A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things

被引:15
|
作者
Muzammal, Syeda Mariam [1 ]
Murugesan, Raja Kumar [2 ]
Jhanjhi, Noor Zaman [2 ]
Humayun, Mamoona [3 ]
Ibrahim, Ashraf Osman [4 ]
Abdelmaboud, Abdelzahir [5 ]
机构
[1] PMAS Arid Agr Univ, Univ Inst Informat Technol, Rawalpindi 46000, Pakistan
[2] Taylors Univ, Sch Comp Sci, SCE, Lakeside Campus, Subang Jaya 47500, Malaysia
[3] Jouf Univ, Coll Comp & Informat Sci, Dept Informat Syst, Sakaka 72388, Saudi Arabia
[4] Univ Malaysia Sabah, Fac Comp & Informat, Kota Kinabalu 88400, Sabah, Malaysia
[5] King Khalid Univ, Dept Informat Syst, Muhayel Aseer 61913, Saudi Arabia
关键词
internet of things; IoT security; trust; RPL attacks; routing attacks; rank; blackhole; IOT; PROTOCOL;
D O I
10.3390/s22187052
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with the increase in the number of IoT applications and devices globally. To address routing attacks in RPL-based IoT, several security solutions have been proposed in literature, such as machine learning techniques, intrusion detection systems, and trust-based approaches. Studies show that trust-based security for IoT is feasible due to its simple integration and resource-constrained nature of smart devices. Existing trust-based solutions have insufficient consideration of nodes' mobility and are not evaluated for dynamic scenarios to satisfy the requirements of smart applications. This research work addresses the Rank and Blackhole attacks in RPL considering the static as well as mobile nodes in IoT. The proposed Security, Mobility, and Trust-based model (SMTrust) relies on carefully chosen trust factors and metrics, including mobility-based metrics. The evaluation of the proposed model through simulation experiments shows that SMTrust performs better than the existing trust-based methods for securing RPL. The improvisation in terms of topology stability is 46%, reduction in packet loss rate is 45%, and 35% increase in throughput, with only 2.3% increase in average power consumption.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications
    Ragesh, G. K.
    Kumar, Ajay
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (03): : 2882 - 2909
  • [42] A New Trust Model to secure Routing Protocols against DoS attacks in MANETs
    Echchaachoui, Adel
    Kobbane, Abdellatif
    Elkoutbi, Mohammed
    2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA), 2015,
  • [43] Improved Secure Trust-based Location-Aided Routing Model for MANETs
    Kun, Wang
    Meng, Wu
    CHINA COMMUNICATIONS, 2011, 8 (03) : 154 - 162
  • [44] A Segregated Architecture for a Trust-based Network of Internet of Things
    Ferraris, Davide
    Fernandez-Gago, Carmen
    Daniel, Joshua
    Lopez, Javier
    2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,
  • [45] An improved trust-based security framework for internet of things
    Renjith P.N.
    Ramesh K.
    Sasikumar S.
    International Journal of Information Technology, 2021, 13 (2) : 677 - 685
  • [46] Trust-based Model for Securing Vehicular Networks Against RSU Attacks
    Alnasser, Aljawharah
    Sun, Hongjian
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021), 2021,
  • [47] Research on Trust-Based Access Control in The Internet of Things
    Cheng, Xiao-hui
    Hu, Meng
    Wang, Tong
    Deng, Yun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 283 - 288
  • [48] Trust-based Context Contract Models for the Internet of Things
    Machara, Samer
    Chabridon, Sophie
    Taconet, Chantal
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, 2013, : 557 - 562
  • [49] Trust-based energy-efficient routing protocol for Internet of things-based sensor networks
    Ilyas, Muhammad
    Ullah, Zahid
    Khan, Fakhri Alam
    Chaudary, Muhammad Hasanain
    Malik, Muhammad Sheraz Arshed
    Zaheer, Zafar
    Durrani, Hamood Ur Rehman
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (10):
  • [50] Physical Identification Based Trust Path Routing Against Sybil Attacks on RPL in IoT Networks
    Kim, Jae-Dong
    Ko, Minseok
    Chung, Jong-Moon
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (05) : 1102 - 1106