基于共识的多跳网络名誉路由方法

Edward Staddon, Valeria Loscri, Nathalie Mitton
{"title":"基于共识的多跳网络名誉路由方法","authors":"Edward Staddon, Valeria Loscri, Nathalie Mitton","doi":"10.52953/ixzf4584","DOIUrl":null,"url":null,"abstract":"When it comes to the security of the Internet of Things (IoT), securing their communications is paramount. In multi-hop networks, nodes relay information amongst themselves, opening the data up to tampering by an intermediate device. To detect and avoid such malicious entities, we grant nodes the ability to analyse their neighbours behaviour. Through the use of consensus-based validation, based upon the blockchain's miners, all nodes can agree on the trustworthiness of all devices in the network. By expressing this through a node's reputation, it is possible to identify malicious devices and isolate them from network activities. By incorporating this metric into a multi-hop routing protocol such as AODV, we can influence the path selection process. Instead of defining the best route based upon overall length, we can choose the most reputable path available, thus traversing trustworthy devices. By performing extensive analyses through multiple simulated scenarios, we can identify a decrease in packet drop rates compared to AODV by approximately 48% and 38% when subjected to black hole attacks with 30 and 100 node networks respectively. Furthermore, by subjecting our system to varying degrees of grey holes, we can confirm its adaptability to different types of threats.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A consensus-based approach to reputational routing in multi-hop networks\",\"authors\":\"Edward Staddon, Valeria Loscri, Nathalie Mitton\",\"doi\":\"10.52953/ixzf4584\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"When it comes to the security of the Internet of Things (IoT), securing their communications is paramount. In multi-hop networks, nodes relay information amongst themselves, opening the data up to tampering by an intermediate device. To detect and avoid such malicious entities, we grant nodes the ability to analyse their neighbours behaviour. Through the use of consensus-based validation, based upon the blockchain's miners, all nodes can agree on the trustworthiness of all devices in the network. By expressing this through a node's reputation, it is possible to identify malicious devices and isolate them from network activities. By incorporating this metric into a multi-hop routing protocol such as AODV, we can influence the path selection process. Instead of defining the best route based upon overall length, we can choose the most reputable path available, thus traversing trustworthy devices. By performing extensive analyses through multiple simulated scenarios, we can identify a decrease in packet drop rates compared to AODV by approximately 48% and 38% when subjected to black hole attacks with 30 and 100 node networks respectively. Furthermore, by subjecting our system to varying degrees of grey holes, we can confirm its adaptability to different types of threats.\",\"PeriodicalId\":274720,\"journal\":{\"name\":\"ITU Journal on Future and Evolving Technologies\",\"volume\":\"80 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ITU Journal on Future and Evolving Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.52953/ixzf4584\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ITU Journal on Future and Evolving Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.52953/ixzf4584","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

当谈到物联网(IoT)的安全性时,确保它们的通信是至关重要的。在多跳网络中,节点之间传递信息,使数据容易被中间设备篡改。为了检测和避免这种恶意实体,我们赋予节点分析其邻居行为的能力。通过使用基于共识的验证,基于区块链的矿工,所有节点都可以就网络中所有设备的可信度达成一致。通过节点的声誉来表达这一点,可以识别恶意设备并将其与网络活动隔离开来。通过将该度量合并到多跳路由协议(如AODV)中,我们可以影响路径选择过程。我们可以选择最可靠的路径,而不是根据总长度来定义最佳路径,从而遍历值得信赖的设备。通过对多个模拟场景进行广泛的分析,我们可以确定当遭受30和100节点网络的黑洞攻击时,与AODV相比,丢包率分别降低了大约48%和38%。此外,通过将我们的系统置于不同程度的灰洞中,我们可以确认其对不同类型威胁的适应性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A consensus-based approach to reputational routing in multi-hop networks
When it comes to the security of the Internet of Things (IoT), securing their communications is paramount. In multi-hop networks, nodes relay information amongst themselves, opening the data up to tampering by an intermediate device. To detect and avoid such malicious entities, we grant nodes the ability to analyse their neighbours behaviour. Through the use of consensus-based validation, based upon the blockchain's miners, all nodes can agree on the trustworthiness of all devices in the network. By expressing this through a node's reputation, it is possible to identify malicious devices and isolate them from network activities. By incorporating this metric into a multi-hop routing protocol such as AODV, we can influence the path selection process. Instead of defining the best route based upon overall length, we can choose the most reputable path available, thus traversing trustworthy devices. By performing extensive analyses through multiple simulated scenarios, we can identify a decrease in packet drop rates compared to AODV by approximately 48% and 38% when subjected to black hole attacks with 30 and 100 node networks respectively. Furthermore, by subjecting our system to varying degrees of grey holes, we can confirm its adaptability to different types of threats.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信