A trust management scheme to secure mobile information centric networks

Geetanjali Rathee, Ashutosh Sharma, Rajiv Kumar, Farhan Ahmad, Razi Iqbal

Research output: Contribution to journalArticlepeer-review

54 Citations (Scopus)

Abstract

The Named Data Networks (NDN) or Information Centric Networks (ICN) are being replaced by point-point procedures in order to ensure a reliable and efficient communication mechanism. The efficient benefits of ICN in terms of improved reliability, efficiency and fast information delivery lifted it as a highly capable interconnected networking form for Internet infrastructure. Smart devices in Mobile Internet of Things (MIoT) and ICN contribute towards exponential growth of technical firms by ensuring reliability, efficiency and availability. Though NDN architectures ensure a secure data communication, however, in order to gain their own benefits, the expert intruders may compromise routers (nodes) and their routing tables. Therefore, in order to ensure a secure communication through MIoT, any modification in stored data of these devices (routers) must be transparently reflected to remaining entities in the network. Recently, trust is proposed as an alternative security measure to secure content delivery within ICN. However, only few of these solutions focused on identifying the legitimacy of the devices. In this paper, we proposed a novel ICN approach to compute the legitimacy of MIoT devices/routers/nodes and routing paths information using trust based on a wide range of real-life parameters including energy consumption while transferring the data from source to destination, message delivery to preceding or succeeding nodes and distance among two devices to identify Denial of Service (DoS), Distributed Denial of Service (DDoS) or Man-in-The-Middle (MiTM) attacks. The proposed solution is evaluated rigorously over various networking parameters such as distance among the devices, energy consumption, information loss while transferring the data and so on. Further, the extensive simulation results of proposed mechanism leads to 94% efficiency in terms of better response time, lower authentication delays and request ratios from fake nodes.

Original languageEnglish
Pages (from-to)66-75
Number of pages10
JournalComputer Communications
Volume151
Early online date3 Jan 2020
DOIs
Publication statusPublished - 1 Feb 2020
Externally publishedYes

Cite this