A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things

被引:15
作者
Muzammal, Syeda Mariam [1 ]
Murugesan, Raja Kumar [2 ]
Jhanjhi, Noor Zaman [2 ]
Humayun, Mamoona [3 ]
Ibrahim, Ashraf Osman [4 ]
Abdelmaboud, Abdelzahir [5 ]
机构
[1] PMAS Arid Agr Univ, Univ Inst Informat Technol, Rawalpindi 46000, Pakistan
[2] Taylors Univ, Sch Comp Sci, SCE, Lakeside Campus, Subang Jaya 47500, Malaysia
[3] Jouf Univ, Coll Comp & Informat Sci, Dept Informat Syst, Sakaka 72388, Saudi Arabia
[4] Univ Malaysia Sabah, Fac Comp & Informat, Kota Kinabalu 88400, Sabah, Malaysia
[5] King Khalid Univ, Dept Informat Syst, Muhayel Aseer 61913, Saudi Arabia
关键词
internet of things; IoT security; trust; RPL attacks; routing attacks; rank; blackhole; IOT; PROTOCOL;
D O I
10.3390/s22187052
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with the increase in the number of IoT applications and devices globally. To address routing attacks in RPL-based IoT, several security solutions have been proposed in literature, such as machine learning techniques, intrusion detection systems, and trust-based approaches. Studies show that trust-based security for IoT is feasible due to its simple integration and resource-constrained nature of smart devices. Existing trust-based solutions have insufficient consideration of nodes' mobility and are not evaluated for dynamic scenarios to satisfy the requirements of smart applications. This research work addresses the Rank and Blackhole attacks in RPL considering the static as well as mobile nodes in IoT. The proposed Security, Mobility, and Trust-based model (SMTrust) relies on carefully chosen trust factors and metrics, including mobility-based metrics. The evaluation of the proposed model through simulation experiments shows that SMTrust performs better than the existing trust-based methods for securing RPL. The improvisation in terms of topology stability is 46%, reduction in packet loss rate is 45%, and 35% increase in throughput, with only 2.3% increase in average power consumption.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] An improved trust-based security framework for internet of things
    Renjith P.N.
    Ramesh K.
    Sasikumar S.
    International Journal of Information Technology, 2021, 13 (2) : 677 - 685
  • [32] Trust-based Model for Securing Vehicular Networks Against RSU Attacks
    Alnasser, Aljawharah
    Sun, Hongjian
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021), 2021,
  • [33] Research on Trust-Based Access Control in The Internet of Things
    Cheng, Xiao-hui
    Hu, Meng
    Wang, Tong
    Deng, Yun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 283 - 288
  • [34] A lightweight trust-based system to ensure security on the Internet of Battlefield Things (IoBT) environment
    Rahamathullah, U.
    Karthikeyan, E.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2021,
  • [35] A Segregated Architecture for a Trust-based Network of Internet of Things
    Ferraris, Davide
    Fernandez-Gago, Carmen
    Daniel, Joshua
    Lopez, Javier
    2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,
  • [36] A Trust-Based Situation Awareness System for Military Applications of the Internet of Things
    Glowacka, Joanna
    Krygier, Jaroslaw
    Amanowicz, Marek
    2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 490 - 495
  • [37] Fuzzy trust-based aggregator sensor node election in internet of things
    Rajesh, G.
    Raajini, X. Mercilin
    Vinayagasundaram, B.
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2016, 9 (2-3) : 151 - 160
  • [38] Trust-based energy-efficient routing protocol for Internet of things-based sensor networks
    Ilyas, Muhammad
    Ullah, Zahid
    Khan, Fakhri Alam
    Chaudary, Muhammad Hasanain
    Malik, Muhammad Sheraz Arshed
    Zaheer, Zafar
    Durrani, Hamood Ur Rehman
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (10):
  • [39] Detection of malicious packet dropping attacks in RPL-based internet of things
    Shin, Sooyeon
    Kim, Kyounghoon
    Kwon, Taekyoung
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2019, 31 (02) : 133 - 141
  • [40] Decision Tree Trust (DTTrust)-Based Authentication Mechanism to Secure RPL Routing Protocol on Internet of Battlefield Thing (IoBT)
    Kannimuthu, Prathapchandran
    Thangamuthu, Janani
    INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2021, 17 (01) : 1 - 23