TARRP: Trust Aware RPL Routing Protocol for IoT

IF 1.7 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC
Mostafa Nazarian Parizi, Seyyed Hamid Ghafouri, Mohammad Sadegh Hajmohammadi
{"title":"TARRP: Trust Aware RPL Routing Protocol for IoT","authors":"Mostafa Nazarian Parizi,&nbsp;Seyyed Hamid Ghafouri,&nbsp;Mohammad Sadegh Hajmohammadi","doi":"10.1002/dac.6124","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The internet of things (IoT) is vulnerable to attacks due to its unique characteristics and numerous limitations, and it is highly prone to attack due to sensitive applications. Most of these attacks are aimed at routing and data transmission (which are the most vital pillars of IoT). So far, many research studies have been proposed to improve the security of routing and data transmission, and most of these methods have been developed based on trust models. Trust models are considered as a powerful and complementary tool for security systems that provide the ability to detect malicious nodes. However, most of these researches to advance their goals are only focused on examining the behavior of nodes during data transmission, and based on this, the trust value of nodes is calculated. This way of assessing trust is not enough due to the widespread attacks of malicious nodes. In this paper, a reliable routing method based on the optimization of IPv6 routing protocol for low power and lossy networks (RPL) routing protocol and trust models is introduced called TARRP (Trust Aware RPL Routing Protocol). TARRP is a two-step method in which the purpose of the first stage is to create a trusty and reliable topology. The second stage is to assess the trust and identify malicious nodes. In addition to implementing trust, TARRP also manages related recommendations and attacks. The results of simulations using cooja in different scenarios showed the superiority of TARRP in improving routing trust and data exchange compared to previous work.</p>\n </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 4","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Communication Systems","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/dac.6124","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

The internet of things (IoT) is vulnerable to attacks due to its unique characteristics and numerous limitations, and it is highly prone to attack due to sensitive applications. Most of these attacks are aimed at routing and data transmission (which are the most vital pillars of IoT). So far, many research studies have been proposed to improve the security of routing and data transmission, and most of these methods have been developed based on trust models. Trust models are considered as a powerful and complementary tool for security systems that provide the ability to detect malicious nodes. However, most of these researches to advance their goals are only focused on examining the behavior of nodes during data transmission, and based on this, the trust value of nodes is calculated. This way of assessing trust is not enough due to the widespread attacks of malicious nodes. In this paper, a reliable routing method based on the optimization of IPv6 routing protocol for low power and lossy networks (RPL) routing protocol and trust models is introduced called TARRP (Trust Aware RPL Routing Protocol). TARRP is a two-step method in which the purpose of the first stage is to create a trusty and reliable topology. The second stage is to assess the trust and identify malicious nodes. In addition to implementing trust, TARRP also manages related recommendations and attacks. The results of simulations using cooja in different scenarios showed the superiority of TARRP in improving routing trust and data exchange compared to previous work.

Abstract Image

物联网(IoT)因其独特的特性和众多限制而容易受到攻击,而且由于其应用敏感,极易受到攻击。这些攻击大多针对路由和数据传输(这是物联网最重要的支柱)。迄今为止,已有许多研究提出要提高路由和数据传输的安全性,其中大多数方法都是基于信任模型开发的。信任模型被认为是安全系统的强大补充工具,能提供检测恶意节点的能力。然而,这些研究为了推进目标,大多只关注检查节点在数据传输过程中的行为,并在此基础上计算节点的信任值。由于恶意节点的攻击非常普遍,这种评估信任度的方法是不够的。本文介绍了一种基于低功耗和有损网络(RPL)路由协议和信任模型的 IPv6 路由协议优化的可靠路由方法,称为 TARRP(Trust Aware RPL Routing Protocol)。TARRP 是一种分两步走的方法,第一阶段的目的是创建一个可信和可靠的拓扑结构。第二阶段是评估信任度并识别恶意节点。除了实施信任,TARRP 还管理相关建议和攻击。使用 cooja 在不同场景下进行的模拟结果表明,与之前的工作相比,TARRP 在改善路由信任和数据交换方面更具优势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
5.90
自引率
9.50%
发文量
323
审稿时长
7.9 months
期刊介绍: The International Journal of Communication Systems provides a forum for R&D, open to researchers from all types of institutions and organisations worldwide, aimed at the increasingly important area of communication technology. The Journal''s emphasis is particularly on the issues impacting behaviour at the system, service and management levels. Published twelve times a year, it provides coverage of advances that have a significant potential to impact the immense technical and commercial opportunities in the communications sector. The International Journal of Communication Systems strives to select a balance of contributions that promotes technical innovation allied to practical relevance across the range of system types and issues. The Journal addresses both public communication systems (Telecommunication, mobile, Internet, and Cable TV) and private systems (Intranets, enterprise networks, LANs, MANs, WANs). The following key areas and issues are regularly covered: -Transmission/Switching/Distribution technologies (ATM, SDH, TCP/IP, routers, DSL, cable modems, VoD, VoIP, WDM, etc.) -System control, network/service management -Network and Internet protocols and standards -Client-server, distributed and Web-based communication systems -Broadband and multimedia systems and applications, with a focus on increased service variety and interactivity -Trials of advanced systems and services; their implementation and evaluation -Novel concepts and improvements in technique; their theoretical basis and performance analysis using measurement/testing, modelling and simulation -Performance evaluation issues and methods.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信