Trust-based Neighbor Unreachability Detection for RPL

被引:0
|
作者
Guclu, Sila Ozen [1 ]
Ozcelebi, Tanir [1 ]
Lukkien, Johan J. [1 ]
机构
[1] Eindhoven Univ Technol, Dept Math & Comp Sci, Eindhoven, Netherlands
来源
2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN) | 2016年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The IETF ROLL working group developed Routing Protocol for Low Power and Lossy Networks (RPL) for packet routing within Low power and Lossy Networks (LLNs) formed by resource constrained devices. RPL handles LLN issues such as unreachable parent and routing loops by triggering reconstruction of routing tree. For unreachable neighbor detection, RPL requires an external mechanism with very low communication overhead. This rules out the use of proactive mechanisms that employ keep-alive messages. Instead, RPL suggests to use IPv6 Neighbor Unreachability Detection (NUD), which is a reactive mechanism maintaining timers that trigger control messages. However, due to the use of fixed timeout intervals, NUD suffers from frequent premature timeouts and the communication overhead of NUD is still substantial. We propose a cross layer trust-based NUD mechanism, which adapts its timeout intervals based on network traffic without the need for explicit coordination among nodes. The proposed mechanism takes advantage of overhearing at the link layer and uses the statistics about packets that are not sent to the node itself, i.e. that would otherwise be discarded. Our evaluation shows that the proposed mechanism decreases the number of control messages significantly, while the packet delivery rate remains comparable to classical NUD.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Trust-based classifier combination for network anomaly detection
    Rehak, Martin
    Pechoucek, Michal
    Grill, Martin
    Bartos, Karel
    COOPERATIVE INFORMATION AGENTS XII, PROCEEDINGS, 2008, 5180 : 116 - +
  • [22] Trust-Based Intrusion Detection in Wireless Sensor Networks
    Bao, Fenye
    Chen, Ing-Ray
    Chang, MoonJeong
    Cho, Jin-Hee
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [23] Trust-based Voting Method for Efficient Malware Detection
    More, Shraddha S.
    Gaikwad, Pranit P.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 657 - 667
  • [24] Trust-Based Anomaly Detection in Emerging Sensor Networks
    Wu, Renyong
    Deng, Xue
    Lu, Rongxing
    Shen, Xuemin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [25] Enhanced Trust-based Intrusion Detection System in MANET
    Hassan, Kr Lutful
    Mandal, J. K.
    Mondal, S.
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2019, 78 (08): : 509 - 512
  • [26] Forwarding Neighbor Based Sink Reputed Trust Based Intrusion Detection System to Mitigate Selective Forwarding Attack in RPL for IoT Networks
    Patel B.
    Vasa J.
    Shah P.
    SN Computer Science, 4 (4)
  • [27] TRUST-BASED MEDICINE
    Nemcekova, Maria
    HUMAN AFFAIRS-POSTDISCIPLINARY HUMANITIES & SOCIAL SCIENCES QUARTERLY, 2013, 23 (01): : 114 - 116
  • [28] Trust-Based IoT Participatory Sensing for Hazard Detection and Response
    Guo, Jia
    Chen, Ing-Ray
    Tsai, Jeffrey J. P.
    Al-Hamadi, Hamid
    SERVICE-ORIENTED COMPUTING - ICSOC 2016 WORKSHOPS, 2017, 10380 : 79 - 84
  • [29] Multidimensional Trust-Based Anomaly Detection System in Internet of Things
    Gai, Fangyu
    Zhang, Jiexin
    Zhu, Peidong
    Jiang, Xinwen
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 10251 : 302 - 313