Research Article

Optimized Scheme to Secure IoT Systems Based on Sharing Secret in Multipath Protocol

Algorithm 1

Initialization steps.
(i)Step 1: source node S marks n paths to the destination D. Let be the set of paths between S and D.
ā€‰The value of n varies from one node to another according to the neighborhood of each node.
(ii)Step 2: S divides the message M using Shamir secret sharing scheme to n fragments
(iii)Step 3: the source then chooses one threshold k of the Shamir method ,
ā€‰k also varies according to n and the number of the node-disjoint paths
(iv)Step 4: S encapsulates each fragment in a packet and then sends it in a path from .
(v)Step 5: the destination D receives r packets . Let be the set of paths where D received r packets.
(vi)Step 6: S receives r acknowledgments; let us suppose that a path is bidirectionally trusted/untrusted.