| Literature DB >> 35901074 |
Danyal Arshad1, Muhammad Asim1, Noshina Tariq2, Thar Baker3, Hissam Tawfik4,5, Dhiya Al-Jumeily Obe6.
Abstract
The Internet of Things (IoT) and its relevant advances have attracted significant scholarly, governmental, and industrial attention in recent years. Since the IoT specifications are quite different from what the Internet can deliver today, many groundbreaking techniques, such as Mobile Ad hoc Networks (MANETs) and Wireless Sensor Networks (WSN), have gradually been integrated into IoT. The Routing Protocol for Low power and Lossy network (RPL) is the de-facto IoT routing protocol in such networks. Unfortunately, it is susceptible to numerous internal attacks. Many techniques, such as cryptography, Intrusion Detection System (IDS), and authorization have been used to counter this. The large computational overhead of these techniques limits their direct application to IoT nodes, especially due to their low power and lossy nature. Therefore, this paper proposes a Trust-based Hybrid Cooperative RPL protocol (THC-RPL) to detect malicious Sybil nodes in an RPL-based IoT network. The proposed technique is compared and evaluated with state-of-the-art and is found to outperform them. It detects more attacks while maintaining the packet loss ratio in the range of 15-25%. The average energy consumption of the nodes also remains in the ratio of 60-80 mj. There is approximately 40% more energy conservation at node level with an overall 50% increase in network lifetime. THC-RPL has 10% less message exchange and 0% storage costs.Entities:
Mesh:
Substances:
Year: 2022 PMID: 35901074 PMCID: PMC9333330 DOI: 10.1371/journal.pone.0271277
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.752
Fig 1An example of IoTs.
Fig 2The IoT architecture.
Fig 3RPL DODAG, Sub-DODAG, and RPL instances.
Fig 4The non-storing and storing modes of RPL.
Fig 5Types of Sybil attack.
Fig 6Sybil attack in RPL.
Fig 7Sybil attack in RPL.
Fig 8A Sybil attack scenario in smart healthcare domain.
Summary of nomenclature.
| Symbol | Meaning |
|---|---|
|
| Number of Connected Devices |
|
| Node Identities |
|
| Sybil Identities |
|
| Sybil Identities |
|
| Neighbor Nodes |
|
| Root Node |
|
| Direct Trust |
|
| Indirect Direct Trust |
|
| Total Number of Child Nodes |
|
| Energy of Child Nodes |
|
| Total Number of Packets |
|
| Child Node Direct Trust |
|
| Child Indirect Direct trust |
|
| Total Number of Child Nodes |
|
| Energy of Child Nodes |
|
| Total Number of Child Nodes |
|
| Data Packets Sent |
|
| Total Number of Child Nodes |
|
| Trust Threshold Value |
|
| Network Child Node |
|
| Border Router |
|
| Trust Monitoring Nodes |
|
| Network Child Node Unique Identity |
|
| Child Mobile Nodes |
|
| Direct Trust |
|
| Indirect Trust |
|
| Expected Transmission Count |
|
| Sent Packets |
|
| Forwarded Packets |
Fig 9Trust computation architecture.
State-of-the-art comparison.
| Reference | Technique | Attack addressed | Weakness | Evaluation Parameters |
|---|---|---|---|---|
| [ | Trust | Rank, Sybil | Not energy efficient, Single point of failure, Uncertainty of recommendations | Packet Loss Ratio, Attacks Detected |
| [ | Trust | Rank, Sybil, Blackhole | Large number of parent change | Average parent change, Packet loss ratio, End-to-End delay, Average energy consumption |
| [ | Trust-Based IDS | Sybil | Trust Platform module, Extra computation layer | Control overhead, Energy Cost, Packet Delivery Ratio |
| [ | Attestation Method | Blackhole, Sybil, Wormhole | Extra computation in DAO control message, Not energy efficient | Average packet loss ratio |
| [ | Trust | Self-Promotion, Ballot-Stuffing, Bad-Mouthing | Computation and communication overhead | Expected transmission count |
| [ | Trust | Rank, Sybil, Blackhole | Not energy efficient, delay, Computation overhead | Packet Loss Ratio, end-to-end delay, Average energy consumption |
Fig 10Block diagram of proposed methodology.
Fig 11The proposed THC-RPL architecture.
Fig 12Sybil attack in RPL.
Nodes’ rating based on trust values.
| Trust Value | Trust Status |
|---|---|
| 0.7–1 | Good |
| 0.5–0.6 | Fair |
| 0.2–0.4 | Poor |
| 0.0–0.1 | Not Verified |
Simulation parameters.
| Simulation Parameters | Value |
|---|---|
| Simulation tool | Contiki /Cooja 3.0 |
| Deployment Type | Random position (based on smart home) |
| Emulated nodes | T-mote Sky |
| Simulation coverage area | 100 m * 100 m |
| Total number of nodes | 30 |
| Malicious nodes | 1:10 |
| RX ratio | 30-100% |
| TX ratio | 100% |
| TX range | 50 m |
| Interference range | 50 m |
| Routing protocols | THC-RPL |
| Simulation time | 60 min |
| Link failure model | UDGM |
| Mobility speed | 0–6.23 km/h |
Fig 13Number of attacks detected.
Fig 14Percentage of packet loss ratio.
Fig 15Energy consumption of nodes.
Fig 16Energy consumption of network.
Fig 17Computation cost.
Fig 18Communication Cost.
Fig 19Storage cost.