| Literature DB >> 36015975 |
Syeda Mariam Muzammal1, Raja Kumar Murugesan2, N Z Jhanjhi2, M Shamim Hossain3, Abdulsalam Yassine4.
Abstract
In the Internet of Things (IoT), the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and features. Among various RPL security solutions, a trust-based security is easy to adapt for resource-constrained IoT environments. In the existing trust-based security for RPL routing attacks, nodes' mobility is not considered or limited to only the sender nodes. Similarly, these trust-based protocols are not evaluated for mobile IoT environments, particularly regarding RPL attacks. Hence, a trust and mobility-based secure routing protocol is proposed, termed as SMTrust, by critically analysing the trust metrics involving the mobility-based metrics in IoT. SMTrust intends to provide security against RPL Rank and Blackhole attacks. The proposed protocol is evaluated in three different scenarios, including static and mobile nodes in an IoT network. SMTrust is compared with the default RPL objective function, Minimum Rank with Hysteresis Objective Function (MRHOF), SecTrust, DCTM, and MRTS. The evaluation results indicate that the proposed protocol outperforms with respect to packet loss rate, throughput, and topology stability. Moreover, SMTrust is validated using routing protocol requirements analysis to ensure that it fulfils the consistency, optimality, and loop-freeness.Entities:
Keywords: Blackhole; IoT security; RPL; RPL attacks; Rank; internet of things; routing; trust
Year: 2022 PMID: 36015975 PMCID: PMC9414598 DOI: 10.3390/s22166215
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1An Overview of IoT Applications, Layers, Network Models, Components, Security, and RPL Attacks.
Figure 2Normal Topology (left side) and Decreased Rank Attack (right side) [38].
Figure 3A Blackhole Attack Scenario in RPL [14].
Description of Attacks Under Consideration for Proposed Secure Routing Protocol.
| Attack | Description | CIA Impact | Effects on Network Performance |
|---|---|---|---|
| Rank Attack | The malicious node attracts traffic by advertising its fake rank value. | Confidentiality, Integrity | Severely affect the routing topology; Disruption in RPL’s DODAG and network traffic; Longer E2E delays; Curtail packet delivery ratio; Introduce routing loops and non-optimal paths. |
| Blackhole Attack | A malicious node may broadcast to have an optimal path, and once it receives traffic, it starts dropping packets. | Confidentiality, Integrity, Availability | Create a DoS inside the network; Dropping packets leads to data loss; Increase E2E delay and control overhead; Curtail packet delivery ratio; Increase route traffic. |
Related Work for Trust-Based Methods for Routing Security.
| Ref. | Domain | Solution | Evaluation | Mobility | Trust Metrics | Attacks Considered | Research Gaps/Improvements |
|---|---|---|---|---|---|---|---|
| [ | RPL attacks/IDS-based | ETX for calculating trust for routing topology. | Simulation—Contiki2.7/Cooja | 🗴 | Energy; Honesty; Selfishness; ETX; Recommended Trust | Rank; Blackhole | Does not consider nodes’ mobility; Uses IDS-based attacks detection, and hardware security chip with each node. |
| [ | RPL attacks | To combat RPL attacks, it includes a multidimensional and dynamic, trust model. | Simulation—Contiki/Cooja 3.0 | 🗸 | QPC; QoS; Contextual information | Rank; Sybil; Blackhole; | Does not consider the mobility of sink nodes and its effect on the network. |
| [ | IoT Protocols Security/IoT nodes/IoT networks | A protocol based on fuzzy logic, and a secure messaging system is developed. | Simulation—Contiki/Cooja | 🗴 | Direct trust; Indirect trust; Routing score | Bad service providers; Contradictory behaviour; On-Off attacks | Does not consider the nodes’ mobility and routing attacks. |
| [ | RPL attacks | fuzzy logic-based approach. | Simulation and Testbed experimentation—Contiki/Cooja 3.0 | 🗴 | Historical observation; Feedback; Successful and unsuccessful node transaction | Rank; Sybil | Does not consider nodes’ mobility; packet loss rate is significant; E2E delays, energy consumption, and colluding attacks are not evaluated; Does not consider the uncertainty of recommendations. |
| [ | Wireless Networks/Routing Attacks | Dummy packets insertion. | Simulation—NS-2 for MANET, Cooja/Contiki 2.7 for IoT | 🗸 | Uncertainty; Contextual factors; Direct and Indirect trust; Route Trust | Packet dropping attacks | Inserts a dummy packet in networks creating high overhead; RPL-specific attacks are not considered. |
| [ | Medical IoT mobility | A routing method for security in an energy-efficient sensor network | None | 🗸 | Energy consumption; Node capacity | Greyhole | Focus is on the energy consumption during data collection process and not on security and routing attacks. |
Figure 4Flow Diagram of SMTrust.
Five-Tuple Trust Rating.
| Trust Index | Trust Rating | Trust Value Range |
|---|---|---|
| t1 | No Trust | 0.0–0.20 |
| t2 | Poor Trust | 0.21–0.45 |
| t3 | Fair Trust | 0.46–0.70 |
| t4 | Good Trust | 0.71–0.90 |
| t5 | Full Trust | 0.91–1.00 |
Figure 5Simulation workflow.
Figure 6Results comparison of network performance under Blackhole and Rank attack in Scenario I.
Figure 7Results comparison of network performance under Blackhole and Rank attack in Scenario II.
Figure 8Results comparison of network performance under Blackhole and Rank attack in Scenario III.