Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Dynamic and comprehensive trust model for IoT and its integration into RPL

Published: 01 July 2019 Publication History

Abstract

Ensuring security in IoT routing protocols is more challenging due to the fact that devices are mobile, resource constrained, and heterogeneous. The routing protocol for low-power and lossy networks (RPL) as the de facto routing protocol for IoT provides a little protection against routing attacks. On the other hand, the standard RPL because of the use of a single metric in routing has limitations that ultimately results in loss of network performance. To overcome the limitations of the use of a single metric and to prevent the consequences of routing attacks, we used the concept of trust and propose dynamic and comprehensive trust model for IoT (DCTM-IoT) and integrate it into RPL (DCTM-RPL). We provide a comprehensive hierarchical model for trusting of things in IoT, which has a multi-dimensional vision of trust. We put the combination of metrics and necessary activities to deal with attacks under the umbrella of trust level calculation. The performance of DCTM-RPL is compared with the standard RPL protocol in mobile environment and under routing major attacks. DCTM-RPL demonstrates its superior performance over the standard RPL protocol in the detection and isolation attacks. The DCTM-RPL, in addition to resistance mitigating routing attacks, improves network performance.

References

[1]
Kang M, Na O, Chang H (2016) Evaluation of groundwater quality in a rural community in North Central of Nigeria. J Supercomput 72:103.
[2]
Koo C, Kim J (2018) Enforcing high-level security policies for Internet of Things. J Supercomput 74:4497.
[3]
Borujeni EM, Rahbari D, Nickray M (2018) Fog-based energy-efficient routing protocol for wireless sensor networks. J Supercomput.
[4]
Sharma D, Ojha A, Bhondekar AP (2018) Heterogeneity consideration in wireless sensor networks routing algorithms: a review. J Supercomput.
[5]
Winter T, Thubert P, Brandt A, Hui JW, Kelsey R, Levis P, Pister KS, Struik R, Vasseur J, Alexander RK (2012) RPL: IPv6 routing protocol for low-power and lossy networks. RFC 6550:1---157
[6]
Tseng F, Chou L, Chao H (2011) A survey of black hole attacks in wireless mobile ad hoc networks. Hum Cent Comput Inf Sci 1:1---16
[7]
Gaddour O, Koubaa A, Baccour N, Abid M (2014) OF-FL: QoS-aware fuzzy logic objective function for the RPL routing protocol. In: 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), pp 365---372
[8]
Gaddour O, Koubaa A (2012) RPL in a nutshell: a survey. Comput Netw 56:3163---3178
[9]
Vasseur J, Kim M, Pister KS, Dejean N, Barthel D (2012) Routing metrics used for path calculation in low-power and lossy networks. RFC 6551:1---30
[10]
Thubert P (2012) Objective function zero for the routing protocol for low-power and lossy networks (RPL). RFC 6552:1---14
[11]
Gnawali O, Levis P (2012) Internet engineering task force (ietf) the minimum rank with hysteresis objective function
[12]
Lamaazi H, Benamar N (2018) OF-EC: a novel energy consumption aware objective function for RPL based on fuzzy logic. J Netw Comput Appl 117:42---58
[13]
Sharkawy B, Khattab A, Elsayed KM (2014) Fault-tolerant RPL through context awareness. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp 437---441
[14]
Gaddour O, Koubaa A, Abid M (2015) Quality-of-service aware routing for static and mobile IPv6-based low-power and lossy sensor networks using RPL. Adhoc Netw 33:233---256
[15]
Kharrufa H, Al-Kashoash HA, Kemp AH (2018) A game theoretic optimization of RPL for mobile Internet of Things applications. IEEE Sens J 18:2520---2530
[16]
Karkazis P, Leligou H, Sarakis L, Zahariadis TB, Trakadas P, Velivassaki TH, Capsalis CN (2012) Design of primary and composite routing metrics for RPL-compliant wireless sensor networks. Int Conf Telecommun Multimed (TEMU) 2012:13---18
[17]
Hong K, Choi L (2011) DAG-based multipath routing for mobile sensor networks. ICTC 2011:261---266
[18]
Airehrour D, Gutierrez JA, Ray SK (2018) SecTrust-RPL: a secure trust-aware RPL routing protocol for Internet of Things. Future Gener Comput Syst.
[19]
Djedjig N, Tandjaoui D, Medjek F (2015) Trust-based RPL for the Internet of Things. In: 2015 IEEE Symposium on Computers and Communication (ISCC), pp 962---967
[20]
Djedjig N, Tandjaoui D, Medjek F, Romdhani I (2017) New trust metric for the RPL routing protocol. In: 2017 8th International Conference on Information and Communication Systems (ICICS), pp 328---335
[21]
Iuchi K, Matsunaga T, Toyoda K, Sasase I (2015) Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network. In: 2015 21st Asia-Pacific Conference on Communications (APCC), pp 299---303
[22]
Seeber S, Sehgal A, Stelte B, Rodosek GD, Schnwlder J (2013) Towards a trust computing architecture for RPL in cyber physical systems. In: Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013), pp 134---137
[23]
Guclu SO, Ozcelebi T, Lukkien JJ (2016) Trust-based neighbor unreachability detection for RPL. In: 2016 25th International Conference on Computer Communication and Networks (ICCCN), pp 1---6
[24]
Mayzaud A, Badonnel R, Chrisment I (2016) A taxonomy of attacks in RPL-based Internet of Things. Int J Netw Secur 18:459---473
[25]
Frigyik BA, Kapila A, Gupta MR (2010) Introduction to the Dirichlet distribution and related processes
[26]
Zhang W, Zhu S, Tang J et al (2018) A novel trust management scheme based on Dempster---Shafer evidence theory for malicious nodes detection in wireless sensor networks. J Supercomput 74:1779.
[27]
Mui L, Mohtashemi M (2001) A computational model of trust and reputation. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences, HICSS
[28]
Bernab JB, Ramos JL, Gmez-Skarmeta AF (2016) TACIoT: multidimensional trust-aware access control system for the Internet of Things. Soft Comput 20:1763---1779
[29]
Dunkels A, Schmidt O, Finne N, Eriksson J, sterlind F, Tsiftes N, Durvy M (2011) The Contiki OS: the operating system for the Internet of Things. http://www.contiki-os.org. Accessed 01 Sept 2018
[30]
Aschenbruck N, Ernst R, Gerhards-Padilla E, Schwamborn M (2010) BonnMotion: a mobility scenario generation and analysis tool. In: SimuTools
[31]
Baccour N, Koubaa A, Jama MB, Youssef H, Zuniga M, Alves M (2009) A comparative simulation study of link quality estimators in wireless sensor networks. In: 2009 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp 1---10

Cited By

View all
  1. Dynamic and comprehensive trust model for IoT and its integration into RPL

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image The Journal of Supercomputing
    The Journal of Supercomputing  Volume 75, Issue 7
    July 2019
    628 pages

    Publisher

    Kluwer Academic Publishers

    United States

    Publication History

    Published: 01 July 2019

    Author Tags

    1. DCTM-IoT
    2. DCTM-RPL
    3. Internet of Things
    4. RPL
    5. Routing attacks
    6. Trust model

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)MCTE-RPLJournal of Network and Computer Applications10.1016/j.jnca.2024.103937229:COnline publication date: 1-Sep-2024
    • (2024)RETRACTEDTransactions on Emerging Telecommunications Technologies10.1002/ett.460035:10Online publication date: 9-Oct-2024
    • (2022)MFO-RPLComputer Standards & Interfaces10.1016/j.csi.2022.10362282:COnline publication date: 1-Aug-2022
    • (2022)Toward pre-standardization of reputation-based trust models beyond 5GComputer Standards & Interfaces10.1016/j.csi.2021.10359681:COnline publication date: 1-Apr-2022
    • (2022)A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest – RFTRUSTComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2021.108413198:COnline publication date: 22-Apr-2022
    • (2022)An Intrusion Detection System using Deep Cellular Learning Automata and Semantic Hierarchy for Enhancing RPL Protocol SecurityCluster Computing10.1007/s10586-022-03820-y26:4(2443-2461)Online publication date: 26-Dec-2022
    • (2021)A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use caseThe Journal of Supercomputing10.1007/s11227-021-03816-277:12(13703-13738)Online publication date: 1-Dec-2021
    • (2020)Fuzzy, Dynamic and Trust Based Routing Protocol for IoTJournal of Network and Systems Management10.1007/s10922-020-09535-y28:4(1248-1278)Online publication date: 1-Oct-2020

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media