A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks

被引:23
作者
Thulasiraman, Preetha [1 ]
Wang, Yizhong [2 ]
机构
[1] Naval Postgrad Sch, Monterey, CA 93943 USA
[2] Def Sci & Technol Agcy, Singapore, Singapore
来源
2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC) | 2019年
关键词
sensor networks; security; privacy; routing; RPL; INTERNET; THINGS;
D O I
10.1109/ccnc.2019.8651846
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Military communities have come to rely heavily on commercial off the shelf (COTS) standards and technologies for Internet of Things (IoT) operations. One of the major obstacles to military use of COTS IoT devices is the security of data transfer. In this paper, we successfully design and develop a lightweight, trust-based security architecture to support routing in a mobile IoT network. Specifically, we modify the RPL IoT routing algorithm using common security techniques, including a nonce identity value, timestamp, and network whitelist. Our approach allows RPL to select a routing path over a mobile IoT wireless network based on a computed node trust value and average received signal strength indicator (ARSSI) value across network members. We conducted simulations using the Cooja network simulator and Wireshark to validate the algorithm against stipulated threat models. We demonstrate that our algorithm can protect the network against Denial of Service (DoS) and Sybil based identity attacks. We also show that the control overhead required for our algorithm is less than 5% and that the packet delivery rate improves by nearly 10%.
引用
收藏
页数:6
相关论文
共 22 条
[1]   Secure routing for internet of things: A survey [J].
Airehrour, David ;
Gutierrez, Jairo ;
Ray, Sayan Kumar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :198-213
[2]  
Alexander A., 2012, Rpl: Ipv6 routing protocol for low-power and lossy networks, P157, DOI DOI 10.17487/RFC6550
[3]  
[Anonymous], 2015, Proc. Intl. Conf. Pervasive Comput. (ICPC)
[4]  
DOD's Environmental Research Programs, 2017, INT THINGS IOT OPP C
[5]  
Fotouhi H., 2014, TECH REP
[6]   mRPL: Boosting mobility in the Internet of Things [J].
Fotouhi, Hossein ;
Moreira, Daniel ;
Alves, Mario .
AD HOC NETWORKS, 2015, 26 :17-35
[7]  
Glissa G, 2017, INT WIREL COMMUN, P264, DOI 10.1109/IWCMC.2017.7986297
[8]   Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues [J].
Granjal, Jorge ;
Monteiro, Edmundo ;
Silva, Jorge Sa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03) :1294-1312
[9]   Management and applications of trust in Wireless Sensor Networks: A survey [J].
Han, Guangjie ;
Jiang, Jinfang ;
Shu, Lei ;
Niu, Jianwei ;
Chao, Han-Chieh .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) :602-617
[10]  
Hasbullah Iznan H., 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST), P275, DOI 10.1109/PST.2016.7906974