1. An Opportunistic Approach for Cloud Service-Based IoT Routing Framework Administering Data, Transaction, and Identity Security
- Author
-
Lewis Nkenyereye, Deepak Kumar Sharma, Riyanshi Gupta, Nitin Gupta, Kartik Krishna Bhardwaj, and Siddhant Banyal
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Process (engineering) ,Data security ,Cloud computing ,Encryption ,Critical infrastructure ,Computer Science Applications ,Hardware and Architecture ,Signal Processing ,Routing (electronic design automation) ,business ,Resilience (network) ,Database transaction ,Information Systems ,Computer network - Abstract
There has been an asymmetric shift towards harnessing cloud-based technologies as the world focuses on shifting operations remotely. Data security for remote operations is crucial for the protection and preservation of critical infrastructure. Furthermore, there has been an emerging trend to integrate IoT based devices with the expanding cloud infrastructure. In this work, mobile cloudbased infrastructure is considered where contact opportunities are developed in an opportunistic manner so as to facilitate efficient data forwarding and secure process handling. A probabilistic framework is proposed that facilitates data routing between the nodes and local cloud in an IoT network coupled with a multi-tier trust and encryption scheme for secure data delivery in the cloudbased IoT network. The proposed scheme is evaluated with simulations over two datasets against attack resilience and routing efficiency-based performance metrics, comparing to standard protocols like PRoPHET, MaxProp, ProWait and TCAFE, which displays the enhancement in operations of Sec-CIoT.
- Published
- 2022