A trust management scheme to secure mobile information centric networks

Geetanjali Rathee, Ashutosh Sharma, Rajiv Kumar, Farhan Ahmad, Razi Iqbal

Research output: Contribution to journalArticlepeer-review

54 Citations (Scopus)
96 Downloads (Pure)

Abstract

The Named Data Networks (NDN) or Information Centric Networks (ICN) are being replaced by point-point procedures in order to ensure a reliable and efficient communication mechanism. The efficient benefits of ICN in terms of improved reliability, efficiency and fast information delivery lifted it as a highly capable interconnected networking form for Internet infrastructure. Smart devices in Mobile Internet of Things (MIoT) and ICN contribute towards exponential growth of technical firms by ensuring reliability, efficiency and availability. Though NDN architectures ensure a secure data communication, however, in order to gain their own benefits, the expert intruders may compromise routers (nodes) and their routing tables. Therefore, in order to ensure a secure communication through MIoT, any modification in stored data of these devices (routers) must be transparently reflected to remaining entities in the network. Recently, trust is proposed as an alternative security measure to secure content delivery within ICN. However, only few of these solutions focused on identifying the legitimacy of the devices. In this paper, we proposed a novel ICN approach to compute the legitimacy of MIoT devices/routers/nodes and routing paths information using trust based on a wide range of real-life parameters including energy consumption while transferring the data from source to destination, message delivery to preceding or succeeding nodes and distance among two devices to identify Denial of Service (DoS), Distributed Denial of Service (DDoS) or Man-in-The-Middle (MiTM) attacks. The proposed solution is evaluated rigorously over various networking parameters such as distance among the devices, energy consumption, information loss while transferring the data and so on. Further, the extensive simulation results of proposed mechanism leads to 94% efficiency in terms of better response time, lower authentication delays and request ratios from fake nodes.
Original languageEnglish
Pages (from-to)66-75
Number of pages10
JournalComputer Communications
Volume151
Early online date23 Dec 2019
DOIs
Publication statusPublished - Feb 2020
Externally publishedYes

Bibliographical note

NOTICE: this is the author’s version of a work that was accepted for publication in Computer Communications. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computer Communications, 151, (2020)
DOI: 10.1016/j.comcom.2019.12.024

© 2020, Elsevier. Licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International http://creativecommons.org/licenses/by-nc-nd/4.0/

Keywords

  • Information Centric Networks
  • IoT devices
  • Mobile Internet of Things
  • Named Data Networking
  • Trust model

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A trust management scheme to secure mobile information centric networks'. Together they form a unique fingerprint.

Cite this