Ataei Nezhad Maryam, Barati Hamid, Barati Ali
Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran.
J Grid Comput. 2022;20(3):29. doi: 10.1007/s10723-022-09619-w. Epub 2022 Aug 15.
Internet of Things (IoT) means connecting different devices through the Internet. The Internet of things enables humans to remotely manage and control the objects they use with the Internet infrastructure. After the advent of the Internet of Things in homes, organizations, and private companies, privacy and information security are the biggest concern. This issue has challenged the spread of the Internet of things as news of the user's theft of information by hackers intensified. The proposed method in this paper consists of three phases. In the first phase, a star structure is constructed within each cluster, and a unique key is shared between each child and parent to encrypt and secure subsequent communications. The second phase is for intra-cluster communications, in which members of the cluster send their data to the cluster head in a multi-hop manner. Also, in this phase, the data is encrypted with different keys in each hop, and at the end of each connection, the keys are updated to ensure data security. The third phase is to improve the security of inter-cluster communications using an authentication protocol. In this way, the cluster heads are authenticated before sending information to prevent malicious nodes in the network. The proposed method is also simulated using NS2 software. The results showed that the proposed method has improved in terms of energy consumption, end-to-end delay, flexibility, packet delivery rate, and the number of alive nodes compared to other methods.
物联网(IoT)意味着通过互联网连接不同的设备。物联网使人类能够利用互联网基础设施远程管理和控制他们所使用的物体。在家庭、组织和私人公司中物联网出现后,隐私和信息安全成为最大的担忧。随着黑客窃取用户信息的新闻增多,这个问题对物联网的普及构成了挑战。本文提出的方法包括三个阶段。在第一阶段,在每个簇内构建一个星型结构,每个子节点和父节点之间共享一个唯一的密钥,以加密和保护后续通信。第二阶段用于簇内通信,其中簇成员以多跳方式将其数据发送到簇头。此外,在这个阶段,每一跳的数据都用不同的密钥加密,并且在每个连接结束时更新密钥以确保数据安全。第三阶段是使用认证协议提高簇间通信的安全性。通过这种方式,在发送信息之前对簇头进行认证,以防止网络中的恶意节点。所提出的方法还使用NS2软件进行了模拟。结果表明,与其他方法相比,所提出的方法在能耗、端到端延迟、灵活性、数据包交付率和存活节点数量方面都有改进。