MSecTrust: A Mobility-Aware Secure Trust-Based Routing Protocol for RPL Based Internet of Things

被引:0
作者
Prajisha, C. [1 ]
Vasudevan, A. R. [1 ]
机构
[1] Natl Inst Technol Calicut, Hardware & Secur Lab, CSED, NITC Campus PO, Calicut, Kerala, India
关键词
IoT; RPL; Security; Dempster-Shafer Theory; RPL routing attack; LOW-POWER; RANK ATTACK; IOT;
D O I
10.1007/s10922-025-09913-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is a global network of physical objects interacting over the Internet using distinctive address schemes. As IoT devices are mobile and heterogeneous with limited resources, security mechanisms in IoT routing protocols are crucial. The standard IoT routing protocol, the Routing Protocol for Low-power and Lossy Networks (RPL) offers minimal defense against routing attacks. We propose a mobility-aware secure trust-based routing protocol for RPL-based IoT (MSecTrust) to prevent the consequences of routing attacks. MsecTrust calculates the trust values based on the Dempster-Shafer theory for secure routing path selection. To overcome the drawbacks of using only one metric, MSecTrust uses a combination of metrics, including mobility-related characteristics, for the best parent node selection. The proposed protocol also incorporates necessary countermeasures to routing attacks such as blackhole attacks and rank attacks. The simulation results show that the proposed MSecTrust outperforms earlier studies regarding the average number of node rank changes, packet loss ratio, throughput, and average power consumption. In the experimental results, the average packet loss ratio of the proposed MSecTrust is 14.7% under blackhole attack and 13.2% under rank attack, which is relatively low compared to existing approaches. Similarly, the proposed MSecTrust shows 1.28% and 1.68% improvement in throughput under blackhole and rank attack respectively.
引用
收藏
页数:36
相关论文
共 50 条
  • [41] Advanced network security with an integrated trust-based intrusion detection system for routing protocol
    Kumar, Ajay
    Budhiraja, Ishan
    Garg, Deepak
    Garg, Sahil
    Choi, Bong Jun
    Alrashoud, Mubarak
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 120 : 378 - 390
  • [42] Trust-based security for the OLSR routing protocol
    Adnane, Asma
    Bidan, Christophe
    de Sousa Junior, Rafael Timoteo
    COMPUTER COMMUNICATIONS, 2013, 36 (10-11) : 1159 - 1171
  • [43] DDoS attack aware environment with secure clustering and routing based on RPL protocol operation
    Alabsi, Basim Ahmad
    Anbar, Mohammed
    Manickam, Selvakumar
    Elejla, Omar E.
    IET CIRCUITS DEVICES & SYSTEMS, 2019, 13 (06) : 748 - 755
  • [44] Energy-Aware and Trust-Based Secure Routing Protocol for Wireless Sensor Networks Using Adaptive Genetic Algorithm
    Han, Youjia
    Hu, Huangshui
    Guo, Yuxin
    IEEE ACCESS, 2022, 10 : 11538 - 11550
  • [45] Centralized Trust-Based Secure Routing in Wireless Networks
    Yun, Jusik
    Seo, Sunho
    Chung, Jong-Moon
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (06) : 1066 - 1069
  • [46] A Trust-Based Predictive Model for Mobile Ad Hoc Network in Internet of Things
    Alnumay, Waleed
    Ghosh, Uttam
    Chatterjee, Pushpita
    SENSORS, 2019, 19 (06)
  • [47] Performance Evaluation of Mobility-Aware Routing Protocol for Low power and Lossy Networks
    Zaatouri, Ibtissem
    Sailhan, Francoise
    Rovedakis, Stephane
    Guiloufi, Awatef
    Alyaoui, Nouha
    Kachouri, Abdennaceur
    2019 16TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2019, : 636 - 641
  • [48] A Review of Intrusion Detection Systems in RPL Routing Protocol Based on Machine Learning for Internet of Things Applications
    Seyfollahi, Ali
    Ghaffari, Ali
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [49] An improved trust-based security framework for internet of things
    Renjith P.N.
    Ramesh K.
    Sasikumar S.
    International Journal of Information Technology, 2021, 13 (2) : 677 - 685
  • [50] BSI: Blockchain to secure routing protocol in Internet of Things
    Jerbi, Wassim
    Cheikhrouhou, Omar
    Guermazi, Abderrahmen
    Baz, Mohamed
    Trabelsi, Hafedh
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (10)