International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 178 - Issue 19 |
Published: Jun 2019 |
Authors: Charles O. Muango, Jairus O. Malenje, Qu Shaojian |
![]() |
Charles O. Muango, Jairus O. Malenje, Qu Shaojian . Bio-inspired Security Scheme for IoT Technology. International Journal of Computer Applications. 178, 19 (Jun 2019), 13-18. DOI=10.5120/ijca2019918960
@article{ 10.5120/ijca2019918960, author = { Charles O. Muango,Jairus O. Malenje,Qu Shaojian }, title = { Bio-inspired Security Scheme for IoT Technology }, journal = { International Journal of Computer Applications }, year = { 2019 }, volume = { 178 }, number = { 19 }, pages = { 13-18 }, doi = { 10.5120/ijca2019918960 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2019 %A Charles O. Muango %A Jairus O. Malenje %A Qu Shaojian %T Bio-inspired Security Scheme for IoT Technology%T %J International Journal of Computer Applications %V 178 %N 19 %P 13-18 %R 10.5120/ijca2019918960 %I Foundation of Computer Science (FCS), NY, USA
There is a general consensus among scholars and ICT practitioners that the evolution of technology in today’s world has advanced [1] to a level where communication between individuals and abstract objects is possible under the framework of Internet of Things (IoT). However, due to security threats and constrained resources (such as memory, power and processing capacity), applying traditional approaches of security on these category of devices has become a challenge to ICT professionals in this era of cybersecurity. Therefore, this study proposes a flexible solution that can be used to classify IoT devices into operational domains, whereby a meta-heuristic Nature-Inspired Firefly algorithm is used to tune parameters for the various domains to prevent attacks from spilling all over the entire community of IoT devices. With this approach, no device shall be allowed to communicate outside its domain. The proposed technique is modeled on the behavior of the firefly that uses its light intensity to communicate to friends and frighten off impostors or enemies. Through iterative simulations done, we were able to achieve constant light intensity (attractiveness) with different bands. Our findings revealed a fast and improved convergence rate as compared to other nature inspired algorithms. Therefore, we recommend that these bands can be allocated to the various IoT domains. Limitations of the study and future directions are well addressed.