{"title":"A spatio-temporal graph learning framework with attention mechanism for secure RPL in mobile IoT","authors":"Zohre Shoaei, Rasool Esmaeilyfard, Reza Javidan","doi":"10.1016/j.adhoc.2026.104156","DOIUrl":null,"url":null,"abstract":"<div><div>Mobility‑aware IoT networks operate under rapidly shifting topologies, where even authorized nodes can perform stealthy routing attacks that bypass standard cryptographic defenses. These threats are compounded by dynamic connectivity patterns, fluctuating link qualities, and heterogeneous node behaviors, creating a high‑dimensional, non‑stationary security landscape. We introduce a temporal–spatial trust framework that represents the network as a continuously evolving dynamic graph, embedding per‑node behavioral states together with aggregated neighborhood patterns across structural, mobility, and traffic domains. These high‑context sequences feed into a multi‑layer GRU‑based Sequence‑to‑Sequence architecture equipped with multi‑head attention, enabling concurrent modeling of local temporal fluctuations and long‑range spatial dependencies. A composite trust scoring mechanism integrates model‑inferred anomalies with deterministic protocol checks and peer‑reported reputation, regulated by hyper‑parameter‑optimized fusion weights. Trust scores are embedded into RPL’s rank metric and filtered through a hysteresis‑governed parent selection policy to ensure both rapid threat isolation and topological stability. Extensive simulations in Contiki-NG, leveraging real-world urban mobility traces from the Microsoft GeoLife dataset and the RADAR benchmark, demonstrate robustness against five specific threats (Rank, Blackhole, Sybil, Sinkhole, and Selective Forwarding). Results indicate up to 96 % detection accuracy, a 38 % reduction in detection latency, and 20–40 % lower control overhead, all while maintaining a runtime memory footprint under 10 KB. By combining dynamic graph‑based context encoding, attention‑driven sequence learning, and multi‑source trust fusion, the proposed approach offers a deployable, high‑fidelity, and scalable security enhancement for RPL in next‑generation IoT environments.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"185 ","pages":"Article 104156"},"PeriodicalIF":4.8000,"publicationDate":"2026-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ad Hoc Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1570870526000223","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2026/1/27 0:00:00","PubModel":"Epub","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Mobility‑aware IoT networks operate under rapidly shifting topologies, where even authorized nodes can perform stealthy routing attacks that bypass standard cryptographic defenses. These threats are compounded by dynamic connectivity patterns, fluctuating link qualities, and heterogeneous node behaviors, creating a high‑dimensional, non‑stationary security landscape. We introduce a temporal–spatial trust framework that represents the network as a continuously evolving dynamic graph, embedding per‑node behavioral states together with aggregated neighborhood patterns across structural, mobility, and traffic domains. These high‑context sequences feed into a multi‑layer GRU‑based Sequence‑to‑Sequence architecture equipped with multi‑head attention, enabling concurrent modeling of local temporal fluctuations and long‑range spatial dependencies. A composite trust scoring mechanism integrates model‑inferred anomalies with deterministic protocol checks and peer‑reported reputation, regulated by hyper‑parameter‑optimized fusion weights. Trust scores are embedded into RPL’s rank metric and filtered through a hysteresis‑governed parent selection policy to ensure both rapid threat isolation and topological stability. Extensive simulations in Contiki-NG, leveraging real-world urban mobility traces from the Microsoft GeoLife dataset and the RADAR benchmark, demonstrate robustness against five specific threats (Rank, Blackhole, Sybil, Sinkhole, and Selective Forwarding). Results indicate up to 96 % detection accuracy, a 38 % reduction in detection latency, and 20–40 % lower control overhead, all while maintaining a runtime memory footprint under 10 KB. By combining dynamic graph‑based context encoding, attention‑driven sequence learning, and multi‑source trust fusion, the proposed approach offers a deployable, high‑fidelity, and scalable security enhancement for RPL in next‑generation IoT environments.
期刊介绍:
The Ad Hoc Networks is an international and archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in ad hoc and sensor networking areas. The Ad Hoc Networks considers original, high quality and unpublished contributions addressing all aspects of ad hoc and sensor networks. Specific areas of interest include, but are not limited to:
Mobile and Wireless Ad Hoc Networks
Sensor Networks
Wireless Local and Personal Area Networks
Home Networks
Ad Hoc Networks of Autonomous Intelligent Systems
Novel Architectures for Ad Hoc and Sensor Networks
Self-organizing Network Architectures and Protocols
Transport Layer Protocols
Routing protocols (unicast, multicast, geocast, etc.)
Media Access Control Techniques
Error Control Schemes
Power-Aware, Low-Power and Energy-Efficient Designs
Synchronization and Scheduling Issues
Mobility Management
Mobility-Tolerant Communication Protocols
Location Tracking and Location-based Services
Resource and Information Management
Security and Fault-Tolerance Issues
Hardware and Software Platforms, Systems, and Testbeds
Experimental and Prototype Results
Quality-of-Service Issues
Cross-Layer Interactions
Scalability Issues
Performance Analysis and Simulation of Protocols.