2020
DOI: 10.1002/jnm.2845
|View full text |Cite
|
Sign up to set email alerts
|

Atom search sunflower optimization for trust‐based routing in internet of things

Abstract: Internet of Things (IoT) is a ubiquitous network that assists the system to monitor and organize the world by processing, collection, and analysis of produced data by IoT nodes. The IoT is susceptible to numerous attacks, wherein the sinkhole attack is the most destructive one, which affects the communication amongst network devices. The security of the IoT is affected due to the lack of dynamic network topology, centralized control, and network communications, so that the trust-based routing is important. The… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 31 publications
0
7
0
Order By: Relevance
“…[ 36 ] proposes a trust aware secure routing protocol to resist these attacks, in which each node calculates the comprehensive trust value of its neighbors based on the direct trust, the indirect trust, the volatility factor, and the residual energy. Reference [ 37 ] proposes an atomic search sunflower optimization method to provide trust based routing. The method is designed by combining sunflower optimization with atomic search optimization and uses multiple trust factors to identify and isolate attacks and optimize network performance.…”
Section: Common Applications Of Trustmentioning
confidence: 99%
“…[ 36 ] proposes a trust aware secure routing protocol to resist these attacks, in which each node calculates the comprehensive trust value of its neighbors based on the direct trust, the indirect trust, the volatility factor, and the residual energy. Reference [ 37 ] proposes an atomic search sunflower optimization method to provide trust based routing. The method is designed by combining sunflower optimization with atomic search optimization and uses multiple trust factors to identify and isolate attacks and optimize network performance.…”
Section: Common Applications Of Trustmentioning
confidence: 99%
“…Such an application can be observed from [9], wherein cryptographic techniques are used for trust establishment. The trust levels for this model can be extended via use of optimization models like the one mentioned in [10], wherein Atom search sunflower optimization (ASSO) is used. The model can improve trust levels to 84.5% and obtain packet delivery ratio in the range of 90% to 95%; thus, can be used for high security and high privacy applications.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Since then, the optimizer has been successfully applied in many different areas such as damage identification (Gomes & Simões, 2019; Gomes et al, 2020; Magacho et al, 2021; Gomes et al, 2020b; Gomes et al, 2020c), design optimization of isogrid tube (Francisco et al, 2021), heat pump solution for CHP system (Fan et al, 2020), IoT and Cloud tasks (Emami, 2021; Jadhav & Joshi, 2021), parameter identification of electrical photovoltaic model (Qais et al, 2019), battery state‐of‐charge estimation (El‐Sehiemy et al, 2020), enhancing the performance of an autonomous operation of a microgrid (Hussien et al, 2021), solving optimization problems (Duong & Nguyen, 2020) and many others.…”
Section: Introductionmentioning
confidence: 99%