[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3586102.3586128acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

Trusted Authentication Mechanism for Perceptual layer-oriented Network Routing

Published: 24 July 2023 Publication History

Abstract

IoT routing is the basis for efficient operation of perception layer networks. The current routing technology of IoT lacks a trusted authentication mechanism, and the adopted traditional routing algorithm can hardly meet the routing demand of massive IoT terminals. Based on this, this paper proposes a trusted authentication mechanism for IoT routing, and combines reinforcement learning and trickle timer to propose an intelligent adaptive trickle timer algorithm, which ensures the secure and trustworthy and efficient operation of IoT routing.

References

[1]
A. Musaddiq, Y . B. Zikria, O. Hahm, H. Y u, A. K. Bashir, and S. W. Kim,‘‘A survey on resource management in IoT operating systems,’’ IEEE Access, vol. 6, pp. 8459–8482, 2018.
[2]
Y . Y u, S. C. Liew, and T. Wang, ‘‘Multi-agent deep reinforcement learning multiple access for heterogeneous wireless networks with imperfect channels,’’ IEEE Trans. Mobile Comput., early access, Feb. 9, 2021.
[3]
T. Winter, RPL: IPv6 routing protocol for low-power and lossy networks, IETF RFC 6550, Mar. 2012.
[4]
N. Accettura, L. A. Grieco, G. Boggia, and P . Camarda, ‘‘Performance analysis of the RPL routing protocol,’’ in Proc. IEEE Int. Conf. Mechatronics, pp. 767–772,Apr. 2011.
[5]
B. Ghaleb, “A survey of limitations and enhancements of the ipv6 routing protocol for low-power and lossy networks: A focus on core operations,” IEEE Commun. Surv. Tut., vol. 21, no. 2, pp. 1607-1635,Second Quarter 2019.
[6]
P . Levis, T. Clausen, J. Hui, O. Gnawali, and J. Ko, The Trickle Algorithm, document RFC 6206, Mar. 2011.
[7]
B. Ghaleb, A. Y . Al-Dubai, E. Ekonomou, I. Romdhani, Y . Nasser, and A. Boukerche, ‘‘A novel adaptive and efficient routing update scheme for low-power lossy networks in IoT,’’ IEEE Internet Things J., vol. 5, no. 6, pp. 5177–5189, Dec. 2018.
[8]
R. Ali, N. Shahin, Y . B. Zikria, B.-S. Kim, and S. W. Kim, ‘‘Deep reinforcement learning paradigm for performance optimization of channel observation–based MAC protocols in dense WLANs,’’IEEE Access, vol. 7, pp. 3500–3511, 2019.
[9]
Z. Mammeri, ‘‘Reinforcement learning based routing in networks: Review and classification of approaches,’’ IEEE Access, vol. 7, pp. 55916–55950, 2019.
[10]
A. Musaddiq, Z. Nain, Y . A. Qadri, R. Ali, and S. W. Kim, ‘‘Reinforcement learning-enabled cross-layer optimization for low-power and lossy networks under heterogeneous traffic patterns,’’ Sensors, vol. 20, no. 15,p. 4158, Jul. 2020.
[11]
Contiki: The Open Source Operating System for the Internet of Things.Accessed: Feb. 15, 2021. [Online]. Available: http://www.contiki-os.org/
[12]
Z1 Datasheet. Accessed: Feb. 15, 2021. [Online]. Available: http://wiki.zolertia.com/
[13]
Lin Yu-Bing. Design and Implementation of Identity Authentication Scheme Based on Elliptic Curve Cryptography on WSN [D]. Zhejiang University of Technology, Hangzhou.
[14]
S.H. Islam, G.P. Biswas. A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks, Ann.Telecommun.67(11-12)(2012)547-558.

Index Terms

  1. Trusted Authentication Mechanism for Perceptual layer-oriented Network Routing

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCNS '22: Proceedings of the 2022 12th International Conference on Communication and Network Security
    December 2022
    241 pages
    ISBN:9781450397520
    DOI:10.1145/3586102
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 July 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. authentication
    2. credible routing
    3. perceptual layer

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICCNS 2022

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 15
      Total Downloads
    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 19 Dec 2024

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media