Smart City Gnosys

Smart city article details

Title Secure Multi-Hop Assisted Iot Communications In Smart Cities
ID_Doc 47659
Authors Awais Javed M.; Alkhathami M.; Almohimeed A.; Almujalli A.
Year 2024
Published IEEE Access, 12
DOI http://dx.doi.org/10.1109/ACCESS.2024.3438614
Abstract Security and reliability are the major requirements for the successful implementation of Internet of Things (IoT) applications in smart cities such as healthcare. IoT networks are subject to various types of network attacks that can put critical IoT data at risk. To mitigate these security issues, robust security algorithms based on Elliptic Curve Cryptography (ECC) may be utilized. However, using such cryptographic techniques requires additional delay for signing/encrypting and verification/decryption of the messages. Hence, there is a tradeoff between the security strength of the algorithm and packet delay. In this paper, we present a novel technique to adaptively select the key size of ECC-based algorithms for multi-hop IoT networks. The proposed technique uses k-means clustering to classify the secrecy rates of the potential relay nodes into k clusters. We allocate lower key sizes to the relay nodes that have the highest secrecy rates and thus have better physical layer security. The key sizes and security strengths are selected as per the recommendation of the National Institute of Standards and Technology (NIST). The second part of the work utilizes the Hungarian algorithm to select the best relay nodes for each source-destination transmission to minimize the total delay. The techniques are implemented in MATLAB and results show that the total delay of the proposed technique is improved by 57% as compared to other techniques in the literature.
Author Keywords IoT; network delay; security; smart cities


Similar Articles


Id Similarity Authors Title Published
2150 View0.874Alatawi M.N.A Hybrid Cryptographic Cipher Solution For Secure Communication In Smart CitiesInternational Journal of Computer Networks and Applications, 10, 5 (2023)
38416 View0.874Alsaraira A.; Alabed S.; Saraereh O.Multi-Stage Cryptography Technique For Wireless NetworksTelkomnika (Telecommunication Computing Electronics and Control), 22, 3 (2024)
35543 View0.872Arunkumar J.R.; Velmurugan S.; Chinnaiah B.; Charulatha G.; Prabhu M.R.; Chakkaravarthy A.P.Logistic Regression With Elliptical Curve Cryptography To Establish Secure IotComputer Systems Science and Engineering, 45, 3 (2023)
35256 View0.87Rana M.; Mamun Q.; Islam R.Lightweight Cryptography In Iot Networks: A SurveyFuture Generation Computer Systems, 129 (2022)
12521 View0.866Lv Y.; Su D.Blockchain Security Technology Based On The Asynchronous Transmission Mode Of Iot Technology In Smart CitiesWireless Personal Communications, 126, 3 (2022)
35244 View0.864Khalique A.; Siddiqui F.; Ahad M.A.; Hussain I.Lightweight Authentication For Iot Devices (Laid) In Sustainable Smart CitiesScientific Reports, 15, 1 (2025)
35254 View0.864Rajesh S.M.; Prabha R.Lightweight Cryptographic Approach To Address The Security Issues In Intelligent Applications: A SurveyIDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things, Proceedings (2023)
40274 View0.862Padmaa M.; Jayasankar T.; Venkatraman S.; Dutta A.K.; Gupta D.; Shamshirband S.; Rodrigues J.J.P.C.Oppositional Chaos Game Optimization Based Clustering With Trust Based Data Transmission Protocol For Intelligent Iot Edge SystemsJournal of Parallel and Distributed Computing, 164 (2022)
9105 View0.86David V.; Ragu H.; Nikhil V.; Sasikumar P.Analysis Of Algorithms For Effective Cryptography For Enhancement Of Iot SecurityLecture Notes in Networks and Systems, 396 (2023)
1104 View0.857Abdullah Z.; Chen G.; Chambers J.A.A Cooperative Jamming Scheme For Physical Layer Security Enhancement In Multihop Iot Networks With Colluding EavesdroppersIEEE Workshop on Statistical Signal Processing Proceedings, 2021-July (2021)