A spatio-temporal graph learning framework with attention mechanism for secure RPL in mobile IoT

IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Ad Hoc Networks Pub Date : 2026-04-15 Epub Date: 2026-01-27 DOI:10.1016/j.adhoc.2026.104156
Zohre Shoaei, Rasool Esmaeilyfard, Reza Javidan
{"title":"A spatio-temporal graph learning framework with attention mechanism for secure RPL in mobile IoT","authors":"Zohre Shoaei,&nbsp;Rasool Esmaeilyfard,&nbsp;Reza Javidan","doi":"10.1016/j.adhoc.2026.104156","DOIUrl":null,"url":null,"abstract":"<div><div>Mobility‑aware IoT networks operate under rapidly shifting topologies, where even authorized nodes can perform stealthy routing attacks that bypass standard cryptographic defenses. These threats are compounded by dynamic connectivity patterns, fluctuating link qualities, and heterogeneous node behaviors, creating a high‑dimensional, non‑stationary security landscape. We introduce a temporal–spatial trust framework that represents the network as a continuously evolving dynamic graph, embedding per‑node behavioral states together with aggregated neighborhood patterns across structural, mobility, and traffic domains. These high‑context sequences feed into a multi‑layer GRU‑based Sequence‑to‑Sequence architecture equipped with multi‑head attention, enabling concurrent modeling of local temporal fluctuations and long‑range spatial dependencies. A composite trust scoring mechanism integrates model‑inferred anomalies with deterministic protocol checks and peer‑reported reputation, regulated by hyper‑parameter‑optimized fusion weights. Trust scores are embedded into RPL’s rank metric and filtered through a hysteresis‑governed parent selection policy to ensure both rapid threat isolation and topological stability. Extensive simulations in Contiki-NG, leveraging real-world urban mobility traces from the Microsoft GeoLife dataset and the RADAR benchmark, demonstrate robustness against five specific threats (Rank, Blackhole, Sybil, Sinkhole, and Selective Forwarding). Results indicate up to 96 % detection accuracy, a 38 % reduction in detection latency, and 20–40 % lower control overhead, all while maintaining a runtime memory footprint under 10 KB. By combining dynamic graph‑based context encoding, attention‑driven sequence learning, and multi‑source trust fusion, the proposed approach offers a deployable, high‑fidelity, and scalable security enhancement for RPL in next‑generation IoT environments.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"185 ","pages":"Article 104156"},"PeriodicalIF":4.8000,"publicationDate":"2026-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ad Hoc Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1570870526000223","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2026/1/27 0:00:00","PubModel":"Epub","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Mobility‑aware IoT networks operate under rapidly shifting topologies, where even authorized nodes can perform stealthy routing attacks that bypass standard cryptographic defenses. These threats are compounded by dynamic connectivity patterns, fluctuating link qualities, and heterogeneous node behaviors, creating a high‑dimensional, non‑stationary security landscape. We introduce a temporal–spatial trust framework that represents the network as a continuously evolving dynamic graph, embedding per‑node behavioral states together with aggregated neighborhood patterns across structural, mobility, and traffic domains. These high‑context sequences feed into a multi‑layer GRU‑based Sequence‑to‑Sequence architecture equipped with multi‑head attention, enabling concurrent modeling of local temporal fluctuations and long‑range spatial dependencies. A composite trust scoring mechanism integrates model‑inferred anomalies with deterministic protocol checks and peer‑reported reputation, regulated by hyper‑parameter‑optimized fusion weights. Trust scores are embedded into RPL’s rank metric and filtered through a hysteresis‑governed parent selection policy to ensure both rapid threat isolation and topological stability. Extensive simulations in Contiki-NG, leveraging real-world urban mobility traces from the Microsoft GeoLife dataset and the RADAR benchmark, demonstrate robustness against five specific threats (Rank, Blackhole, Sybil, Sinkhole, and Selective Forwarding). Results indicate up to 96 % detection accuracy, a 38 % reduction in detection latency, and 20–40 % lower control overhead, all while maintaining a runtime memory footprint under 10 KB. By combining dynamic graph‑based context encoding, attention‑driven sequence learning, and multi‑source trust fusion, the proposed approach offers a deployable, high‑fidelity, and scalable security enhancement for RPL in next‑generation IoT environments.
基于注意机制的移动物联网安全RPL时空图学习框架
移动感知物联网网络在快速变化的拓扑下运行,即使是授权节点也可以执行绕过标准加密防御的隐形路由攻击。这些威胁与动态连接模式、波动的链接质量和异构节点行为相结合,形成了高维、非固定的安全环境。我们引入了一个时空信任框架,该框架将网络表示为一个不断发展的动态图,将每个节点的行为状态与跨结构、移动性和交通领域的聚合邻居模式嵌入在一起。这些高上下文序列输入到一个多层基于GRU的序列对序列架构中,该架构配备了多头关注,从而能够对局部时间波动和远程空间依赖性进行并发建模。复合信任评分机制将模型推断的异常与确定性协议检查和同行报告的声誉集成在一起,由超参数优化的融合权重调节。信任分数被嵌入到RPL的等级度量中,并通过滞后控制的亲本选择策略进行过滤,以确保快速隔离威胁和拓扑稳定性。在Contiki-NG中进行了大量模拟,利用来自微软GeoLife数据集和RADAR基准的真实城市交通轨迹,证明了对五种特定威胁(Rank, Blackhole, Sybil, Sinkhole和选择性转发)的鲁棒性。结果表明,检测准确率高达96%,检测延迟降低38%,控制开销降低20 - 40%,同时运行时内存占用保持在10 KB以下。通过结合基于动态图的上下文编码、注意力驱动的序列学习和多源信任融合,所提出的方法为下一代物联网环境中的RPL提供了可部署、高保真和可扩展的安全性增强。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Ad Hoc Networks
Ad Hoc Networks 工程技术-电信学
CiteScore
10.20
自引率
4.20%
发文量
131
审稿时长
4.8 months
期刊介绍: The Ad Hoc Networks is an international and archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in ad hoc and sensor networking areas. The Ad Hoc Networks considers original, high quality and unpublished contributions addressing all aspects of ad hoc and sensor networks. Specific areas of interest include, but are not limited to: Mobile and Wireless Ad Hoc Networks Sensor Networks Wireless Local and Personal Area Networks Home Networks Ad Hoc Networks of Autonomous Intelligent Systems Novel Architectures for Ad Hoc and Sensor Networks Self-organizing Network Architectures and Protocols Transport Layer Protocols Routing protocols (unicast, multicast, geocast, etc.) Media Access Control Techniques Error Control Schemes Power-Aware, Low-Power and Energy-Efficient Designs Synchronization and Scheduling Issues Mobility Management Mobility-Tolerant Communication Protocols Location Tracking and Location-based Services Resource and Information Management Security and Fault-Tolerance Issues Hardware and Software Platforms, Systems, and Testbeds Experimental and Prototype Results Quality-of-Service Issues Cross-Layer Interactions Scalability Issues Performance Analysis and Simulation of Protocols.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书