A Safe and Power-Proficient Data Transmission Framework for the Internet of Things

Main Article Content

K. Pradeepa, M. Parveen

Abstract

                The idea of the Internet of Things (IoT) has recently received much attention from businesses and academics. In the IoT, a base station receives data from millions of sensor devices and processes it before using it to build various smart systems, such as the smart grid, smart city, and smart healthcare. A secure link must be established between the base station and sensor devices to ensure the accuracy of the data gathered. The data analysis findings will be erroneous and cause more severe harm if the collected data is corrupt. Additionally, due to their extremely low-power computational processors, these IoT devices have a very low level of interactivity. These devices perceive their surroundings, produce data, and transfer it to the base station through intermediary devices. The data is delivered to the base station using some routing algorithms with the aim of low power consumption. Power efficiency should be considered a crucial performance metric when utilizing low-power IoT devices to create a routing algorithm. Therefore, this paper presented a safe and energy-efficient data transmission framework (SE-DTF) for IoT. This framework consists of three phases. The first phase is a public and secret key with a token sharing (IoT-PSKTS) algorithm, which is used to prevent key leakage in the IoT. The second phase focuses on low power consumption using the Hierarchical Fuzzy Logic Clustering (HFLC) algorithm and Minimum Power Consumption Routing (MPCR) algorithm. The third phase focuses on safe data transfer, employing two-tier cryptography with ciphertext shifting, token-based access control, and HMAC-SHA1 signature. The experimental findings demonstrate how securely the IoT-PSKTS algorithm can share a public and a secret key with a token. It also demonstrates that the MPCR with the HFLC algorithm outperforms existing algorithms regarding throughput, power utilization, and packet delivery ratio. Additionally, it demonstrates that the two-tier cryptography technique uses less energy and requires less computation time for encryption and decryption than other cryptography techniques.

Article Details

Section
Articles