{"title":"基于信任的低功耗有损网络路由协议安全方法","authors":"M. Abid, Sarah Nait Bahloul, Sara Hamlili","doi":"10.1109/icnas53565.2021.9628947","DOIUrl":null,"url":null,"abstract":"Resource-constrained things can now connect to the Internet through Wireless Personal Area Networks (WPAN) and Low Power Wide Area Networks (LPWAN). Since then, they are vulnerable to both attacks from inside the network and from the Internet as well. Many research has already investigated the security threats of such an environment. In this article, we focus on how securing the RPL routing protocol in such a constrained and vulnerable environment.To tackle these issues, we investigate how trust that is inspired by social human behavior can enhance RPL security. Our trust-based solution enables motes evaluating locally the threat level when interacting with their neighbors. However, evaluating the trust in such environment is a challenge due to various factors to take into account and the motes resource scarcity.To this end, we propose a distributed trust management approach based on machine learning to evaluate trust and detect untrustworthy behaviors. Machine learning-based approach have been widely investigated in IoT and RPL.We evaluate the performance through significant metrics so as to obtain a good assessment of the effectiveness of our method.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Trust-based Approach to Secure Low-Power and Lossy Networks Routing Protocol\",\"authors\":\"M. Abid, Sarah Nait Bahloul, Sara Hamlili\",\"doi\":\"10.1109/icnas53565.2021.9628947\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Resource-constrained things can now connect to the Internet through Wireless Personal Area Networks (WPAN) and Low Power Wide Area Networks (LPWAN). Since then, they are vulnerable to both attacks from inside the network and from the Internet as well. Many research has already investigated the security threats of such an environment. In this article, we focus on how securing the RPL routing protocol in such a constrained and vulnerable environment.To tackle these issues, we investigate how trust that is inspired by social human behavior can enhance RPL security. Our trust-based solution enables motes evaluating locally the threat level when interacting with their neighbors. However, evaluating the trust in such environment is a challenge due to various factors to take into account and the motes resource scarcity.To this end, we propose a distributed trust management approach based on machine learning to evaluate trust and detect untrustworthy behaviors. Machine learning-based approach have been widely investigated in IoT and RPL.We evaluate the performance through significant metrics so as to obtain a good assessment of the effectiveness of our method.\",\"PeriodicalId\":321454,\"journal\":{\"name\":\"2021 International Conference on Networking and Advanced Systems (ICNAS)\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Networking and Advanced Systems (ICNAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/icnas53565.2021.9628947\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Networking and Advanced Systems (ICNAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icnas53565.2021.9628947","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Trust-based Approach to Secure Low-Power and Lossy Networks Routing Protocol
Resource-constrained things can now connect to the Internet through Wireless Personal Area Networks (WPAN) and Low Power Wide Area Networks (LPWAN). Since then, they are vulnerable to both attacks from inside the network and from the Internet as well. Many research has already investigated the security threats of such an environment. In this article, we focus on how securing the RPL routing protocol in such a constrained and vulnerable environment.To tackle these issues, we investigate how trust that is inspired by social human behavior can enhance RPL security. Our trust-based solution enables motes evaluating locally the threat level when interacting with their neighbors. However, evaluating the trust in such environment is a challenge due to various factors to take into account and the motes resource scarcity.To this end, we propose a distributed trust management approach based on machine learning to evaluate trust and detect untrustworthy behaviors. Machine learning-based approach have been widely investigated in IoT and RPL.We evaluate the performance through significant metrics so as to obtain a good assessment of the effectiveness of our method.