SMTrust: Proposing Trust-Based Secure Routing Protocol for RPL Attacks for IoT Applications

S. M. Muzammal, R. Murugesan, N. Jhanjhi, L. T. Jung
{"title":"SMTrust: Proposing Trust-Based Secure Routing Protocol for RPL Attacks for IoT Applications","authors":"S. M. Muzammal, R. Murugesan, N. Jhanjhi, L. T. Jung","doi":"10.1109/ICCI51257.2020.9247818","DOIUrl":null,"url":null,"abstract":"With large scale generation and exchange of data between IoT devices and constrained IoT security to protect data communication, it becomes easy for attackers to compromise data routes. In IoT networks, IPv6 Routing Protocol is the de facto routing protocol for Low Power and Lossy Networks (RPL). RPL offers limited security against several RPL-specific and WSN-inherited attacks in IoT applications. Additionally, IoT devices are limited in memory, processing, and power to operate properly using the traditional Internet and routing security solutions. Several mitigation schemes for the security of IoT networks and routing, have been proposed including Machine Learning-based, IDS-based, and Trust-based approaches. In existing trust-based methods, mobility of nodes is not considered at all or its insufficient for mobile sink nodes, specifically for security against RPL attacks. This research work proposes a conceptual design, named SMTrust, for security of routing protocol in IoT, considering the mobility-based trust metrics. The proposed solution intends to provide defense against popular RPL attacks, for example, Blackhole, Greyhole, Rank, Version Number attacks, etc. We believe that SMTrust shall provide better network performance for attacks detection accuracy, mobility and scalability as compared to existing trust models, such as, DCTM-RPL and SecTrust-RPL. The novelty of our solution is that it considers the mobility metrics of the sensor nodes as well as the sink nodes, which has not been addressed by the existing models. This consideration makes it suitable for mobile IoT environment. The proposed design of SMTrust, as secure routing protocol, when embedded in RPL, shall ensure confidentiality, integrity, and availability among the sensor nodes during routing process in IoT communication and networks.","PeriodicalId":194158,"journal":{"name":"2020 International Conference on Computational Intelligence (ICCI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Computational Intelligence (ICCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCI51257.2020.9247818","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18

Abstract

With large scale generation and exchange of data between IoT devices and constrained IoT security to protect data communication, it becomes easy for attackers to compromise data routes. In IoT networks, IPv6 Routing Protocol is the de facto routing protocol for Low Power and Lossy Networks (RPL). RPL offers limited security against several RPL-specific and WSN-inherited attacks in IoT applications. Additionally, IoT devices are limited in memory, processing, and power to operate properly using the traditional Internet and routing security solutions. Several mitigation schemes for the security of IoT networks and routing, have been proposed including Machine Learning-based, IDS-based, and Trust-based approaches. In existing trust-based methods, mobility of nodes is not considered at all or its insufficient for mobile sink nodes, specifically for security against RPL attacks. This research work proposes a conceptual design, named SMTrust, for security of routing protocol in IoT, considering the mobility-based trust metrics. The proposed solution intends to provide defense against popular RPL attacks, for example, Blackhole, Greyhole, Rank, Version Number attacks, etc. We believe that SMTrust shall provide better network performance for attacks detection accuracy, mobility and scalability as compared to existing trust models, such as, DCTM-RPL and SecTrust-RPL. The novelty of our solution is that it considers the mobility metrics of the sensor nodes as well as the sink nodes, which has not been addressed by the existing models. This consideration makes it suitable for mobile IoT environment. The proposed design of SMTrust, as secure routing protocol, when embedded in RPL, shall ensure confidentiality, integrity, and availability among the sensor nodes during routing process in IoT communication and networks.
SMTrust:针对物联网应用的RPL攻击,提出基于信任的安全路由协议
随着物联网设备之间数据的大规模生成和交换以及物联网安全保护数据通信的限制,攻击者很容易破坏数据路由。在物联网网络中,IPv6路由协议是低功耗和有损网络(RPL)的事实上的路由协议。在物联网应用中,针对几种特定于RPL和wsn继承的攻击,RPL提供了有限的安全性。此外,物联网设备在内存、处理和功率方面受到限制,无法使用传统的互联网和路由安全解决方案正常运行。针对物联网网络和路由的安全性,已经提出了几种缓解方案,包括基于机器学习、基于ids和基于信任的方法。在现有的基于信任的方法中,根本没有考虑节点的移动性,或者对移动sink节点的移动性考虑不足,特别是对RPL攻击的安全性考虑不足。考虑到基于移动性的信任指标,本研究提出了一种名为SMTrust的物联网路由协议安全性概念设计。提出的解决方案旨在提供针对流行的RPL攻击的防御,例如黑洞,灰洞,Rank,版本号攻击等。我们认为,相对于现有的信任模型,如DCTM-RPL和SecTrust-RPL, SMTrust将在攻击检测准确性、移动性和可扩展性方面提供更好的网络性能。我们的解决方案的新颖之处在于它考虑了传感器节点和汇聚节点的移动性指标,这是现有模型没有解决的问题。这种考虑使其适用于移动物联网环境。SMTrust作为安全路由协议,嵌入到RPL中,保证物联网通信和网络路由过程中传感器节点之间的保密性、完整性和可用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信