A reputation-based RPL protocol to detect selective forwarding attack in Internet of Things

被引:17
作者
Patel, Anshuman [1 ]
Jinwala, Devesh [2 ]
机构
[1] Govt Polytech, Dept Informat Technol, Gandhinagar, Gujarat, India
[2] SN Natl Inst Technol, Dept Comp Engn, Surat, India
关键词
Internet of Things; intrusion detection system; reputation; RPL; selective forwarding attack; trust; GRAY-HOLE ATTACK; INTRUSION DETECTION;
D O I
10.1002/dac.5007
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet of Things (IoT) is an internet of smart objects where smart objects communicate with each other. IoT objects are deployed in open medium with dynamic topology. Due lack of infrastructure and centralized management, IoT present serious vulnerabilities to security attacks. Therefore, security is an essential prerequisite for the real-world deployment of IoT. In this work, we propose reputation-based RPL protocol where reputation-based mechanism is embedded into RPL protocol to enhance its capabilities against selective forwarding attack. Reputation is calculated by evaluating data forwarding behavior of IoT node. Data forwarding behavior of IoT node is evaluated by the difference between monitored actual packet loss and estimated normal loss. Calculated reputation value is considered in parent selection. Simulation results show that the proposed approach can accurately detect and isolate selective forwarding attack with improving data delivery ratio of the IoT network.
引用
收藏
页数:16
相关论文
共 32 条
  • [1] Airehrour D, 2017, J TELECOMMUN DIGIT E, V5, P50
  • [2] TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things
    Chen, Dong
    Chang, Guiran
    Sun, Dawei
    Li, Jiajia
    Jia, Jie
    Wang, Xingwei
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2011, 8 (04) : 1207 - 1228
  • [3] The DPC-Based Scheme for Detecting Selective Forwarding in Clustered Wireless Sensor Networks
    Ding, Jingze
    Zhang, Haotian
    Guo, Zixian
    Wu, Yuanming
    [J]. IEEE ACCESS, 2021, 9 : 20954 - 20967
  • [4] Trust -aware and cooperative routing protocol for IoT security
    Djedjig, Nabil
    Tandjaoui, Djamel
    Medjek, Faiza
    Romdhani, Imed
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [5] Dunkels, 2016, CONTIKI OPEN SOURCE
  • [6] Dunkels A., 2011, The ContikiMAC Radio Duty Cycling Protocol
  • [7] Dunkels A., 2011, Powertrace: Network-level Power Profiling for Low-power Wireless Networks Low-power Wireless
  • [8] Gara F, 2017, INT WIREL COMMUN, P276, DOI 10.1109/IWCMC.2017.7986299
  • [9] A novel approach for mitigating gray hole attack in MANET
    Gurung, Shashi
    Chauhan, Siddhartha
    [J]. WIRELESS NETWORKS, 2018, 24 (02) : 565 - 579
  • [10] Fuzzy, Dynamic and Trust Based Routing Protocol for IoT
    Hashemi, Seyyed Yasser
    Aliee, Fereidoon Shams
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2020, 28 (04) : 1248 - 1278