Abstract

Today, with increasing information technology such as the Internet of Things (IoT) in human life, interconnection and routing protocols need to find optimal solution for safe data transformation with various smart devices. Therefore, it is necessary to provide an enhanced solution to address routing issues with respect to new interconnection methodologies such as the 6LoWPAN protocol. The artificial neural network (ANN) is based on the structure of intelligent systems as a branch of machine interference, has shown magnificent results in previous studies to optimize security-aware routing protocols. In addition, IoT devices generate large amounts of data with variety and accuracy. Therefore, higher performance and better data handling can be achieved when this technology incorporates data for sending and receiving nodes in the environment. Therefore, this study presents a security-aware routing mechanism for IoT technologies. In addition, a comparative analysis of the relationship between previous approaches discusses with quality of service (QoS) factors such as throughput and accuracy for improving routing mechanism. Experimental results show that the use of time-division multiple access (TDMA) method to schedule the sending and receiving of data and the use of the 6LoWPAN protocol when routing the sending and receiving of data can carry out attacks with high accuracy.

1. Introduction

The world of information technology and computers is expanding daily. This development has led to the creation of new systems with a specific type of communication [1, 2]. One of these connections is machine to machine. This type of communication is a solution to move, from single-purpose devices that data in the form of commands obtained from an application in the network to the Internet of Things (IoT) that allows the device to be multipurpose and applications to collaborate. Machine-to-machine communication with network structures can benefit from global standardization efforts [35]. Admittedly, the network-to-machine communication facilitation network has changed dramatically and its capabilities have greatly expanded, but machine-to-machine architectural solutions have remained relatively stable [6].

One of the most important parts of the Internet is bandwidth, which needs to be used to access objects connected to the Internet easily and quickly [7, 8]. When a packet is sent by a sender, some quality of service (QoS) factors such as response time, throughput, security, energy consumption, latency, and accuracy will be evaluated to show efficiency of the optimized routing protocol. Of course, considering the position and distance of objects is also very important. Today, by increasing intelligent attacks and anomaly behaviors, routing protocols should be aware on security and privacy conditions by using intrusion detection mechanisms. To improve security and throughput, it is necessary to have precise timing in the routing to avoid congestion. For this purpose, in the proposed method of this research, the TDMA protocol is used [9, 10], which can schedule. In this protocol, in the decision management section, the route operations are performed well and with high speed. After that, the bandwidth must be improved to ensure the security of the IoT environment. For this purpose, a protocol called 6LoWPAN will be used, which can improve bandwidth along with ensuring security [11]. But because its execution speed is slow and can affect security and even bandwidth access, it creates an optimization domain that is considered a search environment [12]. Therefore, the artificial neural network (ANN) algorithm will be used chaotically to optimize bandwidth and increase security in intrusion detection method and solve connection problems between objects in the IoT environment, which will be promoted as a new idea in this research. One of the attacks that can be imagined in this research, and its main purpose is to identify it, is a flood attack on the IoT [13].

The main contribution of this study is organized as follows: (i)Proposing a scheduling protocol TDMA in the routing process with the lowest energy consumption(ii)Using the 6LoWPAN protocol and optimizing it to increase bandwidth and improve packet lost ratio in the IoT environment(iii)Applying ANN-based machine learning method to enhance the data transmission routing(iv)Evaluating performance of the proposed method and it is compared with recent developed methods

The rest of this paper is organized as follows: Section 2 present a literature review on recent routing mechanisms in IoT environments. Section 3 proposed a security-aware routing protocol with respect to an enhanced ANN method. Section 4 shows experimental results based on simulation results. Finally, Section 5 shows conclusion and future work.

This section illustrates a brief literature review on recent routing mechanisms using metahueristic algorithms. For example, authors in [14] offered a blockchain-SDN-based assigned design for intelligent cities with network function virtualization. Furthermore, the authors introduced an energy-optimized group leader determination algorithm that introduces to choose a group leader in an effective method. Besides, the SDN controller controls and supervises the actions of the IoT devices. In this paper, blockchain is applied to identify and overcome the cyberattacks in the IoT systems. The test outcome revealed that the proposed design works better rather than the current structure in terms of throughput, time, gas consumption, and communication overhead.

Authors in [15] reviewed energy control progresses in IoT based on an SLR style. 30 research studies were determined as the principal field of technical study. For analyzing existing issues on the energy control resolutions in IoT, a taxonomy was introduced to explain the technical features of each section of energy control. It is mentioned that a class of published research articles with 7 studies in the intelligent home have the largest percentage. Furthermore, energy control on intelligent collection, intelligent cities, and the intelligent building has been studied with 15 papers individually. Finally, smart grid and industry circumstances have 8 research studies in IoT networks.

Authors in [16] suggested a unique method for RPL protocol trying to develop the IoT network lifetime. The suggested method combined the consumed and recharged energy to choose the most suitable route to send data information. Simulation results showed that the proposed method efficiently reduced the energy loss and the network lifetime by choosing the best routes via the sink.

Authors in [17] introduced an innovative routing protocol that is suitable for mobile ad hoc networks, in particular, to be aware of node movement and link resistance. To this goal, a different movement discovery design was offered to provide any node to set a new metric based on the renewed movement factor. Therefore, each node in the networks can change its routing function based on the network requirements around it; consequently, the applied routing protocol can improve the packet delivery ratio compared to existing routing methods.

Authors in [18] proposed a framework based on machine learning techniques and artificial neural networks for identifying the RPL attacks in some case studies. The efficiency of the proposed framework is improved to the highest potential amount. The implementation outcomes revealed that the malicious node for the attack provides the highest amount of packets between all the nodes in the network. Consequently, it increases the energy usage of neighbors.

Authors in [19] suggested a method for determining congestion problems in IoT networks by offering the use of fuzzy logic. The difficulty of parent choice is formed and then solved applying the fuzzy weighted sum procedure. The suggested algorithm is dynamic and recognized the congestion and then chose the noncongested path by choosing the most suitable path in the network topology. The achieved outcomes from the Cooja simulator proved that the proposed algorithm has decreased delay and improved performance and more efficient use of network resources.

Authors in [20] presented a new method based on priority and energy usage to manage routing procedures within contents for low-power and lossy networks. All network slots apply timing models when transferring data to the target while analyzing network transfer, audio, and image information. This technique improved the robustness of the routing protocol and was eventually avoided from occurring congestion, too. Test results confirmed that the proposed method decreased overhead on the mesh, delay, and energy waste.

Authors in other recent works [21, 22] have applied heuristic algorithms to solve routing problem in IoT environments. Some of them check packet duration time and energy efficiency as well.

3. Proposed Security-Aware Routing Method

This section illustrates a new security-aware routing mechanism based on ANN prediction approach in IoT. One of the most important problems in establishing the IoT [23] with an energy-aware recognition approach is that nodes have no information about each other’s performance [24]. The only information they receive from a primary source is authentic packets that are all broadcasted by the device or object itself and are not trusted under internal attacks. For this purpose, the packet find index (PFI) is expressed as [25]

The value is obtained from [26]

The PFI factor is calculated in the TDMA method with respect to applying the QoS factors. According to Equation (2), is the number of packets properly routed by node next step in the IoT environment and is the total number of packets routed from node to the next step in the IoT environment. Using this relation, each node can obtain the packet find index for its next step nodes and calculates the packet find index of the path according to [27]

After calculating the packet find index, each node calculates the path find index and then selects the path that has the best index to guide the data packets from the paths provided by the next step nodes. In this way, it removes malicious nodes from the closed path [28].

Figure 1 illustrates a brief procedure of the ANN strategy for a routing protocol using TDMA with respect to supporting QoS factors. In first step, each nominated IoT node should be checked as a cluster node. If the respected IoT node is cluster node, then the ANN method is applied to train and test procedure. The ANN method sets initial parameters for training layers and divides the dataset into two, train and test datasets. For each classification procedure, the TDMA factors are applied to check with classification method. Finally, the existing TDMA schedule is applied to the train test case [29]. On the other hand, if the IoT node is not a cluster node, system updates cluster list and the ANN method is applied to continue train procedure. For finalizing the proposed algorithm, each train set should archived convergence factor. If the algorithm has a convergence value, then the classification procedure will be finished. Otherwise, the system sends a message to check cluster node selection.

To calculate the PFI [30], after calculating the PFI of each parent [31], each node adds it to the value received from the parent and distributes it to all other nodes to determine the closed conduction index of each path. Node then selects the path with the least possible value from the provided paths, and in this way, the malicious node , which is a gray holes node that bypasses 50% of the packets, causing routing loss and loss. Energy will be removed from the data transmission path. It is important to note that these values are moved by the control packets, and all nodes are aware of them [32]. The goal of the PFI is to obtain routes with higher delivery rates so that malicious nodes can be removed from the packet routing path to provide the correct routing in the IoT environment. PFI is expressed as the number of transfers required to reach a destination pack. This index can be used as a metric (unit of measurement) in the initial deployment of the Internet of Things and to identify paths that have malicious black holes or gray holes nodes [33]. But this metric also has its limitations and problems. This index is introduced on the path, and the nodes should calculate the value of the path packet guidance index after calculating their parent packet guidance index and inform these nodes about these values, which is done with the help of control packets. For this purpose, to compare the metric of the closed conduction index with the expected number of transfers, with the help of simulation in MATLAB environment, these two metrics have been implemented on the processing environment. Because the IoT does not have proper routing and delivery operations and its problems were mentioned in previous sections, especially in the issue of security in intrusion detection method, this secure establishment of the IoT due to the presence of appendages such as black holes and gray holes and in general security issues remain almost unresolved. Bandwidth and security are also important during deployment in the intrusion detection method [34].

It is assumed that the target monitoring area in the IoT called is a two-dimensional environment, and moving nodes are randomly placed in the environment as . The th position of the node is determined as a set , and the Euclidean distance between the th node and the point is determined according to [35]

The node detection model is divided into two methods of binary-based detection and probabilistic detection. This research is based on the binary mode, which is simpler to use and less computationally complex. The reason for using binary node detection, in addition to simplicity in application and less computational complexity, is the simplicity of its modeling, and also each time execution will not be a possible answer and the answer is guaranteed. Node detection is used probabilistically in other networks such as automotive wireless networks and underwater wireless sensor networks. The node detection model is calculated binary-based as [36]

In this research, several evaluation methods have been used which include throughput and the accuracy criteria. At the beginning, each study is completed, and finally, the results obtained from the research performed by each evaluation method are mentioned.

The secure deployment of the IoT was completely modeled on security issues in this section with a security-aware routing mechanism. Based on this mechanism, data transmission through the network, data confidentiality, accuracy, information integrity, accessibility, and attack detection were considered and a new and optimal model with knowledge of security issues was considered. In the next section, a simulation of the proposed approach will be performed and the results will be discussed [37].

4. Experimental Results and Discussion

In the previous section, new modeling was done to provide a way to ensure security of the intrusion detection method the IoT. Of course, any idea will need a simulation. In this section, the experimental results are performed in the MATLAB environment and fully mentioned and analyzed the results based on the intrusion detection method. A test case comparison is made between the available methods to ensure that the proposed approach is effective.

In this study, which is based on attacks that are supposed to improve the level of security to be able to measure the QoS, attacks on deprivation of services have been used. Hence, the DoS2017 dataset is used https://www.unb.ca/cic/datasets/dos-dataset.html, and the TDMA protocol should first be considered during routing after nodes are placed in the environment to schedule and reduce energy with the 6LoWPAN protocol [38]. In the following, the proposed approach detects attacks of deprivation of services in the context of the Internet of Things, and finally, the criteria of service quality and energy consumption are examined. Based on the analysis of the proposed approach in sending and receiving data and the proposed mechanism, it is important to examine the degree of accuracy criteria that detect attacks for security. The number of repetitions of the program is 5000, 10000, and 15000 rounds. Also, the number of features in each round is 30, 50, and 80 repetition and the number of IoT devices are including 20, 50, and 100. The storage of sent and received data in the IoT environment is placed in an intelligent and impenetrable database called a transmission rate. The initial parameters of each test case of security analysis results are presented in Table 1.

After examining all case studies with respect to detecting attacks, QoS factors are reviewed. Figures 24 show the throughput after applying the proposed mechanism for case study 1, 2, and 3 to the IoT environment.

The throughput is achieved according to the transmitted packets. The throughput obtained by proposed method is compared with existing algorithms, and the comparison results regression and KNN algorithms [39, 40]. The throughput of proposed method is found better than the other existing algorithms. Recently developed regression also obtained almost similar performance; however, it fails to attain an effective result on accuracy due to this and the throughput also gets reduced. It is observable that the ANN method with respect to the TDMA factors has optimized throughput value than other regression and the KNN algorithms in test cases 1, 2, and 3.

In the following, we examine the data accuracy in each case study. If the environment is secure, the data is encrypted in the transmitter and data can predicted with the proposed ANN approach with high accuracy. Figures 57 show the accuracy diagram of the proposed method in blue line with number of IoT devices in which it has higher accuracy than the previous two methods in case study 1, 2, and 3, respectively. Totally, we conclude that the proposed method has maximum accuracy factor for each test cases 1, 2, and 3 to compare other regression and KNN algorithms.

The proposed method has achieved better accuracy which is found higher than the other existing algorithms with respect to number of IoT nodes and number of features.

5. Conclusion

In order to solve the problem of security-aware routing protocol in IoT environments, the ANN algorithm and TDMA protocol are given by studying the connectivity of network topologies. The method proposes an efficient routing protocol based on the 6LoWPAN strategy. First, we analyze the relationship between nodes and explain the scheduling packets and through modularization. Experimental results showed that the proposed method is compared with regression and KNN algorithms for simulation environments. The results show that the proposed method can effectively improve the accuracy ratio and enhance throughput factor. The research on the relevant theories and technologies of IoT has important value for the routing algorithms in the future 5G era as future work. Also, some evaluation metrics such as mean square error (MSE), time complexity, and packet loss with large amount of IoT nodes can be evaluated and analyzed in future research directions.

Data Availability

The CIC DoS dataset (2017) used to support the findings of this study are included at the following web page: https://www.unb.ca/cic/datasets/dos-dataset.html.

Conflicts of Interest

The authors declare that they have no conflicts of interest.