Framework for Secure Routing Towards Identifying and Resisting Complex Malicious Threats in IoT Ecosystem
Ayasha M1, Savitha Devi M2

1Ayasha M*, Assistant Professor, Department of Computer Science, MGR College, Hosure, Dist- Krishnagiri, Tamil Nadu, India.
2Dr. Savitha Devi M**, Assistant Professor & HoD, Department of Computer Science, Periyar University Constituent College of Arts & Science Harur, Dist- Dharmapuri, Tamil Nadu, India.

Manuscript received on November 13, 2019. | Revised Manuscript received on 24 November, 2019. | Manuscript published on December 10, 2019. | PP: 2694-2700 | Volume-9 Issue-2, December 2019. | Retrieval Number: B7465129219/2019©BEIESP | DOI: 10.35940/ijitee.B7465.129219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Internet-of-Things (IoT) is an inevitable domain of technology that is going to capture the connectivity of the majority of the smart devices in the coming days supported by huge advancement in mobile computing. However, IoT still suffers serious security issues when it comes to performing extensive communication over a broad range of heterogeneous devices. A review of existing secure routing schemes shows that they are complex in operation overlooking the communication performance and resource-constrained factors. Therefore, the proposed system introduces a very novel, simple, and cost-effective, secure routing scheme that is not only capable of identifying the threats without any apriority information of adversary, but they are equally capable of isolating the threats from the connectivity of regular IoT nodes. The simulated outcome of the proposed system shows that it offers a better solution towards security in contrast to existing security approaches frequently exercised in IoT at present. 
Keywords: Internet-of-Things, Security, Attack, Routing, Control message.
Scope of the Article: Internet of Things