Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

An Efficient Secure Cryptography Scheme for New ML-based RPL Routing Protocol in Mobile IoT Environment

google+
Views: 46                 

Author :  Kishore Golla

Affiliation :  Andhra University

Country :  India

Category :  Software Engineering & Security

Volume, Issue, Month, Year :  14, 2, March, 2022

Abstract :


Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.

Keyword :  ECC, security, Optimal path, Routing, Reinforcement learning

URL :  https://aircconline.com/ijnsa/V14N2/14222ijnsa01.pdf

User Name : Brendon Clarke
Posted 06-04-2022 on 14:50:05 AEDT



Related Research Work

  • Attack Graph-based Risk Assessment And Optimisation Approach
  • Context-aware Security Mechanism For Mobile Cloud Computing
  • Blockchain Security : Enhanced Control Evaluation Approach To Protect Organizations’ Accounting Information
  • Detecting Malware In Portable Executable Files Using Machine Learning Approach

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals