A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things

被引:15
作者
Muzammal, Syeda Mariam [1 ]
Murugesan, Raja Kumar [2 ]
Jhanjhi, Noor Zaman [2 ]
Humayun, Mamoona [3 ]
Ibrahim, Ashraf Osman [4 ]
Abdelmaboud, Abdelzahir [5 ]
机构
[1] PMAS Arid Agr Univ, Univ Inst Informat Technol, Rawalpindi 46000, Pakistan
[2] Taylors Univ, Sch Comp Sci, SCE, Lakeside Campus, Subang Jaya 47500, Malaysia
[3] Jouf Univ, Coll Comp & Informat Sci, Dept Informat Syst, Sakaka 72388, Saudi Arabia
[4] Univ Malaysia Sabah, Fac Comp & Informat, Kota Kinabalu 88400, Sabah, Malaysia
[5] King Khalid Univ, Dept Informat Syst, Muhayel Aseer 61913, Saudi Arabia
关键词
internet of things; IoT security; trust; RPL attacks; routing attacks; rank; blackhole; IOT; PROTOCOL;
D O I
10.3390/s22187052
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with the increase in the number of IoT applications and devices globally. To address routing attacks in RPL-based IoT, several security solutions have been proposed in literature, such as machine learning techniques, intrusion detection systems, and trust-based approaches. Studies show that trust-based security for IoT is feasible due to its simple integration and resource-constrained nature of smart devices. Existing trust-based solutions have insufficient consideration of nodes' mobility and are not evaluated for dynamic scenarios to satisfy the requirements of smart applications. This research work addresses the Rank and Blackhole attacks in RPL considering the static as well as mobile nodes in IoT. The proposed Security, Mobility, and Trust-based model (SMTrust) relies on carefully chosen trust factors and metrics, including mobility-based metrics. The evaluation of the proposed model through simulation experiments shows that SMTrust performs better than the existing trust-based methods for securing RPL. The improvisation in terms of topology stability is 46%, reduction in packet loss rate is 45%, and 35% increase in throughput, with only 2.3% increase in average power consumption.
引用
收藏
页数:20
相关论文
共 50 条
  • [11] A comprehensive survey on RPL routing-based attacks, defences and future directions in Internet of Things
    Prajapati, Anil Kumar
    Pilli, Emmanuel S.
    Battula, Ramesh Babu
    Varadharajan, Vijay
    Verma, Abhishek
    Joshi, R. C.
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123
  • [12] Proposing a Secure RPL based Internet of Things Routing Protocol: A Review
    Almusaylim, Zahrah A.
    Alhumam, Abdulaziz
    Jhanjhi, N. Z.
    AD HOC NETWORKS, 2020, 101
  • [13] A Secure Trust-Based Key Distribution With Self-Healing for Internet of Things
    Han, Song
    Gu, Mianxue
    Yang, Bailin
    Lin, Jianhong
    Hong, Haibo
    Kong, Mengjiao
    IEEE ACCESS, 2019, 7 : 114060 - 114076
  • [14] Reliable-RPL: A Reliability-Aware RPL Protocol Using Trust-Based Blockchain System for Internet of Things
    Aguru, Aswani Devi
    Pandey, Amrit
    Erukala, Suresh Babu
    Bashir, Ali Kashif
    Zhu, Yaodong
    Kaluri, Rajesh
    Gadekallu, Thippa Reddy
    IEEE TRANSACTIONS ON RELIABILITY, 2024,
  • [15] SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things
    Conti, Mauro
    Kaliyar, Pallavi
    Rabbani, Md Masoom
    Ranise, Silvio
    2018 14TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB 2018), 2018,
  • [16] Mitigating Denial of Service Attacks in RPL-Based IoT Environments: Trust-Based Approach
    Azzedin, Farag
    IEEE ACCESS, 2023, 11 : 129077 - 129089
  • [17] Trust-based recommendation systems in Internet of Things: a systematic literature review
    Mohammadi, Venus
    Rahmani, Amir Masoud
    Darwesh, Aso Mohammed
    Sahafi, Amir
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2019, 9 (01)
  • [18] A trust-based Probing to secure data routing
    Bouabana-Tebibel, Thouraya
    Tebibel, Nidal
    Zemmouri, Selma
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1592 - 1597
  • [19] Physical Identification Based Trust Path Routing Against Sybil Attacks on RPL in IoT Networks
    Kim, Jae-Dong
    Ko, Minseok
    Chung, Jong-Moon
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (05) : 1102 - 1106
  • [20] A Trust-Based Predictive Model for Mobile Ad Hoc Network in Internet of Things
    Alnumay, Waleed
    Ghosh, Uttam
    Chatterjee, Pushpita
    SENSORS, 2019, 19 (06)