SlideShare a Scribd company logo
International Journal of Innovation Engineering and Science Research
Open Access
Volume 2 Issue 3 May 2018 1 | P a g e
ABSTRACT
Probabilistic Polling System Approach for IoT
Secure Routing
Seyed Mahmood Hashemi
Beijing University of Technology
Beijing, CHINA
The Internet of things (IoT) affects on humans life deeply. There are traditional cyber threats and also new
threats. There is no guard and immunity for systems against the innumerable variance of attack and exploitation.
In this paper, an approach base on Polling System is presented for secure routing IoT devices. We use polling
system with probabilistic routing, so there is a probability to move from one queue to another. Probabilistic polling
system allows us to perform priority of stakeholders’ votes.
Keywords- Internet of Things; Secure Routing; Polling System
I. INTRODUCTION
The Internet of things (IoT) affects on humans life deeply [9]. Although the new IoT functionality of
smart devices causes to the better life for the human, there are traditional cyber threats and also new
threats. However there were many works on the IoT security, most of them were not Use-Centric. In
against of the previous works, the proposed approach is base on the interaction with users, so it is
User-Centric completely. In a broad view, we divide IoT networks into two categories: 1- consumer and
2- industrial. While we use IoT devices in a smart home, we emphasize on the smart point of the IoT
devices. In other words, the ideal point of IoT devices is communicated and adjusting to other physical
devices in the home. While a set of smart home devices has a particular behavior or need for special
decision making, we called them as user-centric IoT (UCIoT) [10].
There is no guard and immunity for systems against the innumerable variance of attack and
exploitation. Thus security mechanism has fought to keep with IoT. Intelligence is successful to detect
the intruder. IoT has the challenge to bridge physical with the cyber world [11]. Previous security
mechanisms must be adapted in order to maintain defensive expectation.
In this paper, an approach base on Polling System is presented for secure routing IoT devices. In the
classical view, Polling System is a set of one server and multiple queues. Clients are arrived and set
into queues and then get server according to a particular policy. (figure 1)
Seyed Mahmood Hashemi “International Journal of Innovation Engineering and Science Research”
Volume 2 Issue 3 May 2018 2 | P a g e
Fig. 1. Classical Polling System
The number of queues and also the capacity of queues are predefined. In the beginning, Polling
System is used for the time-sharing computer system, but now it is used to model wide variety
applications (computer communications, robotics, traffic and transportation, manufacturing, production,
mail distribution, etc.) [12, 13, 14]. In the time-sharing polling system, there are N terminals that are
connected to a central computer. The central computer visit terminals in turn and cyclic order. The size
of queues is finite and the arrival process is independent Poisson Process with parameter λi.
Several service policies are examined on the basic model of Polling System such as exhaustive, gated,
and limited-I policies. The server policy determines association server to clients. The basic Polling
model can be applied in different applications: Token Ring Networks; Robotic Systems; Various Non-
Generic Computers; Communication Systems. The common scheme for Polling System is a server
resource shared by multiple queues. The basic model of Polling System is cyclic polling model. In the
next step, the fixed polling order is replaced with random polling order. The important measure of the
performance of Polling System is Response Time [15, 16]. In the Polling System with probabilistic
routing, when the client in queue i is serviced, it is routed to queue j with probabilitypi,j.
In this paper, we use polling system with probabilistic routing. Polling system provides a platform for
security voting of all stakeholders. In the other side, probabilistic routing establishes priority approach.
Therefore the presented approach can be used in the organization with employees by different priority.
This paper is organized as follow: section 2 is the study of related works; section 3 explains proposal
algorithm, finally, section 4 is the conclusion.
II. RELATED WORKS
Akatyev et. Al. assume heterogeneous IoT devices. they use data flow diagram to represent the
dependencies between users and information [1, 20]. In [2, 21, 22], In this survey, authors categorize
IoT security issues into three groups: 1- low-level security issues; 2- intermediate-level security issues
and high-level security issues and then study about security mechanism for each of them. Coulter et.
al. research in current intrusion detection approaches from an intelligence perspective.
Levy et. al.define different types of polling systems [4, 23, 24]. Time-sharing polling system, there are N
terminals that are connected to a central computer. The central computer visit terminals in turn and
cyclic order. The size of queues is finite and the arrival process is independent Poisson Process with
parameter λi. In [5], Authors use a M/M/1 queue to model the traffic of the network. Yang et. al.
propose an approach to estimate the mean queue length, mean cycle time and throughout for two-
class priority-based polling system. Tags energy conservation is the top priority in RFID systems.In a
SERVER
𝑄 𝑁
𝑄1 𝑄2
𝑄3
Seyed Mahmood Hashemi “International Journal of Innovation Engineering and Science Research”
Volume 2 Issue 3 May 2018 3 | P a g e
typical RFID, which has one or multiple readers and numerous tags, each tag (carrier identifier) is
communicated directly to readers. Tags, base on battery consumption, are divided into two groups: 1-
active and 2- passive. Passive tags do not have an internal battery and instead of it, they are used
radio waves. While there are many warehouse products whit own tags, passive tags cause to
interference and sophisticated communication. Active tags against passive tags have own battery-
powered and can be used in mobile status. [7] presents an approach to design an efficient protocol for
active tags. Cyber-Physical Systems (CPS) are set of different devices include computational,
networked, communicational and sensor devices [8, 18, 19]. CPS can be used for monitor, control and
in general wireless communication. CPS architecture has three layers: 1- Cyber layer, 2- physical layer
and 3- Networking layer.
Fig. 2. Security Levels
Since inefficient utilization of bandwidth, deterministic Multi-Access Control (MAC) protocols are not
adapted to the requirements of CPS. In a polling MAC protocol, request to transmit data packets are
done base on the density of in polling list. Zheng et. al. design a polling MAC protocol to meet the
requirements of CPS applications. In that protocol, authors use Orthogonal Frequency Division
Multiplexing (OFDM), which is the contention of IEEE 802.11 [8, 16].
Previous works specified two points: 1-using polling system to gather different opinions and 2-apply
priority in polling system to different users.
III. 3 PROPOSED ALGORITHM
The data packets need to route while they are transferred via the network. There are different
parameters to select a suitable path. In the other side, there are different stakeholders that have
opinions to transfer a data packet. In the simplest situation, there is SERVER on the one side and there
is CLIENT on the other side. The most route approaches concern some special formulas. Although
their approach is common and usable, the users' opinions are ignored. Proposed algorithm concerns
Physical Layer
Networking Layer
Cyber Layer
Sensors and Actuators
Analysis and Decision
Seyed Mahmood Hashemi “International Journal of Innovation Engineering and Science Research”
Volume 2 Issue 3 May 2018 4 | P a g e
users’ opinions, indeed it considers the priority of stakeholders. Actually, all stakeholders do not have
same expertise, so there must be a difference between stakeholders.
In this paper, users decide about a suitable path. The users take their opinions about the feasible paths
(as votes) and then the suitable path is decided base on votes. In the proposed algorithm, there is a
queue for voting users. Users can give their vote in this queue, and also their position can rise to the
next queue according to the following probability:
p = an a1 + ⋯+ am
(1
While a1 + ⋯ + am are coefficients of queues and set as default. a means coefficient of nth queue.
Coefficients are sorted ascend to descend, so the probability to raise positions of stakeholders reduces
in each epoch of algorithm.
Above probability is used just when there is no pre-knowledge of stakeholders, but if there is pre-
knowledge for priority of stakeholders, it can be applied without probability. When all stakeholders are
assigned in queues, the final vote is calculated by adding votes in different queues multiply their
coefficients.
Let assign coefficients as follow:
a = 8 6 5 4
(2
There are 20 stakeholders in the system and four queues, so the probability of queues are as:
p1 = 0.34, p2 = 0.26, p3 = 0.21 p4 = 0.21
(3
IV. 4 CONCLUSION
In this paper, an approach base on Polling System is presented for secure routing IoT devices. Polling
System is used because one important parameter for secure routing is stakeholders' opinions. Since
there is a difference between the positions of stakeholders, we use probabilistic polling system. In
presented system, clients in queues are visited (voting policy) according to a probability. Actually, we
can change the voting policy or set some clients as constant in some queues. There is need to pre-
knowledge to set the constant position of clients, but there is an opportunity for this job in the paper.
REFERENCES
[1] Nikolay Akatyev, Joshua I. James, “Evidence identification in IoT networks based on threat assessment”, ELSEVIER,
Future Generation Computer Systems.
[2] Minhaj Ahmad Khan, Khaled Salah, “IoT security: Review, block chain solutions, and open challenges”, ELSEVIER,
Future Generation Computer Systems.
[3] Rory Coulter, Lei Pan, “Intelligent agents defending for an IoT world: A review”, ELSEVIER, computers & s e c u r i t y
73 ( 2 0 1 8 ) 439–458
[4] HANOCH LEVY, MOSHE SIDI, “Polling Systems : Applications, Modeling, and Optimization”, IEEE TRANSACTIONS
ON COMMUNICATIONS. VOL. 38, NO. 10, OCTOBER 1990
[5] JIANG Wei, TIAN Zhihong, CAI Chao, GONG Bei, “Bottleneck Analysis for Data Acquisition in High-Speed Network
Traffic Monitoring”, NETWORK TECHNOLOGY AND APPLICATION
[6] Zhijun Yang, Hongwei Ding, “Characteristics of a Two-Class Polling System Model”, TSINGHUA SCIENCE AND
TECHNOLOGY, ISSNll1007-0214ll11/13llpp516-520, Volume 19, Number 5, October 2014
[7] Yan Qiao, Shigang Chen, Tao Li, Shiping Chen, “Tag-Ordering Polling Protocols in RFID Systems”, IEEE/ACM
TRANSACTIONS ON NETWORKING, VOL. 24, NO. 3, JUNE 2016
[8] Meng Zheng, Junru Lin, Wei Liang, Haibin Yu, “A Priority-aware Frequency Domain Polling MAC Protocol for OFDMA-
based Networks in Cyber-physical Systems”, IEEE/CAA JOURNAL OF AUTOMATICA SINICA, VOL. 2, NO. 4,
OCTOBER 2015
Seyed Mahmood Hashemi “International Journal of Innovation Engineering and Science Research”
Volume 2 Issue 3 May 2018 5 | P a g e
[9] Anita Vorster, Les Labschagne, “A Framework for Comparing Different Information Security Risk Analysis
Methodologies”, ACM, Proceeding of SAICSIT 2005, pp. 95-103
[10] Jakub Breier, Ladislav Hudec, “Risk Analysis Supported by Information Security Metrics”, ACM, International
Conference on Computer Systems and Technologies, CompSysTech’11, 2011
[11] Januszkiewicz Paulina, Pyka Marek, “Designing a Security Policy According to BS 7799 Using the OCTAVE
Methodology”, IEEE, Second International Conference on Availability, Reliability and Security (ARES'07), 2007
[12] Johannes Viehmann, “Reusing Risk Analysis Results, An Extension for the CORAS Risk Analysis Method”, IEEE,
International Conference on Social Computing, 2012
[13] Li-Xin Wang, “a course in fuzzy system and control”, Prentice-Hall International, Inc., pp. 4-7, 1997
[14] Nan Feng, Harry Jinnan Wang, Minqiang Li, “A security risk analysis model for information system: Casual relationships
of risk factors and vulnerability propagation analysis”, ELSEVIER, Information Sciences 256 (2014) 57-73
[15] Maisa Mendonca Silva, Ana Paula Henriques de Gusmão, Thiago Poleto, Lúcio Camara e Silva, Ana Paula Cabral
Seixas Costa, “A multidimensional approach to information security riskmanagement using FMEA and fuzzy theory”,
ELSEVIER, International Journal of Information Management 34 (2014) 733–740
[16] L. Klienrock, H. Levy, “the analysis of random polling systems”, Operation Research Society of America, 1998
[17] A. Wierman, E. M. M. Winands, O. J. Boxama, “scheduling in polling systems”, ELSEVIER, 2007
[18] W. Bux, “local-area subnetworks: a performance comparison”, IEEE, Transaction on Communications, 29(10):1465-
1473, 1981
[19] T. Li, D. Logothetis, M. Veeraraghavan, “analysis of a polling system for telephony traffic with application to wireless
LANs”, IEEE, transaction on wireless communications, Vol. 5, No. 6, 2006
[20] J. A. Weststrate, “analysis and optimization of polling systems”, PhD thesis, Tilburg University, 1992
[21] D. Gupta, M. M. Srinivasan, “polling systems with state-independent setup times”, Queueing Systems, 22:403-423,
1996
[22] J. A. Weststrate, “analysis and optimization of polling systems”, PhD thesis, Tilburg University, 1992
[23] A. Federgruen, Z. Katalan, “costumer waiting-time distributions under base-stock policies in single facility multi-item
production systems”, Naval Research Logistics, 43:533-548, 1996
[24] A. Federgruen, Z. Katalan, “the stochastic economic lot scheduling problem: cyclical base-stock policies with idle times”,
Management Science, 44:989-1001, 1996

More Related Content

PDF
Probabilistic Polling System Approach for IoT Secure Routing
PDF
Approximation of regression-based fault minimization for network traffic
PDF
Secure and reliable wireless advertising system using intellectual characteri...
PDF
A novel character segmentation reconstruction approach for license plate reco...
PDF
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
PDF
Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Rad...
DOC
PDF
IRJET- Chest Abnormality Detection from X-Ray using Deep Learning
Probabilistic Polling System Approach for IoT Secure Routing
Approximation of regression-based fault minimization for network traffic
Secure and reliable wireless advertising system using intellectual characteri...
A novel character segmentation reconstruction approach for license plate reco...
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Rad...
IRJET- Chest Abnormality Detection from X-Ray using Deep Learning

What's hot (20)

PDF
A hybrid model based on constraint oselm, adaptive weighted src and knn for l...
PDF
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...
PDF
Volume 2-issue-6-2190-2194
PDF
A one decade survey of autonomous mobile robot systems
PDF
PREDICTIVE MAINTENANCE AND ENGINEERED PROCESSES IN MECHATRONIC INDUSTRY: AN I...
PDF
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
PDF
Multi-objective NSGA-II based community detection using dynamical evolution s...
PDF
IRJET- Chest Abnormality Detection from X-Ray using Deep Learning
PDF
Framework architecture for improving
PDF
A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
PDF
Calculating voltage magnitudes and voltage phase angles of real electrical ne...
PDF
Real time vehicle counting in complex scene for traffic flow estimation using...
PDF
Intelligent black hole detection in mobile AdHoc networks
PDF
SCCAI- A Student Career Counselling Artificial Intelligence
PDF
Real time vehicle counting in complex scene for traffic flow estimation using...
PDF
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
PDF
Review Paper on Intelligent Traffic Control system using Computer Vision for ...
PDF
Internet of things-based photovoltaics parameter monitoring system using Node...
PDF
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
PDF
Application of VLSI In Artificial Intelligence
A hybrid model based on constraint oselm, adaptive weighted src and knn for l...
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...
Volume 2-issue-6-2190-2194
A one decade survey of autonomous mobile robot systems
PREDICTIVE MAINTENANCE AND ENGINEERED PROCESSES IN MECHATRONIC INDUSTRY: AN I...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Multi-objective NSGA-II based community detection using dynamical evolution s...
IRJET- Chest Abnormality Detection from X-Ray using Deep Learning
Framework architecture for improving
A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Calculating voltage magnitudes and voltage phase angles of real electrical ne...
Real time vehicle counting in complex scene for traffic flow estimation using...
Intelligent black hole detection in mobile AdHoc networks
SCCAI- A Student Career Counselling Artificial Intelligence
Real time vehicle counting in complex scene for traffic flow estimation using...
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
Review Paper on Intelligent Traffic Control system using Computer Vision for ...
Internet of things-based photovoltaics parameter monitoring system using Node...
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
Application of VLSI In Artificial Intelligence
Ad

Similar to Probabilistic Polling System Approach for IoT Secure Routing (20)

PDF
October 2021: Top 10 Read Articles in Network Security and Its Applications
PDF
June 2021 - Top 10 Read Articles in Network Security and Its Applications
PDF
September 2021: Top 10 Read Articles in Network Security and Its Applications
PDF
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
PDF
May 2021: Top 10 Read Articles in Network Security and Its Applications
PDF
July 2021 - Top 10 Read Articles in Network Security & Its Applications
PDF
Most cited articles in academia - International journal of network security &...
DOCX
Logical design of io t
PDF
A survey on secure communication protocols for io t systems
PDF
January 2021 - Top 10 Read Articles in Network Security & Its Applications
PDF
October 2020 - Top Read Articles in Network Security & Its Applications
PDF
March 2021: Top 10 Read Articles in Network Security and Its Applications
PPTX
Grant free IoT, Ericsson Research Presentation
PDF
January 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
PDF
Master Thesis - A Distributed Algorithm for Stateless Load Balancing
PDF
December 2022: Top 10 Read Articles in Network Security and Its Applications
PDF
December 2024 - Top 10 Read Articles in Network Security & Its Applications.pdf
PDF
December 2021: Top 10 Read Articles in Network Security and Its Applications
PDF
September 2022: Top 10 Read Articles in Network Security & Its Applications
PDF
December 2023 - Top 10 Read Articles in Network Security & Its Applications
October 2021: Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
May 2021: Top 10 Read Articles in Network Security and Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
Most cited articles in academia - International journal of network security &...
Logical design of io t
A survey on secure communication protocols for io t systems
January 2021 - Top 10 Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
Grant free IoT, Ericsson Research Presentation
January 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
Master Thesis - A Distributed Algorithm for Stateless Load Balancing
December 2022: Top 10 Read Articles in Network Security and Its Applications
December 2024 - Top 10 Read Articles in Network Security & Its Applications.pdf
December 2021: Top 10 Read Articles in Network Security and Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its Applications
Ad

More from International Journal of Innovation Engineering and Science Research (20)

PDF
Modeling and Simulation ofa Water Gas Shift Reactor operating at a low pressure
PDF
Parameters calculation of turbulent fluid flow in a pipe of a circular cross ...
PDF
MHD Newtonian and non-Newtonian Nano Fluid Flow Passing On A Magnetic Sphere ...
PDF
The influence of the Calsium Silicate panel on Soil-paper walls in low income...
PDF
Contributions on Knowledge Management in Mechanical Engineering
PDF
The Influence Study of The Mole Ratio Reactant in Ceftriaxone Sodium Synthesi...
PDF
Predictive Regression Models of Water Quality Parameters for river Amba in Na...
PDF
The Soil Problems in Constructions of Airport
PDF
Microbiological quality of selected street foods from Antananarivo on 2016-20...
PDF
Bioremediation of soils polluted by petroleum hydrocarbons by Pseudomonas putida
PDF
Numerical analysis of the density distribution within scored tablets
PDF
The effect of using solar chimney on reduced heating load in cold climate of US
PDF
Control of Direct Current Machine by the Change of Resistance in Armature Cir...
PDF
Prediction of Poultry Yield Using Data Mining Techniques
PDF
Usability study of a methodology based on concepts of ontology design to defi...
PDF
Measuring the facility of use of a website designed with a methodology based ...
PDF
Effects of Kingcure K-11 Hardener and Epoxidized Sunflower Oil on The Propert...
PDF
A Back Propagation Neural Network Intrusion Detection System Based on KVM
Modeling and Simulation ofa Water Gas Shift Reactor operating at a low pressure
Parameters calculation of turbulent fluid flow in a pipe of a circular cross ...
MHD Newtonian and non-Newtonian Nano Fluid Flow Passing On A Magnetic Sphere ...
The influence of the Calsium Silicate panel on Soil-paper walls in low income...
Contributions on Knowledge Management in Mechanical Engineering
The Influence Study of The Mole Ratio Reactant in Ceftriaxone Sodium Synthesi...
Predictive Regression Models of Water Quality Parameters for river Amba in Na...
The Soil Problems in Constructions of Airport
Microbiological quality of selected street foods from Antananarivo on 2016-20...
Bioremediation of soils polluted by petroleum hydrocarbons by Pseudomonas putida
Numerical analysis of the density distribution within scored tablets
The effect of using solar chimney on reduced heating load in cold climate of US
Control of Direct Current Machine by the Change of Resistance in Armature Cir...
Prediction of Poultry Yield Using Data Mining Techniques
Usability study of a methodology based on concepts of ontology design to defi...
Measuring the facility of use of a website designed with a methodology based ...
Effects of Kingcure K-11 Hardener and Epoxidized Sunflower Oil on The Propert...
A Back Propagation Neural Network Intrusion Detection System Based on KVM

Recently uploaded (20)

PPTX
Geodesy 1.pptx...............................................
PPTX
Foundation to blockchain - A guide to Blockchain Tech
DOCX
573137875-Attendance-Management-System-original
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Welding lecture in detail for understanding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
additive manufacturing of ss316l using mig welding
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
Digital Logic Computer Design lecture notes
Geodesy 1.pptx...............................................
Foundation to blockchain - A guide to Blockchain Tech
573137875-Attendance-Management-System-original
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
Welding lecture in detail for understanding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
additive manufacturing of ss316l using mig welding
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
bas. eng. economics group 4 presentation 1.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Automation-in-Manufacturing-Chapter-Introduction.pdf
Digital Logic Computer Design lecture notes

Probabilistic Polling System Approach for IoT Secure Routing

  • 1. International Journal of Innovation Engineering and Science Research Open Access Volume 2 Issue 3 May 2018 1 | P a g e ABSTRACT Probabilistic Polling System Approach for IoT Secure Routing Seyed Mahmood Hashemi Beijing University of Technology Beijing, CHINA The Internet of things (IoT) affects on humans life deeply. There are traditional cyber threats and also new threats. There is no guard and immunity for systems against the innumerable variance of attack and exploitation. In this paper, an approach base on Polling System is presented for secure routing IoT devices. We use polling system with probabilistic routing, so there is a probability to move from one queue to another. Probabilistic polling system allows us to perform priority of stakeholders’ votes. Keywords- Internet of Things; Secure Routing; Polling System I. INTRODUCTION The Internet of things (IoT) affects on humans life deeply [9]. Although the new IoT functionality of smart devices causes to the better life for the human, there are traditional cyber threats and also new threats. However there were many works on the IoT security, most of them were not Use-Centric. In against of the previous works, the proposed approach is base on the interaction with users, so it is User-Centric completely. In a broad view, we divide IoT networks into two categories: 1- consumer and 2- industrial. While we use IoT devices in a smart home, we emphasize on the smart point of the IoT devices. In other words, the ideal point of IoT devices is communicated and adjusting to other physical devices in the home. While a set of smart home devices has a particular behavior or need for special decision making, we called them as user-centric IoT (UCIoT) [10]. There is no guard and immunity for systems against the innumerable variance of attack and exploitation. Thus security mechanism has fought to keep with IoT. Intelligence is successful to detect the intruder. IoT has the challenge to bridge physical with the cyber world [11]. Previous security mechanisms must be adapted in order to maintain defensive expectation. In this paper, an approach base on Polling System is presented for secure routing IoT devices. In the classical view, Polling System is a set of one server and multiple queues. Clients are arrived and set into queues and then get server according to a particular policy. (figure 1)
  • 2. Seyed Mahmood Hashemi “International Journal of Innovation Engineering and Science Research” Volume 2 Issue 3 May 2018 2 | P a g e Fig. 1. Classical Polling System The number of queues and also the capacity of queues are predefined. In the beginning, Polling System is used for the time-sharing computer system, but now it is used to model wide variety applications (computer communications, robotics, traffic and transportation, manufacturing, production, mail distribution, etc.) [12, 13, 14]. In the time-sharing polling system, there are N terminals that are connected to a central computer. The central computer visit terminals in turn and cyclic order. The size of queues is finite and the arrival process is independent Poisson Process with parameter λi. Several service policies are examined on the basic model of Polling System such as exhaustive, gated, and limited-I policies. The server policy determines association server to clients. The basic Polling model can be applied in different applications: Token Ring Networks; Robotic Systems; Various Non- Generic Computers; Communication Systems. The common scheme for Polling System is a server resource shared by multiple queues. The basic model of Polling System is cyclic polling model. In the next step, the fixed polling order is replaced with random polling order. The important measure of the performance of Polling System is Response Time [15, 16]. In the Polling System with probabilistic routing, when the client in queue i is serviced, it is routed to queue j with probabilitypi,j. In this paper, we use polling system with probabilistic routing. Polling system provides a platform for security voting of all stakeholders. In the other side, probabilistic routing establishes priority approach. Therefore the presented approach can be used in the organization with employees by different priority. This paper is organized as follow: section 2 is the study of related works; section 3 explains proposal algorithm, finally, section 4 is the conclusion. II. RELATED WORKS Akatyev et. Al. assume heterogeneous IoT devices. they use data flow diagram to represent the dependencies between users and information [1, 20]. In [2, 21, 22], In this survey, authors categorize IoT security issues into three groups: 1- low-level security issues; 2- intermediate-level security issues and high-level security issues and then study about security mechanism for each of them. Coulter et. al. research in current intrusion detection approaches from an intelligence perspective. Levy et. al.define different types of polling systems [4, 23, 24]. Time-sharing polling system, there are N terminals that are connected to a central computer. The central computer visit terminals in turn and cyclic order. The size of queues is finite and the arrival process is independent Poisson Process with parameter λi. In [5], Authors use a M/M/1 queue to model the traffic of the network. Yang et. al. propose an approach to estimate the mean queue length, mean cycle time and throughout for two- class priority-based polling system. Tags energy conservation is the top priority in RFID systems.In a SERVER 𝑄 𝑁 𝑄1 𝑄2 𝑄3
  • 3. Seyed Mahmood Hashemi “International Journal of Innovation Engineering and Science Research” Volume 2 Issue 3 May 2018 3 | P a g e typical RFID, which has one or multiple readers and numerous tags, each tag (carrier identifier) is communicated directly to readers. Tags, base on battery consumption, are divided into two groups: 1- active and 2- passive. Passive tags do not have an internal battery and instead of it, they are used radio waves. While there are many warehouse products whit own tags, passive tags cause to interference and sophisticated communication. Active tags against passive tags have own battery- powered and can be used in mobile status. [7] presents an approach to design an efficient protocol for active tags. Cyber-Physical Systems (CPS) are set of different devices include computational, networked, communicational and sensor devices [8, 18, 19]. CPS can be used for monitor, control and in general wireless communication. CPS architecture has three layers: 1- Cyber layer, 2- physical layer and 3- Networking layer. Fig. 2. Security Levels Since inefficient utilization of bandwidth, deterministic Multi-Access Control (MAC) protocols are not adapted to the requirements of CPS. In a polling MAC protocol, request to transmit data packets are done base on the density of in polling list. Zheng et. al. design a polling MAC protocol to meet the requirements of CPS applications. In that protocol, authors use Orthogonal Frequency Division Multiplexing (OFDM), which is the contention of IEEE 802.11 [8, 16]. Previous works specified two points: 1-using polling system to gather different opinions and 2-apply priority in polling system to different users. III. 3 PROPOSED ALGORITHM The data packets need to route while they are transferred via the network. There are different parameters to select a suitable path. In the other side, there are different stakeholders that have opinions to transfer a data packet. In the simplest situation, there is SERVER on the one side and there is CLIENT on the other side. The most route approaches concern some special formulas. Although their approach is common and usable, the users' opinions are ignored. Proposed algorithm concerns Physical Layer Networking Layer Cyber Layer Sensors and Actuators Analysis and Decision
  • 4. Seyed Mahmood Hashemi “International Journal of Innovation Engineering and Science Research” Volume 2 Issue 3 May 2018 4 | P a g e users’ opinions, indeed it considers the priority of stakeholders. Actually, all stakeholders do not have same expertise, so there must be a difference between stakeholders. In this paper, users decide about a suitable path. The users take their opinions about the feasible paths (as votes) and then the suitable path is decided base on votes. In the proposed algorithm, there is a queue for voting users. Users can give their vote in this queue, and also their position can rise to the next queue according to the following probability: p = an a1 + ⋯+ am (1 While a1 + ⋯ + am are coefficients of queues and set as default. a means coefficient of nth queue. Coefficients are sorted ascend to descend, so the probability to raise positions of stakeholders reduces in each epoch of algorithm. Above probability is used just when there is no pre-knowledge of stakeholders, but if there is pre- knowledge for priority of stakeholders, it can be applied without probability. When all stakeholders are assigned in queues, the final vote is calculated by adding votes in different queues multiply their coefficients. Let assign coefficients as follow: a = 8 6 5 4 (2 There are 20 stakeholders in the system and four queues, so the probability of queues are as: p1 = 0.34, p2 = 0.26, p3 = 0.21 p4 = 0.21 (3 IV. 4 CONCLUSION In this paper, an approach base on Polling System is presented for secure routing IoT devices. Polling System is used because one important parameter for secure routing is stakeholders' opinions. Since there is a difference between the positions of stakeholders, we use probabilistic polling system. In presented system, clients in queues are visited (voting policy) according to a probability. Actually, we can change the voting policy or set some clients as constant in some queues. There is need to pre- knowledge to set the constant position of clients, but there is an opportunity for this job in the paper. REFERENCES [1] Nikolay Akatyev, Joshua I. James, “Evidence identification in IoT networks based on threat assessment”, ELSEVIER, Future Generation Computer Systems. [2] Minhaj Ahmad Khan, Khaled Salah, “IoT security: Review, block chain solutions, and open challenges”, ELSEVIER, Future Generation Computer Systems. [3] Rory Coulter, Lei Pan, “Intelligent agents defending for an IoT world: A review”, ELSEVIER, computers & s e c u r i t y 73 ( 2 0 1 8 ) 439–458 [4] HANOCH LEVY, MOSHE SIDI, “Polling Systems : Applications, Modeling, and Optimization”, IEEE TRANSACTIONS ON COMMUNICATIONS. VOL. 38, NO. 10, OCTOBER 1990 [5] JIANG Wei, TIAN Zhihong, CAI Chao, GONG Bei, “Bottleneck Analysis for Data Acquisition in High-Speed Network Traffic Monitoring”, NETWORK TECHNOLOGY AND APPLICATION [6] Zhijun Yang, Hongwei Ding, “Characteristics of a Two-Class Polling System Model”, TSINGHUA SCIENCE AND TECHNOLOGY, ISSNll1007-0214ll11/13llpp516-520, Volume 19, Number 5, October 2014 [7] Yan Qiao, Shigang Chen, Tao Li, Shiping Chen, “Tag-Ordering Polling Protocols in RFID Systems”, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 24, NO. 3, JUNE 2016 [8] Meng Zheng, Junru Lin, Wei Liang, Haibin Yu, “A Priority-aware Frequency Domain Polling MAC Protocol for OFDMA- based Networks in Cyber-physical Systems”, IEEE/CAA JOURNAL OF AUTOMATICA SINICA, VOL. 2, NO. 4, OCTOBER 2015
  • 5. Seyed Mahmood Hashemi “International Journal of Innovation Engineering and Science Research” Volume 2 Issue 3 May 2018 5 | P a g e [9] Anita Vorster, Les Labschagne, “A Framework for Comparing Different Information Security Risk Analysis Methodologies”, ACM, Proceeding of SAICSIT 2005, pp. 95-103 [10] Jakub Breier, Ladislav Hudec, “Risk Analysis Supported by Information Security Metrics”, ACM, International Conference on Computer Systems and Technologies, CompSysTech’11, 2011 [11] Januszkiewicz Paulina, Pyka Marek, “Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology”, IEEE, Second International Conference on Availability, Reliability and Security (ARES'07), 2007 [12] Johannes Viehmann, “Reusing Risk Analysis Results, An Extension for the CORAS Risk Analysis Method”, IEEE, International Conference on Social Computing, 2012 [13] Li-Xin Wang, “a course in fuzzy system and control”, Prentice-Hall International, Inc., pp. 4-7, 1997 [14] Nan Feng, Harry Jinnan Wang, Minqiang Li, “A security risk analysis model for information system: Casual relationships of risk factors and vulnerability propagation analysis”, ELSEVIER, Information Sciences 256 (2014) 57-73 [15] Maisa Mendonca Silva, Ana Paula Henriques de Gusmão, Thiago Poleto, Lúcio Camara e Silva, Ana Paula Cabral Seixas Costa, “A multidimensional approach to information security riskmanagement using FMEA and fuzzy theory”, ELSEVIER, International Journal of Information Management 34 (2014) 733–740 [16] L. Klienrock, H. Levy, “the analysis of random polling systems”, Operation Research Society of America, 1998 [17] A. Wierman, E. M. M. Winands, O. J. Boxama, “scheduling in polling systems”, ELSEVIER, 2007 [18] W. Bux, “local-area subnetworks: a performance comparison”, IEEE, Transaction on Communications, 29(10):1465- 1473, 1981 [19] T. Li, D. Logothetis, M. Veeraraghavan, “analysis of a polling system for telephony traffic with application to wireless LANs”, IEEE, transaction on wireless communications, Vol. 5, No. 6, 2006 [20] J. A. Weststrate, “analysis and optimization of polling systems”, PhD thesis, Tilburg University, 1992 [21] D. Gupta, M. M. Srinivasan, “polling systems with state-independent setup times”, Queueing Systems, 22:403-423, 1996 [22] J. A. Weststrate, “analysis and optimization of polling systems”, PhD thesis, Tilburg University, 1992 [23] A. Federgruen, Z. Katalan, “costumer waiting-time distributions under base-stock policies in single facility multi-item production systems”, Naval Research Logistics, 43:533-548, 1996 [24] A. Federgruen, Z. Katalan, “the stochastic economic lot scheduling problem: cyclical base-stock policies with idle times”, Management Science, 44:989-1001, 1996