移动接收器支持的物联网中基于新型认证和安全信任的RPL路由

Q2 Engineering
B. Rakesh, Parveen Sultana H
{"title":"移动接收器支持的物联网中基于新型认证和安全信任的RPL路由","authors":"B. Rakesh, Parveen Sultana H","doi":"10.1080/23335777.2021.1933194","DOIUrl":null,"url":null,"abstract":"ABSTRACT In the modern era, prevalence of the Internet of Things (IoT) devices that have de facto protocol as IPv6 routing protocol for low power and lossy networks (RPL). Yet, RPL protocol is vulnerable to many attacks such as rank attack, password spoofing and more. To this end, most of the works have focused their research on securing the RPL-based IoT network. However, still there exist downsides such as high energy consumption, lack of effective authentication and high packet losses. Motivated by these preceding defects, this paper proposes the Novel Authentication and Secure Trust-based RPL Routing in Mobile sink-supported Internet of Things (SecRPL-MS). At first, SecRPL-MS performs a registration process where all IoT nodes in the network register themselves in the security entity. In this work, the frequent death of IoT nodes is alleviated through deploying mobile sink in the network. If any grid member (GM) node wants to transmit their data to the grid head (GH) node, then it must undergo authentication process. Secure routing is adopted in RPL by utilising the sail fish optimisation algorithm. Each GM node encrypts its sensed data using the prince algorithm before transmitting it to the GH node. The moving points are selected for the mobile sink using the Quantum Inspired Neural Network (QINN) algorithm. This proposed SecRPL-MS performance is evaluated using the Network Simulator 3 (NS3) in terms of the Packet Delivery Ratio (%), Delay (ms), Energy Consumption (mJ), Key Generation Time (ms) and Malicious Node Detection Accuracy (%). The proposed SecRPL-Ms outperforms 23% of malicious node detection accuracy when compared to existing systems, which represent the proposed SecRPL-MS system providing high security by mitigating the following attacks such as rank attack, Sybil attack, blackhole attack and man in the middle attack.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"116 1","pages":"43 - 76"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Novel Authentication and Secure Trust based RPL Routing in Mobile sink supported Internet of Things\",\"authors\":\"B. Rakesh, Parveen Sultana H\",\"doi\":\"10.1080/23335777.2021.1933194\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACT In the modern era, prevalence of the Internet of Things (IoT) devices that have de facto protocol as IPv6 routing protocol for low power and lossy networks (RPL). Yet, RPL protocol is vulnerable to many attacks such as rank attack, password spoofing and more. To this end, most of the works have focused their research on securing the RPL-based IoT network. However, still there exist downsides such as high energy consumption, lack of effective authentication and high packet losses. Motivated by these preceding defects, this paper proposes the Novel Authentication and Secure Trust-based RPL Routing in Mobile sink-supported Internet of Things (SecRPL-MS). At first, SecRPL-MS performs a registration process where all IoT nodes in the network register themselves in the security entity. In this work, the frequent death of IoT nodes is alleviated through deploying mobile sink in the network. If any grid member (GM) node wants to transmit their data to the grid head (GH) node, then it must undergo authentication process. Secure routing is adopted in RPL by utilising the sail fish optimisation algorithm. Each GM node encrypts its sensed data using the prince algorithm before transmitting it to the GH node. The moving points are selected for the mobile sink using the Quantum Inspired Neural Network (QINN) algorithm. This proposed SecRPL-MS performance is evaluated using the Network Simulator 3 (NS3) in terms of the Packet Delivery Ratio (%), Delay (ms), Energy Consumption (mJ), Key Generation Time (ms) and Malicious Node Detection Accuracy (%). The proposed SecRPL-Ms outperforms 23% of malicious node detection accuracy when compared to existing systems, which represent the proposed SecRPL-MS system providing high security by mitigating the following attacks such as rank attack, Sybil attack, blackhole attack and man in the middle attack.\",\"PeriodicalId\":37058,\"journal\":{\"name\":\"Cyber-Physical Systems\",\"volume\":\"116 1\",\"pages\":\"43 - 76\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-06-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cyber-Physical Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/23335777.2021.1933194\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cyber-Physical Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/23335777.2021.1933194","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 6

摘要

摘要:在现代,物联网(IoT)设备的普及已经将事实上的协议作为IPv6路由协议用于低功耗和有损网络(RPL)。然而,RPL协议容易受到等级攻击、密码欺骗等攻击。为此,大多数工作都将研究重点放在保护基于rpl的物联网网络上。但也存在能耗高、缺乏有效认证、丢包率高等缺点。针对上述缺陷,本文提出了基于移动接收器支持的物联网中基于认证和安全信任的新型RPL路由(SecRPL-MS)。首先,SecRPL-MS执行注册过程,网络中的所有IoT节点将自己注册到安全实体中。在这项工作中,通过在网络中部署移动sink来缓解物联网节点频繁死亡的问题。如果任何网格成员(GM)节点希望将其数据传输到网格头(GH)节点,则必须经过身份验证过程。利用帆鱼优化算法,在RPL中采用安全路由。每个GM节点在将其感知到的数据传输到GH节点之前,都使用王子算法对其进行加密。利用量子启发神经网络(QINN)算法选择移动sink的移动点。本文利用网络模拟器3 (NS3)对SecRPL-MS的性能进行了评估,包括数据包传送率(%)、延迟(ms)、能耗(mJ)、密钥生成时间(ms)和恶意节点检测准确率(%)。与现有系统相比,本文提出的SecRPL-Ms系统的恶意节点检测准确率提高了23%,这表明本文提出的SecRPL-Ms系统通过减轻rank攻击、Sybil攻击、黑洞攻击和中间人攻击等攻击,提供了较高的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Novel Authentication and Secure Trust based RPL Routing in Mobile sink supported Internet of Things
ABSTRACT In the modern era, prevalence of the Internet of Things (IoT) devices that have de facto protocol as IPv6 routing protocol for low power and lossy networks (RPL). Yet, RPL protocol is vulnerable to many attacks such as rank attack, password spoofing and more. To this end, most of the works have focused their research on securing the RPL-based IoT network. However, still there exist downsides such as high energy consumption, lack of effective authentication and high packet losses. Motivated by these preceding defects, this paper proposes the Novel Authentication and Secure Trust-based RPL Routing in Mobile sink-supported Internet of Things (SecRPL-MS). At first, SecRPL-MS performs a registration process where all IoT nodes in the network register themselves in the security entity. In this work, the frequent death of IoT nodes is alleviated through deploying mobile sink in the network. If any grid member (GM) node wants to transmit their data to the grid head (GH) node, then it must undergo authentication process. Secure routing is adopted in RPL by utilising the sail fish optimisation algorithm. Each GM node encrypts its sensed data using the prince algorithm before transmitting it to the GH node. The moving points are selected for the mobile sink using the Quantum Inspired Neural Network (QINN) algorithm. This proposed SecRPL-MS performance is evaluated using the Network Simulator 3 (NS3) in terms of the Packet Delivery Ratio (%), Delay (ms), Energy Consumption (mJ), Key Generation Time (ms) and Malicious Node Detection Accuracy (%). The proposed SecRPL-Ms outperforms 23% of malicious node detection accuracy when compared to existing systems, which represent the proposed SecRPL-MS system providing high security by mitigating the following attacks such as rank attack, Sybil attack, blackhole attack and man in the middle attack.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Cyber-Physical Systems
Cyber-Physical Systems Engineering-Computational Mechanics
CiteScore
3.10
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信