
Distributed |
Blockchain Based |
||||
Cross-layer authorization trust model
|
Chen et al., (2019) |
|
ü |
|
BES and ORES trust evaluation |
Enabling the reliable data collection/mining, context-awareness, and enhanced user security in the IoT |
Layered Trust model |
Wang et al., (2013) |
|
ü |
|
Fuzzy set and semantic mining approach |
Decision making, self-organization, service components and trust solutions |
Data oriented trust model |
Tragos et al., (2016) |
ü |
|
|
Fuzzy logic or data fusion techniques and cryptography for security |
Data sharing approach with secure model. Communication, security, data-based criteria, social relationships, and reputation. |
Data oriented trust model |
Maddar et al., (2018) |
|
ü |
|
Location Detection Using the TDOA geo-location Algorithm |
Network attack detection |
Data/packet oriented trust model |
Oumaima Ben Abderrahim et al., (2016) |
ü |
|
|
Intergroup topology, Threshold based trust model |
Network lifetime and network attack detection |
Blockchain based trust model |
Dedeoglu et al. (2019) |
|
|
ü |
Data trust and gateway reputation model |
End to end trust from sensor data observation to blockchain validation |
Scalable trust model |
Alshehri et al. (2018) |
ü |
|
|
Trust Management scalability trust algorithms |
Scalable trust management prevents bad mouthing attacks |
Different models of blockchain also enhance the security, transparency and trust among various actors in supply chain management. In Khanna et al. (2020), permissioned blockchains can be used in many supply chain management ecosystems. This research prototype can be extended to IoT applications to establish trust between unknown devices for shared services. In wireless sensor network (WSN), there are approaches to find the attackers to trace their ability to clone good nodes parameters but Juneja et al. (2017)’s witness based distributed mechanism is able to detect the clone attacks with high detection probability and less memory overhead compared to other algorithms. Currently it works only for static WSN, can be extended to WSN along with considering mobility of nodes. Juneja et al. (2020), evaluated seven parameters from the identified 11 wireless communication technology by using multi-criteria decision making approach and ranking was obtained to choose right platform for industry 4.0 applications. Table 3 summarizes comparison points between these different trust-based mechanisms followed for IoT applications.
Proposed model
Concept of edge computing in our proposed model that plays vital role in formation trustworthy zones, i.e. enhancement of single cluster to multiple clusters joining to form trustworthy zones. Main intent of our approach to form trustworthy zones across network and the lead node of CHs will do the direct interaction with base stations. This approach is very much flexible than other current algorithms because it could be used for both single and multi-hop communication to base station. Most of the algorithms in current state of art facilitate either single or multiple hops communication but here in our approach can stand by both based on the application requirement. Core notion of forming trustworthy zones through cluster chaining mechanism is of unique approach as per our survey and helped IoT network world to resolve many inherent issues, which lasted for long time.
Further, this model is considering different network parameters to select cluster head, than other primitive models where it considers one or two parameters which may not be suitable to judge the head among the nodes. In such situation always high chances are there for selected head node might be wrong one who dissipates the energy quickly, then impacts whole network functionality adversely. After gateway calculates every node trust value based on the below equation (1), it decides the node with highest as head and second highest stays as clone to head to support main head during the execution cycle. First CH and second clone head together share their own cluster load and controls node communication, node migration, node connect/disconnect. Most likely clone cluster head, the second highest trust vale will replace actual cluster head in future. After completion of operation in interval t1, the next interval t2 clone cluster head will act as cluster head till gateway finds another new cluster head. Using this notion, not only it saves execution time for service operations, energy to collect and transmit the data, reduces communication messages, more important its independent of finding new cluster head on the next interval.
Cluster Head Selection based on the below equation
Nodes in the cluster can map to either CH or CLCH sharing its unique identity, data in both heads are combined represents total number of nodes present in the cluster. After the selection of cluster head, the next task is to find trust of nodes inside cluster. Our approach considering direct, prioritized reputation values and other network parameters find the trust value of node. CH and CLCH defines the trust value range to perform based on gateway decision. Multiple cluster heads architecture as in is followed inside our cluster to balance the cluster workload and not to overburden the single CH, as implemented in other models. Mainly main cluster head will respond to the instructions given from gateway and updates the status later to it. The other cluster head will facilitate the transfer the sensors collected data to the upstream IoT levels. The whole mechanism is classified as gateway mapped to CH and sensors/transducers mapped to CLCH, finally CH and CLCH will interact with each other to share the tasks and maintain the cluster balanced in terms of residual energy, turn-around time, and memory usage.
Average trust value level of cluster head (CH) and clone cluster head (CLCH) is compared to individual nodes trust level and the node’s level falls below average value of CH, then node is pushed to the CH migration list, therefore segregation of nodes inside clusters could be achieved through the trust evaluation process. Node migration is not possible if there are no other clusters to accept it or not having enough energy to move to the other cluster. In case, no node migration cases, the cluster head will exclude such nodes from interaction for specific duration/period of operational time, further these excluded nodes can be included back and stays within their cluster zone after their connection request initiation acknowledged by cluster head. Instead exclude from interaction, cluster head also drops the nodes permanently if these are nodes fall below average trust threshold level and also its remaining energy less than the cut off level, therefore these nodes are marked as malicious, immediately updated their reputation value and prevented these nodes in any means involved in trustworthy operations. Every cluster head can advertise its external requirements and send it to neighbor cluster heads which may accept or reject it. As per our current knowledge base, it is kind of first time that our proposed approach initiates share one CH trusted nodes to other CHs to fulfill its purposes. Trustworthy zones and multi CH on IoT network is shown in Figure 1.
Algorithm
Input: Random IoT Network with different capabilities devices with fixed range of communication
Step-1: Random Network is transformed to different clusters by gateway using above modified LEACH (Low-energy adaptive clustering hierarchy) clustering model and cluster density will remain same among the clusters.
Step-2: Edge computing in the network makes different clusters and finds out the CH and CLCH in every cluster. These two nodes are the highest trust level among all the nodes in the cluster.
Step-3: CH will interpret the instructions from gateway and pass either to CN or CLCH based on criticality of task. CLCH will keep on supporting & monitoring the sensor nodes.
Step-4: After formation of clusters, next task of edge computing of gateway is to create trustworthy zones which maps multiple clusters into one zone based on similar application context.
Step-5: Every cluster is managed by CH and CLCH, CLCH makes nodes temporary disconnect if not participating active operations which saves energy. Finally, data stored in both cluster heads are transferred to base station.
Step-6: Trust of node falls below average trust of CH & CLCH, then node is ready for migration to other clusters or gateway depending on other cluster’s trust score and Zone trust score, temporary off from active transactions and also, all other nodes stop interacting with this specific node after confirmation received from CH.
Step-7: Calculate average trust score of Zone by Gateway node and sends the score to CH of each cluster.
Step-8: if trust score of a node falls into range of average trust score of other clusters then CH will advertise its node details to other cluster for migration, else if trust score of a node falls below the zone trust score then CH informs the gateway node and marks it malicious.
Step-9: After migration of node, deleted all its reference from previous cluster and mapped to new cluster. Any Node in cluster updated with ready for migration to gateway node then it’s marked as malicious node.
Output: With this approach not only, it expedited the turnaround time of sensor service-oriented transactions and, managed to have balanced network in terms of residual energy, turn-around time, and memory usage. It could prevent many trust related attacks and maintained higher level of security and privacy of user data inside network. Proposed trust model flow is explained in steps of Figure 2.
Pseudocode: Finding the active participating nodes and remove malicious nodes
Input: Number of Nodes N1, N2, Nn present in random network
Output: Finding active participating nodes and remove malicious nodes
Performance evaluation
Simulation Model and Parameters
The proposed method simulated with Network Simulator tool (NS 2.34). In the simulation, 100 wireless nodes are placed in a 60 × 60 meter square region for 30 milliseconds simulation time. Each Mobile node goes random manner among the network in various speed.
Table 4. Simulation Setup
No. of Nodes |
100 |
Area Size |
60x60 |
Mac |
802.11g |
Radio Range |
250m |
Simulation Time |
30ms |
Traffic Source |
CBR |
Packet Size |
512 bytes |
Mobility Model |
Random Way Point |
Protocol |
AODV |
All nodes have the similar transmission range of 250 meters. CBR provides a constant speed of packet transmission in network to limit the traffic rate. AODV routing protocol is applied to obtain energy saving enrichment routing path in the network. Table 4 shows simulation setup is estimation.
Results and Discussion
Evaluation of proposed holistic trust model
X graph in ns2.34 is used for analyzing the simulation performance.
Throughput: successful reception of packets at the receiver is measured and framed with the graph model. The throughput is graphed with the Figure 3 and it shows the improved result of proposed holistic trust model. In proposed holistic trust model throughput is increased as compared to existing scheme Chen et al. (2019).
Network Lifetime: Figure 4 illustrates with speed and transmission rate determined with calculated result of throughput. The network lifetime is improved the overall performance by our holistic trust model. In this, proposed method is used to offering the efficient routing path and the lifetime is increased as compared to existing scheme Chen et al. (2019).
Cluster head overhead: In Figure 5 Cluster overhead is minimized and is also able to filter out the malicious nodes and disconnect the nodes temporarily and it also saves more energy of overall network. In proposed method overhead is decreased as compared to existing scheme Chen et al. (2019).
Trust level: In Figure 6, trust level improves with time because it is able to keep only non malicious node in the network prior starting the transaction. Clusters will initiate migration of their nodes if falls below the defined Zone trust threshold level. The created zone is self-resilient against any malicious attacks and saves a lot processing usage time and energy to address the security issues. In this proposed method trust level is increased as compared to existing scheme Chen et al. (2019).
Energy consumption: Figure 7 estimate energy consumption starting energy level to ending energy level. Total residual energy is consumed based on the number of network selection nodes. Here the selections of active sensor nodes are determining the average energy consumption rate. The proposed process makes the lesser energy consumption. In proposed model energy consumption is minimized compared to existing method.
Conclusion
Our approach embodies the cluster chaining to form trustworthy zones and then, node migration applied to IoT heterogeneous network achieved the anticipated success resolving trust related attacks, to maintain balanced network and provided new direction to edge computing research world, further different network parameters are considered to select cluster head, than other primitive models where it considers one or two parameters which may not be suitable to judge the head among the nodes. In such situation always high chances are there for selected head node might be wrong one who dissipates the energy quickly, then impacts whole network functionality adversely. Multiple cluster heads architecture is followed inside our cluster to balance the cluster workload and not to overburden the single CH, as implemented in other models. Mainly main cluster head will respond to the instructions given from gateway and updates the status later to it. The other cluster head will facilitate the transfer the sensors collected data to the upstream IoT levels. The whole mechanism is classified as gateway mapped to CH and sensors/transducers mapped to CLCH, finally CH and CLCH will interact with each other to share the tasks and maintain the cluster balanced in terms of residual energy, turn-around time, and memory usage. This approach has unique features to create trustworthy zones, multiple cluster heads architecture and node migration makes its special as compared to other trust level mechanisms analyzed in the state of art.
Conflict of Interest
The authors declared that no conflict of interest.