Jan Kantert, C. Ringwald, Georg von Zengen, Sven Tomforde, L. Wolf, C. Müller-Schloer
{"title":"Enhancing RPL for Robust and Efficient Routing in Challenging Environments","authors":"Jan Kantert, C. Ringwald, Georg von Zengen, Sven Tomforde, L. Wolf, C. Müller-Schloer","doi":"10.1109/SASOW.2015.6","DOIUrl":null,"url":null,"abstract":"In typical settings for Wireless Sensor Networks (WSNs), a potentially large set of nodes operates under strict requirements concerning energy consumption and packet delivery success. If non-reliable or even malicious nodes participate, standard protocols can suffer in performance which may result in a limited functionality of the whole network. This paper addresses this issue by establishing end-to-end trust relationships among nodes with the goal to isolate malicious nodes. In order to increase the scalability towards large-scale system sizes, we extend the mechanism with an adaptive signature mechanism as basis for the trust value distribution technique. Evaluations cover a theoretical discussion and a simulation-based setting. The results show that malicious nodes can be quickly isolated. Thereby, the already low additional effort for trust can be reduced significantly compared to reference solutions.","PeriodicalId":384469,"journal":{"name":"2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops","volume":"88 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SASOW.2015.6","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
In typical settings for Wireless Sensor Networks (WSNs), a potentially large set of nodes operates under strict requirements concerning energy consumption and packet delivery success. If non-reliable or even malicious nodes participate, standard protocols can suffer in performance which may result in a limited functionality of the whole network. This paper addresses this issue by establishing end-to-end trust relationships among nodes with the goal to isolate malicious nodes. In order to increase the scalability towards large-scale system sizes, we extend the mechanism with an adaptive signature mechanism as basis for the trust value distribution technique. Evaluations cover a theoretical discussion and a simulation-based setting. The results show that malicious nodes can be quickly isolated. Thereby, the already low additional effort for trust can be reduced significantly compared to reference solutions.