David Airehrour, Jairo A. Gutierrez, Sayan Kumar Ray
RPL; SecTrust; SecTrust-RPL; Trust; Rank attacks; Sybil attacks.
Kumar Ray Technical University
Future Generation Computer Systems
A B S T R A C T
The Routing Protocol for Low-Power and Lossy Networks (RPL), the de facto routing protocol for Internet of Things (IoT) offers little protection against various forms of routing attacks. An attacker can exploit the routing system of RPL to launch destructive and devastating attacks against an IoT network. Popular among these IoT attacks are Rank and Sybil attacks. To secure IoT networks from routing attacks, a time-based trust-aware RPL routing protocol (SecTrust-RPL) is proposed and implemented. The Secure Trust (SecTrust) trust system is embedded into the RPL routing protocol to provide protection against Rank and Sybil attacks. SecTrust-RPL uses a trust-based mechanism to detect and isolate attacks while optimizing network performance. The performance of SecTrust-RPL is compared with the standard RPL protocol. SecTrust-RPL protocol demonstrates its superior performance over the standard RPL protocol in the detection and isolation of Rank and Sybil attacks. The effectiveness and resilience of SecTrust-RPL is demonstrated through extensive simulation studies and testbed experiments. Based on SecTrust-RPL, we show as a proof-of-concept the viability of using trust as an effective security system for mitigating attacks in IoT networks.
The Internet of Things is a technological revolution that has emerged from previous technologies including Mobile Ad hoc NETworks (MANETs) and Wireless Sensor Networks (WSN) . MANET is a network of free and mobile nodes (devices) communicating in an ad hoc manner without the aid of any centralized administrative infrastructure like access points or base stations. They are self-configuring, and could communicate to achieve the specific purpose for which they are set up. Therefore, they are referred to as Self-Organizing Networks (SONs) . MANET nodes communicate in a peer-to-peer manner with directly connected neighbours. Due to their mobility and limited battery life, they are limited in their transmission power and bandwidth availability. Mobile nodes in ad hoc networks often cooperate to transmit data and route information to other nodes that they are not directly connected to each other hence, they act as routers where they compute routes and create routing tables of destination to other nodes The Internet of Things (IoT) is the widespread use of systems, heterogeneous technologies and the evolving paradigm of the interconnectedness of devices, using TCP/IP protocols, around our physical environments . The application of IoT could be found in many areas of the economy ranging from agriculture, building and management automation, industrial smart grids systems, water grids and smart cities. The sensors deployed in these kinds of networks are energy-constrained; they perform storage and computational functions while communicating over lossy channels. One of the fundamental driving forces of IoT is networking and particularly routing, which drives and facilitates the interconnection of devices . A major consideration during IoT routing are: scalability, autonomy and secure communication and energy efficiency . However, the unique characteristics of IoT networks make them vulnerable to attacks. Consequently, routing and secure data communication have become topical research concerns in IoT . As noted by , routing and addressing are two important issues in IoT, which need to be dealt with since network topologies across several networks vary and the need for common understanding and uniformity is important for proper routing of a packet originating or arriving at an IoT enabled device. Undeniably, the roadmap to achieving ubiquitous IoT brings various challenges ranging from device integration, heterogeneity, scalability to mobility, routing, security and other specific challenges . It is clear from the above that IoT security is an aspect that requires in-depth research work as the need to secure networks today have become imperative.
دریافت لینک دانلود برای دریافت فایل مدنظر نام و ایمیل خود را در فرم زیر وارد کنید تا لینک دانلود برای شما ارسال شود حتما آدرس ایمیل خود را به صورت صحیح وارد کنید .
No post found