Multi-hop Wireless Network (MWN) requires the existing of wireless nodes that communicate via a wireless channel. Thus, selecting optimal paths between the communicant nodes is a major challenge. Many researchers are focusing on this topic and proposed some routing protocols that help the nodes to learn multi-hop paths. Multi-hop wireless network is used for several types of applications, like military, medical care and national security. These applications are important and critical, so they require a certain level of performance and security during data communication. Securing the transmission of data in a multi-hop network is a challenge since the devices have limited resources like memory and battery. In this paper, we propose an optimal and secure routing protocol. The main goal of this proposal is to improve the performance and the security of such network by selecting a secure route between the source and its target destination. To secure data transmission phase, we propose to create a key shared between the source and the destination. Since the devices have limited energy, we propose to take into consideration the energy of the intermediate nodes of the selected route. Extensive simulations are performed using the Network Simulator (NS2) to validate the proposed protocol. This proposal is compared with the secured Ad-Hoc On-demand Distance Vector (SAODV) in terms of end-to-end delay, overhead and number of compromised devices.
The Internet of Things (IoT) has significantly altered our way of life. IoT is employed due to pressure from customers, authorities, and business partners. Although IoT opens up new possibilities, security is always a top priority when offering various services. It is particularly difficult to shield the information produced by IoT devices from security threats and to secure the exchange of this data as it passes through various nodes and gateways. Hence, group key management (GKM) is the essential method for controlling the deployment of keys for network access and safe data delivery in these kinds of dynamic situations. Nevertheless, the huge volume of IoT devices and the rising subscriber base presented a scalability difficulty unaddressed by the current authentication techniques based on GKM and devoted to the IoT. Moreover, all of the GKM models that are currently in use enable the independence of participants. They only concentrate on dependent symmetrical group keys for each subgroup, which is ineffective for subscriptions with very dynamic behavior. To address these issues, a unique Decentralized Lightweight Group Key Management framework for Network Access in the IoT environment. REMI, a dependable and efficient multicast routing system for Internet of Things networks, is also introduced in this study. REMI employs a cluster-based routing protocol that causes a quicker multiplex message distribution within the system. According to the data, this protocol is more effective than cutting-edge protocols regarding the end-to-end delay, energy consumption, memory usage, and packet delivery ratio.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.