Securing RPL Routing Path for IoT against rank attack via utilizing layering technique

Q2 Engineering
Ahmed R. Zarzoor
{"title":"Securing RPL Routing Path for IoT against rank attack via utilizing layering technique","authors":"Ahmed R. Zarzoor","doi":"10.15676/ijeei.2021.13.4.2","DOIUrl":null,"url":null,"abstract":"RPL is common protocol for the Internet of Things (IoT) network, that used for routing data freely among smart \"things\" in various environments. Which makes them susceptible to attack, especially of the rank attack (RA) that is common for RPL that based on manipulated the rank value for each node in the network to disrupt the routing path. Also, RA is increasing latency between (source node and destination node) and maximizing nodes’ energy usage in the whole network. Therefore, in this study a new technique is proposed to protect RPL against rank attack based on layering mechanism. The proposed technique consists of three steps: Classifying node into layers, calculating path trust value and identifying and alleviating rank attack. The method is implemented via using Cooja simulator software. The network performance is measured according to three metrics: latency, nodes’ energy consuming and accuracy of malicious node detection. The simulation results have revealed that the proposed method gives higher accuracy of malicious node detection, low nodes’ energy usage, and less latency in comparison with SecTrust study.","PeriodicalId":38705,"journal":{"name":"International Journal on Electrical Engineering and Informatics","volume":"143 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal on Electrical Engineering and Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15676/ijeei.2021.13.4.2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 3

Abstract

RPL is common protocol for the Internet of Things (IoT) network, that used for routing data freely among smart "things" in various environments. Which makes them susceptible to attack, especially of the rank attack (RA) that is common for RPL that based on manipulated the rank value for each node in the network to disrupt the routing path. Also, RA is increasing latency between (source node and destination node) and maximizing nodes’ energy usage in the whole network. Therefore, in this study a new technique is proposed to protect RPL against rank attack based on layering mechanism. The proposed technique consists of three steps: Classifying node into layers, calculating path trust value and identifying and alleviating rank attack. The method is implemented via using Cooja simulator software. The network performance is measured according to three metrics: latency, nodes’ energy consuming and accuracy of malicious node detection. The simulation results have revealed that the proposed method gives higher accuracy of malicious node detection, low nodes’ energy usage, and less latency in comparison with SecTrust study.
通过利用分层技术保护物联网的RPL路由路径免受秩攻击
RPL是物联网(IoT)网络的通用协议,用于在各种环境中的智能“事物”之间自由路由数据。这使得它们容易受到攻击,特别是RPL常见的基于操纵网络中每个节点的秩值来破坏路由路径的秩攻击(RA)。同时,RA增加了(源节点和目的节点)之间的延迟,最大化了整个网络中节点的能量使用。为此,本文提出了一种基于分层机制的RPL防秩攻击新技术。该技术包括三个步骤:节点分层、计算路径信任值、识别和减轻秩攻击。该方法通过Cooja仿真软件实现。网络性能是根据三个指标来衡量的:时延、节点能耗和恶意节点检测的准确性。仿真结果表明,与SecTrust方法相比,该方法具有更高的恶意节点检测精度、更低的节点能耗和更小的延迟。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
2.70
自引率
0.00%
发文量
31
审稿时长
20 weeks
期刊介绍: International Journal on Electrical Engineering and Informatics is a peer reviewed journal in the field of electrical engineering and informatics. The journal is published quarterly by The School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Indonesia. All papers will be blind reviewed. Accepted papers will be available on line (free access) and printed version. No publication fee. The journal publishes original papers in the field of electrical engineering and informatics which covers, but not limited to, the following scope : Power Engineering Electric Power Generation, Transmission and Distribution, Power Electronics, Power Quality, Power Economic, FACTS, Renewable Energy, Electric Traction, Electromagnetic Compatibility, Electrical Engineering Materials, High Voltage Insulation Technologies, High Voltage Apparatuses, Lightning Detection and Protection, Power System Analysis, SCADA, Electrical Measurements Telecommunication Engineering Antenna and Wave Propagation, Modulation and Signal Processing for Telecommunication, Wireless and Mobile Communications, Information Theory and Coding, Communication Electronics and Microwave, Radar Imaging, Distributed Platform, Communication Network and Systems, Telematics Services, Security Network, and Radio Communication. Computer Engineering Computer Architecture, Parallel and Distributed Computer, Pervasive Computing, Computer Network, Embedded System, Human—Computer Interaction, Virtual/Augmented Reality, Computer Security, VLSI Design-Network Traffic Modeling, Performance Modeling, Dependable Computing, High Performance Computing, Computer Security.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信