{"title":"Securing RPL Routing Path for IoT against rank attack via utilizing layering technique","authors":"Ahmed R. Zarzoor","doi":"10.15676/ijeei.2021.13.4.2","DOIUrl":null,"url":null,"abstract":"RPL is common protocol for the Internet of Things (IoT) network, that used for routing data freely among smart \"things\" in various environments. Which makes them susceptible to attack, especially of the rank attack (RA) that is common for RPL that based on manipulated the rank value for each node in the network to disrupt the routing path. Also, RA is increasing latency between (source node and destination node) and maximizing nodes’ energy usage in the whole network. Therefore, in this study a new technique is proposed to protect RPL against rank attack based on layering mechanism. The proposed technique consists of three steps: Classifying node into layers, calculating path trust value and identifying and alleviating rank attack. The method is implemented via using Cooja simulator software. The network performance is measured according to three metrics: latency, nodes’ energy consuming and accuracy of malicious node detection. The simulation results have revealed that the proposed method gives higher accuracy of malicious node detection, low nodes’ energy usage, and less latency in comparison with SecTrust study.","PeriodicalId":38705,"journal":{"name":"International Journal on Electrical Engineering and Informatics","volume":"143 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal on Electrical Engineering and Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15676/ijeei.2021.13.4.2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 3
Abstract
RPL is common protocol for the Internet of Things (IoT) network, that used for routing data freely among smart "things" in various environments. Which makes them susceptible to attack, especially of the rank attack (RA) that is common for RPL that based on manipulated the rank value for each node in the network to disrupt the routing path. Also, RA is increasing latency between (source node and destination node) and maximizing nodes’ energy usage in the whole network. Therefore, in this study a new technique is proposed to protect RPL against rank attack based on layering mechanism. The proposed technique consists of three steps: Classifying node into layers, calculating path trust value and identifying and alleviating rank attack. The method is implemented via using Cooja simulator software. The network performance is measured according to three metrics: latency, nodes’ energy consuming and accuracy of malicious node detection. The simulation results have revealed that the proposed method gives higher accuracy of malicious node detection, low nodes’ energy usage, and less latency in comparison with SecTrust study.
期刊介绍:
International Journal on Electrical Engineering and Informatics is a peer reviewed journal in the field of electrical engineering and informatics. The journal is published quarterly by The School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Indonesia. All papers will be blind reviewed. Accepted papers will be available on line (free access) and printed version. No publication fee. The journal publishes original papers in the field of electrical engineering and informatics which covers, but not limited to, the following scope : Power Engineering Electric Power Generation, Transmission and Distribution, Power Electronics, Power Quality, Power Economic, FACTS, Renewable Energy, Electric Traction, Electromagnetic Compatibility, Electrical Engineering Materials, High Voltage Insulation Technologies, High Voltage Apparatuses, Lightning Detection and Protection, Power System Analysis, SCADA, Electrical Measurements Telecommunication Engineering Antenna and Wave Propagation, Modulation and Signal Processing for Telecommunication, Wireless and Mobile Communications, Information Theory and Coding, Communication Electronics and Microwave, Radar Imaging, Distributed Platform, Communication Network and Systems, Telematics Services, Security Network, and Radio Communication. Computer Engineering Computer Architecture, Parallel and Distributed Computer, Pervasive Computing, Computer Network, Embedded System, Human—Computer Interaction, Virtual/Augmented Reality, Computer Security, VLSI Design-Network Traffic Modeling, Performance Modeling, Dependable Computing, High Performance Computing, Computer Security.