MSecTrust: A Mobility-Aware Secure Trust-Based Routing Protocol for RPL Based Internet of Things

被引:0
作者
Prajisha, C. [1 ]
Vasudevan, A. R. [1 ]
机构
[1] Natl Inst Technol Calicut, Hardware & Secur Lab, CSED, NITC Campus PO, Calicut, Kerala, India
关键词
IoT; RPL; Security; Dempster-Shafer Theory; RPL routing attack; LOW-POWER; RANK ATTACK; IOT;
D O I
10.1007/s10922-025-09913-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is a global network of physical objects interacting over the Internet using distinctive address schemes. As IoT devices are mobile and heterogeneous with limited resources, security mechanisms in IoT routing protocols are crucial. The standard IoT routing protocol, the Routing Protocol for Low-power and Lossy Networks (RPL) offers minimal defense against routing attacks. We propose a mobility-aware secure trust-based routing protocol for RPL-based IoT (MSecTrust) to prevent the consequences of routing attacks. MsecTrust calculates the trust values based on the Dempster-Shafer theory for secure routing path selection. To overcome the drawbacks of using only one metric, MSecTrust uses a combination of metrics, including mobility-related characteristics, for the best parent node selection. The proposed protocol also incorporates necessary countermeasures to routing attacks such as blackhole attacks and rank attacks. The simulation results show that the proposed MSecTrust outperforms earlier studies regarding the average number of node rank changes, packet loss ratio, throughput, and average power consumption. In the experimental results, the average packet loss ratio of the proposed MSecTrust is 14.7% under blackhole attack and 13.2% under rank attack, which is relatively low compared to existing approaches. Similarly, the proposed MSecTrust shows 1.28% and 1.68% improvement in throughput under blackhole and rank attack respectively.
引用
收藏
页数:36
相关论文
共 48 条
[21]   A comprehensive survey on enhancements and limitations of the RPL protocol: A focus on the objective function [J].
Lamaazi, Hanane ;
Benamar, Nabil .
AD HOC NETWORKS, 2020, 96
[22]   A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology [J].
Le, Anhtuan ;
Loo, Jonathan ;
Chai, Kok Keong ;
Aiash, Mahdi .
INFORMATION, 2016, 7 (02)
[23]   A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications [J].
Lin, Jie ;
Yu, Wei ;
Zhang, Nan ;
Yang, Xinyu ;
Zhang, Hanlin ;
Zhao, Wei .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1125-1142
[24]   Mobility-Aware Energy-Efficient Parent Selection Algorithm for Low Power and Lossy Networks [J].
Murali, Sarumathi ;
Jamalipour, Abbas .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :2593-2601
[25]   Routing protocol for Low-Power and Lossy Networks for heterogeneous traffic network [J].
Musaddiq, Arslan ;
Zikria, Yousaf Bin ;
Zulqarnain ;
Kim, Sung Won .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
[26]   A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things [J].
Muzammal, Syeda Mariam ;
Murugesan, Raja Kumar ;
Jhanjhi, Noor Zaman ;
Humayun, Mamoona ;
Ibrahim, Ashraf Osman ;
Abdelmaboud, Abdelzahir .
SENSORS, 2022, 22 (18)
[27]   A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things [J].
Patel, Anshuman ;
Jinwala, Devesh .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (04) :1-17
[28]  
Paul A., 2021, P 2021 2 INT C ADV C, P80, DOI [10.1109/ACCESS51619.2021.9563294, DOI 10.1109/ACCESS51619.2021.9563294]
[29]   PCC-RPL: An efficient trust-based security extension for RPL [J].
Pishdar, Mohammad ;
Seifi, Younes ;
Nasiri, Mohammad ;
Bag-Mohammadi, Mozafar .
INFORMATION SECURITY JOURNAL, 2022, 31 (02) :168-178
[30]  
Pongle P., 2015, Proc. Intl. Conf. Pervasive Comput. (ICPC), P1, DOI DOI 10.1109/PERVASIVE.2015.7087034