Device-to-Device (D2D) Multi-Criteria Learning Algorithm Using Secured Sensors
Abstract
:1. Introduction
- D2D authentication algorithm is developed for a mobile network to ensure the authenticity and trustworthiness between partial and fully-connected nodes.
- Using a multi-criteria process, the reinforcement learning technique is applied and the network system is trained using realistic conditions. The proposed algorithm offers the selection of optimal neighbors using the computation of rank value that is comprised of energy, speed, link cost, and radio coverage. Accordingly, it reduces the sizes of routing tables and avoids excessive routing intervals.
- Moreover, the proposed algorithm protects devices and attains uncompromised data against security attacks.
- The simulations are performed to verify the improvement of the proposed algorithm in the comparison of existing work.
2. Related Work
3. Proposed Multi-Criteria Learning Algorithm Using Secured Sensors
- The first component is D2D authentication and key distribution. It consists of mobile devices and is associated with the inline gateway for obtaining the secret keys. Additionally, gateways are directly associated with the sink node for forwarding the network information to data centers.
- Reinforcement learning is executed in the second component by fetching the nodes’ statistics from the constructed forwarding tables along with information of packets’ reception. The forwarding tables are updated iteratively, thus the proposed algorithm converges the desired outcomes optimally. Using the machine learning technique, the proposed algorithm imposes lower routing overhead on the constraint devices and informs about the latest information to mobile nodes by exploring network parameters.
- The third component is secured IoT communication and accomplishing sustainable routing with the support of a D2D session-oriented system. It provides authentic and verifiable sessions between devices, gateways, and sink nodes with low-security costs.
3.1. D2D Authentication with Multi-Criteria Reinforcement Learning
3.2. Secured Data Transmission Using a Secured Session-Oriented Scheme
Algorithm 1: Multi-criteria learning algorithm with secured devices. |
Input: SN: Sensor nodes RREQ: Route request |
ID: Identity |
K: Session key |
S: Sink node |
G: Gateway nodes |
Output: Authentic devices, Dynamic routes, R, Secure transmission, Sec |
1. for i = 1:N |
2. initiate Authen_service |
3. if Authen_service = True |
4. call keys_gen_process 5. else |
6. node is declared as faulty |
7. end for |
8. for j = 1:G |
9. if dist(j) closest to S |
10. mutual_authen service 11. encrypt(data, K) |
12. else 13. execute keys_gen_process 14. mutual_authen service 15. e = encrypt(data, K) |
16. end if |
17. end for 18. If destination == S 19. Recover K 20. decrypt(e, K) 21. end if |
4. Simulation Setup
Results and Discussion
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Khelifi, F. Monitoring System Based in Wireless Sensor Network for Precision Agriculture, in Internet of Things (IoT); Springer: Berlin/Heidelberg, Germany, 2020; pp. 461–472. [Google Scholar]
- Kumar, K.A.; Jayaraman, K. Irrigation control system-data gathering in WSN using IOT. Int. J. Commun. Syst. 2020, 33, e4563. [Google Scholar] [CrossRef]
- Gharaei, N.Y.D.; Al-Otaibi, S.A.; Butt, G.; Sahar; Rahim, S. Energy-efficient and coverage-guaranteed unequal-sized clustering for wireless sensor networks. IEEE Access 2019, 7, 157883–157891. [Google Scholar] [CrossRef]
- Sharma, A.; Jain, A.; Gupta, P.; Chowdary, V. Machine learning applications for precision agriculture: A comprehensive review. IEEE Access 2020, 2020, 4843–4873. [Google Scholar] [CrossRef]
- Haseeb, K.; Saba, T.; Rehman, A.; Ahmed, I.; Lloret, J. Efficient data uncertainty management for health industrial internet of things using machine learning. Int. J. Commun. Syst. 2021, 34, e4948. [Google Scholar] [CrossRef]
- Abbasi, Z.A.; Islam, N.; Shaikh, Z.A. A review of wireless sensors and networks’ applications in agriculture. Comput. Stand. Interfaces 2014, 36, 263–270. [Google Scholar]
- Malik, N.N.; Alosaimi, W.; Uddin, M.I.; Alouffi, B.; Alyami, H. Wireless Sensor Network Applications in Healthcare and Precision Agriculture. J. Health Eng. 2020, 2020, 8836613. [Google Scholar] [CrossRef]
- Saba, T.; Haseeb, K.; Din, I.U.; Almogren, A.; Altameem, A.; Fati, S.M. EGCIR: Energy-Aware Graph Clustering and Intelligent Routing Using Supervised System in Wireless Sensor Networks. Energies 2020, 13, 4072. [Google Scholar] [CrossRef]
- Rahman, G.M.; Wahid, K.A. LDAP: Lightweight Dynamic Auto-Reconfigurable Protocol in an IoT-Enabled WSN for Wide-Area Remote Monitoring. Remote Sens. 2020, 12, 3131. [Google Scholar] [CrossRef]
- Saba, T.; Haseeb, K.; Shah, A.A.; Rehman, A.; Tariq, U.; Mehmood, Z. A Machine-Learning-Based Approach for Autonomous IoT Security. IT Prof. 2021, 23, 69–75. [Google Scholar] [CrossRef]
- Mazzia, V.; Comba, L.; Khaliq, A.; Chiaberge, M.; Gay, P. UAV and machine learning based refinement of a satellite-driven vegetation index for precision agriculture. Sensors 2020, 20, 2530. [Google Scholar] [CrossRef]
- Liakos, G.K.; Busato, P.; Moshou, D.; Pearson, S.; Bochtis, D. Machine learning in agriculture: A review. Sensors 2018, 18, 2674. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Haseeb, K.; Din, I.U.; Almogren, A.; Islam, N. An Energy Efficient and Secure IoT-Based WSN Framework: An Application to Smart Agriculture. Sensors 2020, 20, 2081. [Google Scholar] [CrossRef] [PubMed]
- Song, J.; Zhong, Q.; Wang, W.; Su, C.; Tan, Z.; Liu, Y. FPDP: Flexible privacy-preserving data publishing scheme for smart agriculture. IEEE Sens. J. 2020, 21, 17430–17438. [Google Scholar] [CrossRef]
- De Araujo Zanella, A.R.; da Silva, E.; Albini, L.C.P. Security challenges to smart agriculture: Current state, key issues, and future directions. Array 2020, 8, 100048. [Google Scholar] [CrossRef]
- Ali, R.; Pal, A.K.; Kumari, S.; Karuppiah, M.; Conti, M. A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Future Gener. Comput. Syst. 2018, 84, 200–215. [Google Scholar] [CrossRef]
- Banerjee, A.; Mitra, A.; Biswas, A. Wiley Online Library. Available online: https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119769231.ch9 (accessed on 10 December 2021).
- Haseeb, K.; Islam, N.; Saba, T.; Rehman, A.; Mehmood, Z. LSDAR: A Light-weight Structure based Data Aggregation Routing Protocol with Secure Internet of Things Integrated Next-generation Sensor Networks. Sustain. Cities Soc. 2019, 101995. [Google Scholar] [CrossRef]
- Rehman, A.; Haseeb, K.; Saba, T.; Kolivand, H. M-SMDM: A model of security measures using Green Internet of Things with Cloud Integrated Data Management for Smart Cities. Environ. Technol. Innov. 2021, 24, 101802. [Google Scholar] [CrossRef]
- Shafique, K.; Khawaja, B.A.; Sabir, F.; Qazi, S.; Mustaqim, M. Internet of things (IoT) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5G-IoT scenarios. IEEE Access 2020, 8, 23022–23040. [Google Scholar] [CrossRef]
- Garcia, M.; Bri, D.; Sendra, R.; Lloret, J. Available online: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.681.7101 (accessed on 10 December 2021).
- Agrawal, H.; Dhall, R.; Iyer, K.; Chetlapalli, V. An improved energy efficient system for IoT enabled precision agriculture. J. Ambient. Intell. Humaniz. Comput. 2020, 11, 2337–2348. [Google Scholar] [CrossRef]
- Maurya, S.; Jain, V.K. Fuzzy based energy efficient sensor network protocol for precision agriculture. Comput. Electron. Agric. 2016, 130, 20–37. [Google Scholar] [CrossRef]
- Agarkhed, J.; Dattatraya, P.Y.; Patil, S. Precision agriculture with cluster-based optimal routing in wireless sensor network. Int. J. Commun. Syst. 2021, 34, e4800. [Google Scholar] [CrossRef]
- Lu, J.; Hu, K.; Yang, X.; Hu, C.; Wang, T. A cluster-tree-based energy-efficient routing protocol for wireless sensor networks with a mobile sink. J. Supercomput. 2021, 77, 6078–6104. [Google Scholar] [CrossRef]
- Guo, X.; Lin, H.; Li, Z.; Peng, M. Deep-reinforcement-learning-based QoS-aware secure routing for SDN-IoT. IEEE Internet Things J. 2019, 7, 6242–6251. [Google Scholar] [CrossRef]
- Savaglio, C.; Pace, P.; Aloi, G.; Liotta, A.; Fortino, G. Lightweight reinforcement learning for energy efficient communications in wireless sensor networks. IEEE Access 2019, 7, 29355–29364. [Google Scholar] [CrossRef]
- Gharaei, N.; Malebary, S.J.; Bakar, K.A.; Hashim, S.Z.M.; Butt, S.A.; Sahar, G. Energy-efficient mobile-sink sojourn location optimization scheme for consumer home networks. IEEE Access 2019, 7, 112079–112086. [Google Scholar] [CrossRef]
- Ullo, L.S.; Sinha, G. Advances in smart environment monitoring systems using IoT and sensors. Sensors 2020, 20, 3113. [Google Scholar] [CrossRef]
- Rehman, A.; Haseeb, K.; Fati, S.M.; Lloret, J.; Peñalver, L. Reliable Bidirectional Data Transfer Approach for the Internet of Secured Medical Things Using ZigBee Wireless Network. Appl. Sci. 2021, 11, 9947. [Google Scholar] [CrossRef]
- Mahdi, A.O.; Wahab, A.W.A.; Idris, M.Y.I.; Znaid, A.A.; Al-Mayouf, Y.R.B.; Khan, S. WDARS: A weighted data aggregation routing strategy with minimum link cost in event-driven WSNs. J. Sens. 2016, 2016, 1–12. [Google Scholar] [CrossRef] [Green Version]
- Sennan, S.; Balasubramaniyam, S.; Luhach, A.K.; Ramasubbareddy, S.; Chilamkurti, N.; Nam, Y. Energy and delay aware data aggregation in routing protocol for Internet of Things. Sensors 2019, 19, 5486. [Google Scholar] [CrossRef] [Green Version]
- Kaelbling, P.L.; Littman, M.L.; Moore, A.W. Reinforcement learning: A survey. J. Artif. Intell. Res. 1996, 4, 237–285. [Google Scholar] [CrossRef] [Green Version]
- Wang, J.; Gao, Y.; Liu, W.; Wu, W.; Lim, S.-J. An asynchronous clustering and mobile data gathering schema based on timer mechanism in wireless sensor networks. Comput. Mater. Contin. 2019, 58, 711–725. [Google Scholar] [CrossRef] [Green Version]
- Wang, J.; Gao, Y.; Liu, W.; Sangaiah, A.K.; Kim, H.-J. Energy efficient routing algorithm with mobile sink support for wireless sensor networks. Sensors 2019, 19, 1494. [Google Scholar] [CrossRef] [PubMed] [Green Version]
Comparative Approaches | Pros and Cons |
---|---|
Existing solutions | Most of the existing solutions have proposed for efficient utilization of energy consumption with constraint devices and improved the performance of data delivery. However, it is noticed that some solutions can tackle mobile devices at the cost of frequent data lost and overloaded wireless channels. Although machine learning techniques are explored by different researchers for IoT networks; however, it was seen that they overlooked security threats such as privacy, integrity, and authentication for mobile devices. Such a solution affects the reliability of smart cities and compromised communication system in the presence of unknown machines. |
Proposed D2D multi-criteria learning algorithm using secured sensors technologies | An algorithm is developed for smart cities using reinforcement learning techniques based on devices and packets’ reception information. It supports gathering real-time data by imposing security restrictions for mobile devices against malicious actions. Moreover, mobile devices are verified first, and afterward, they are allowed to be involved in the data-gathering phase. It also supports data encryption with a session-oriented function and leads to lightweight complexity for the mobile network. |
1 Byte | 1 Byte | 1 Byte | 2 Bytes | 1 Byte | 2 Bytes | 1 Byte |
Parameter | Value |
---|---|
Simulation area | 300 × 300 m |
Deployment | Random |
Propagation Model | Two Ray Ground |
Node speed | 5 m/s |
Pause time | 20 s |
Malicious nodes | 10 |
Simulations | 10 |
Regular nodes | 100–500 |
Initial energy | 5 j |
Transmission range | 10 m |
MAC layer | IEEE 802.11 b |
Mobility model | Random waypoint |
Simulation rounds | 500–2500 s |
Data traffic | CBR |
Security Attacks | Proposed Procedures |
---|---|
Device authentication | Unique ID Session keys |
Session key security | Encryption |
Verification | Decryption using symmetric key |
Confidentiality | Ciphered data using the session-oriented encryption |
Malicious nodes regenerate request packet for session key | ID and session key expire automatically |
Storage overload | Distributed data chunks and diffusion |
Connectivity loss | Reinforcement learning |
Additional resources’ consumption | Computing route rank |
Network load | Distributed forwarding |
Data originality | MAC, Digital hashes |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Haseeb, K.; Rehman, A.; Saba, T.; Bahaj, S.A.; Lloret, J. Device-to-Device (D2D) Multi-Criteria Learning Algorithm Using Secured Sensors. Sensors 2022, 22, 2115. https://doi.org/10.3390/s22062115
Haseeb K, Rehman A, Saba T, Bahaj SA, Lloret J. Device-to-Device (D2D) Multi-Criteria Learning Algorithm Using Secured Sensors. Sensors. 2022; 22(6):2115. https://doi.org/10.3390/s22062115
Chicago/Turabian StyleHaseeb, Khalid, Amjad Rehman, Tanzila Saba, Saeed Ali Bahaj, and Jaime Lloret. 2022. "Device-to-Device (D2D) Multi-Criteria Learning Algorithm Using Secured Sensors" Sensors 22, no. 6: 2115. https://doi.org/10.3390/s22062115
APA StyleHaseeb, K., Rehman, A., Saba, T., Bahaj, S. A., & Lloret, J. (2022). Device-to-Device (D2D) Multi-Criteria Learning Algorithm Using Secured Sensors. Sensors, 22(6), 2115. https://doi.org/10.3390/s22062115