A Gaming and Trust-Model-Based Countermeasure for DIS Attack on 6TiSCH IoT Networks

被引:5
作者
Kalita, Alakesh [1 ]
Gurusamy, Mohan [1 ]
Khatua, Manas [2 ]
机构
[1] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore, Singapore
[2] Indian Inst Technol Guwahati, Dept Comp Sci & Engn, Gauhati 781039, India
关键词
Energy consumption; Routing; Internet of Things; Routing protocols; IEEE; 802; 15; Standard; Unicast; Security; 6TiSCH; game theory; Internet of Things (IoT); routing protocol for low power and lossy network (RPL) attack; time slotted channel hopping (TSCH); trust model; RPL-BASED INTERNET;
D O I
10.1109/JIOT.2023.3234300
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The 6TiSCH communication architecture provides delay-bounded packet delivery, energy efficient, and reliable data-delivering communication in mission-critical Internet of Things (IoT) applications. It uses IETF's 6TiSCH minimal configuration (6TiSCH-MC) standard for resource allocation during network formation and routing using a routing protocol for low power and lossy network (RPL) as routing protocol. In RPL, the DODAG information solicitation (DIS) control packet is used to solicit routing information from the existing networks. However, it is observed that malicious transmission of this DIS packet can severely affect the 6TiSCH networks in terms of nodes' network joining time and energy consumption. Therefore, designing countermeasures of DIS attack in 6TiSCH network has become critically important. Additionally, the existing works neither considered all the possible parameters together for detecting DIS attack nor energy efficient, and create control packet overhead. In this work, we model noncooperative gaming to determine the optimal probability of responding to a DIS packet. Subsequently, we design a trust model to detect malicious DIS transmission in 6TiSCH networks. Finally, we merge both the proposed gaming model and trust model to propose a scheme-gaming and trust-based countermeasure (GTCM) to reduce the effect of DIS attack in 6TiSCH networks. We implement the GTCM on Contiki-NG and validate it using open source FIT IoT-LAB testbed. Our experimental testbed results show that GTCM reduces the effect of DIS attack in terms of pledges' (new nodes) joining time and energy consumption significantly.
引用
收藏
页码:9727 / 9737
页数:11
相关论文
共 33 条
[1]  
Adjih C, 2015, 2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P459, DOI 10.1109/WF-IoT.2015.7389098
[2]  
Alsirhani A., IN PRESS
[3]  
[Anonymous], 2005, IEEE Standards 802.15 1-2005
[4]  
Dunkels A, 2004, CONF LOCAL COMPUT NE, P455
[5]  
Farzaneh B, 2019, 2019 5TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), P61, DOI [10.1109/ICWR.2019.8765272, 10.1109/icwr.2019.8765272]
[6]  
Gundogan C., 2019, INTERNETDRAFT DRAFT
[7]  
IEEE Standard for Low-RateWireless Networks, 2016, IEEE Std 802.15.4-2015 (Revision of IEEE Std 802.15.4-2011)
[8]   Denial-of-Service Attacks and Countermeasures in the RPL-Based Internet of Things [J].
Ioulianou, Philokypros P. ;
Vassilakis, Vassilios G. .
COMPUTER SECURITY, ESORICS 2019, 2020, 11980 :374-390
[9]  
Jain Akanksha, 2019, Emerging Technologies in Data Mining and Information Security. Proceedings of IEMIS 2018. Advances in Intelligent Systems and Computing (AISC 814), P611, DOI 10.1007/978-981-13-1501-5_54
[10]   Opportunistic Transmission of Control Packets for Faster Formation of 6TiSCH Network [J].
Kalita, Alakesh ;
Khatua, Manas .
ACM TRANSACTIONS ON INTERNET OF THINGS, 2021, 2 (01)