MSecTrust: A Mobility-Aware Secure Trust-Based Routing Protocol for RPL Based Internet of Things

被引:0
作者
Prajisha, C. [1 ]
Vasudevan, A. R. [1 ]
机构
[1] Natl Inst Technol Calicut, Hardware & Secur Lab, CSED, NITC Campus PO, Calicut, Kerala, India
关键词
IoT; RPL; Security; Dempster-Shafer Theory; RPL routing attack; LOW-POWER; RANK ATTACK; IOT;
D O I
10.1007/s10922-025-09913-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is a global network of physical objects interacting over the Internet using distinctive address schemes. As IoT devices are mobile and heterogeneous with limited resources, security mechanisms in IoT routing protocols are crucial. The standard IoT routing protocol, the Routing Protocol for Low-power and Lossy Networks (RPL) offers minimal defense against routing attacks. We propose a mobility-aware secure trust-based routing protocol for RPL-based IoT (MSecTrust) to prevent the consequences of routing attacks. MsecTrust calculates the trust values based on the Dempster-Shafer theory for secure routing path selection. To overcome the drawbacks of using only one metric, MSecTrust uses a combination of metrics, including mobility-related characteristics, for the best parent node selection. The proposed protocol also incorporates necessary countermeasures to routing attacks such as blackhole attacks and rank attacks. The simulation results show that the proposed MSecTrust outperforms earlier studies regarding the average number of node rank changes, packet loss ratio, throughput, and average power consumption. In the experimental results, the average packet loss ratio of the proposed MSecTrust is 14.7% under blackhole attack and 13.2% under rank attack, which is relatively low compared to existing approaches. Similarly, the proposed MSecTrust shows 1.28% and 1.68% improvement in throughput under blackhole and rank attack respectively.
引用
收藏
页数:36
相关论文
共 48 条
[1]   A secure routing protocol for low power and lossy networks based 6LoWPAN networks to mitigate DIS flooding attacks [J].
Abhinaya, E. V. ;
Sudhakar, B. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
[2]  
Airehrour D, 2018, Journal of Telecommunications and the Digital Economy, V6, P41, DOI [10.18080/ajtde.v6n1.138, 10.18080/jtde.v6n1.138, 10.18080/jtde.v6n1.138, DOI 10.18080/JTDE.V6N1.138]
[3]   SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things [J].
Airehrour, David ;
Gutierrez, Jairo A. ;
Ray, Sayan Kumar .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 :860-876
[4]   Proposing a Secure RPL based Internet of Things Routing Protocol: A Review [J].
Almusaylim, Zahrah A. ;
Alhumam, Abdulaziz ;
Jhanjhi, N. Z. .
AD HOC NETWORKS, 2020, 101
[5]   A Proposal for IoT Dynamic Routes Selection Based on Contextual Information [J].
Araujo, Harilton da Silva ;
Holanda Filho, Raimir ;
Rodrigues, Joel J. P. C. ;
Rabelo, Ricardo de A. L. ;
Sousa, Natanael de C. ;
Jose Filho, C. C. L. S. ;
Sobral, Jose V. V. .
SENSORS, 2018, 18 (02)
[6]   Evaluating and improving the scalability of RPL security in the Internet of Things [J].
Arena, Antonio ;
Perazzo, Pericle ;
Vallati, Carlo ;
Dini, Gianluca ;
Anastasi, Giuseppe .
COMPUTER COMMUNICATIONS, 2020, 151 :119-132
[7]  
Aschenbruck N., 2010, 3 INT ICST C SIM TOO
[8]   EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things [J].
Bang, A. O. ;
Rao, Udai Pratap .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (01) :642-665
[9]   An innovative RPL objective function for broad range of IoT domains utilizing fuzzy logic and multiple metrics [J].
Darabkh, Khalid A. ;
Al-Akhras, Muna ;
Khalifeh, Ala' F. ;
Jafar, Iyad F. ;
Jubair, Fahed .
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 205
[10]  
Djedjig N, 2015, 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), P962, DOI 10.1109/ISCC.2015.7405638