Abstract
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with the increase in the number of IoT applications and devices globally. To address routing attacks in RPL-based IoT, several security solutions have been proposed in literature, such as machine learning techniques, intrusion detection systems, and trust-based approaches. Studies show that trust-based security for IoT is feasible due to its simple integration and resource-constrained nature of smart devices. Existing trust-based solutions have insufficient consideration of nodes’ mobility and are not evaluated for dynamic scenarios to satisfy the requirements of smart applications. This research work addresses the Rank and Blackhole attacks in RPL considering the static as well as mobile nodes in IoT. The proposed Security, Mobility, and Trust-based model (SMTrust) relies on carefully chosen trust factors and metrics, including mobility-based metrics. The evaluation of the proposed model through simulation experiments shows that SMTrust performs better than the existing trust-based methods for securing RPL. The improvisation in terms of topology stability is 46%, reduction in packet loss rate is 45%, and 35% increase in throughput, with only 2.3% increase in average power consumption.
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference56 articles.
1. Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication
2. Counter Measuring Conceivable Security Threats on Smart Healthcare Devices
3. Cisco’s Talos Intelligence Group Blog: New VPNFilter Malware Targets at Least 500K Networking Devices Worldwide
https://blog.talosintelligence.com/2018/05/VPNFilter.html
4. Number of Connected Devices Worldwide 2030 | Statista. Statista Research Department
https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/
5. ScreenStealer: Addressing Screenshot attacks on Android devices
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献