TY - JOUR
T1 - A trust management scheme to secure mobile information centric networks
AU - Rathee, Geetanjali
AU - Sharma, Ashutosh
AU - Kumar, Rajiv
AU - Ahmad, Farhan
AU - Iqbal, Razi
N1 - Publisher Copyright:
© 2020 Elsevier B.V.
PY - 2020/2/1
Y1 - 2020/2/1
N2 - The Named Data Networks (NDN) or Information Centric Networks (ICN) are being replaced by point-point procedures in order to ensure a reliable and efficient communication mechanism. The efficient benefits of ICN in terms of improved reliability, efficiency and fast information delivery lifted it as a highly capable interconnected networking form for Internet infrastructure. Smart devices in Mobile Internet of Things (MIoT) and ICN contribute towards exponential growth of technical firms by ensuring reliability, efficiency and availability. Though NDN architectures ensure a secure data communication, however, in order to gain their own benefits, the expert intruders may compromise routers (nodes) and their routing tables. Therefore, in order to ensure a secure communication through MIoT, any modification in stored data of these devices (routers) must be transparently reflected to remaining entities in the network. Recently, trust is proposed as an alternative security measure to secure content delivery within ICN. However, only few of these solutions focused on identifying the legitimacy of the devices. In this paper, we proposed a novel ICN approach to compute the legitimacy of MIoT devices/routers/nodes and routing paths information using trust based on a wide range of real-life parameters including energy consumption while transferring the data from source to destination, message delivery to preceding or succeeding nodes and distance among two devices to identify Denial of Service (DoS), Distributed Denial of Service (DDoS) or Man-in-The-Middle (MiTM) attacks. The proposed solution is evaluated rigorously over various networking parameters such as distance among the devices, energy consumption, information loss while transferring the data and so on. Further, the extensive simulation results of proposed mechanism leads to 94% efficiency in terms of better response time, lower authentication delays and request ratios from fake nodes.
AB - The Named Data Networks (NDN) or Information Centric Networks (ICN) are being replaced by point-point procedures in order to ensure a reliable and efficient communication mechanism. The efficient benefits of ICN in terms of improved reliability, efficiency and fast information delivery lifted it as a highly capable interconnected networking form for Internet infrastructure. Smart devices in Mobile Internet of Things (MIoT) and ICN contribute towards exponential growth of technical firms by ensuring reliability, efficiency and availability. Though NDN architectures ensure a secure data communication, however, in order to gain their own benefits, the expert intruders may compromise routers (nodes) and their routing tables. Therefore, in order to ensure a secure communication through MIoT, any modification in stored data of these devices (routers) must be transparently reflected to remaining entities in the network. Recently, trust is proposed as an alternative security measure to secure content delivery within ICN. However, only few of these solutions focused on identifying the legitimacy of the devices. In this paper, we proposed a novel ICN approach to compute the legitimacy of MIoT devices/routers/nodes and routing paths information using trust based on a wide range of real-life parameters including energy consumption while transferring the data from source to destination, message delivery to preceding or succeeding nodes and distance among two devices to identify Denial of Service (DoS), Distributed Denial of Service (DDoS) or Man-in-The-Middle (MiTM) attacks. The proposed solution is evaluated rigorously over various networking parameters such as distance among the devices, energy consumption, information loss while transferring the data and so on. Further, the extensive simulation results of proposed mechanism leads to 94% efficiency in terms of better response time, lower authentication delays and request ratios from fake nodes.
KW - Information Centric Networks
KW - IoT devices
KW - Mobile Internet of Things
KW - Named Data Networking
KW - Trust model
UR - http://www.scopus.com/inward/record.url?scp=85078083775&partnerID=8YFLogxK
U2 - 10.1016/j.comcom.2019.12.024
DO - 10.1016/j.comcom.2019.12.024
M3 - Article
AN - SCOPUS:85078083775
VL - 151
SP - 66
EP - 75
JO - Computer Communications
JF - Computer Communications
SN - 0140-3664
ER -