Abstract
Ensuring security in IoT routing protocols is more challenging due to the fact that devices are mobile, resource constrained, and heterogeneous. The routing protocol for low-power and lossy networks (RPL) as the de facto routing protocol for IoT provides a little protection against routing attacks. On the other hand, the standard RPL because of the use of a single metric in routing has limitations that ultimately results in loss of network performance. To overcome the limitations of the use of a single metric and to prevent the consequences of routing attacks, we used the concept of trust and propose dynamic and comprehensive trust model for IoT (DCTM-IoT) and integrate it into RPL (DCTM-RPL). We provide a comprehensive hierarchical model for trusting of things in IoT, which has a multi-dimensional vision of trust. We put the combination of metrics and necessary activities to deal with attacks under the umbrella of trust level calculation. The performance of DCTM-RPL is compared with the standard RPL protocol in mobile environment and under routing major attacks. DCTM-RPL demonstrates its superior performance over the standard RPL protocol in the detection and isolation attacks. The DCTM-RPL, in addition to resistance mitigating routing attacks, improves network performance.
Similar content being viewed by others
References
Kang M, Na O, Chang H (2016) Evaluation of groundwater quality in a rural community in North Central of Nigeria. J Supercomput 72:103. https://doi.org/10.1007/s11227-015-1490-0
Koo C, Kim J (2018) Enforcing high-level security policies for Internet of Things. J Supercomput 74:4497. https://doi.org/10.1007/s11227-017-2201-9
Borujeni EM, Rahbari D, Nickray M (2018) Fog-based energy-efficient routing protocol for wireless sensor networks. J Supercomput. https://doi.org/10.1007/s11227-018-2514-3
Sharma D, Ojha A, Bhondekar AP (2018) Heterogeneity consideration in wireless sensor networks routing algorithms: a review. J Supercomput. https://doi.org/10.1007/s11227-018-2635-8
Winter T, Thubert P, Brandt A, Hui JW, Kelsey R, Levis P, Pister KS, Struik R, Vasseur J, Alexander RK (2012) RPL: IPv6 routing protocol for low-power and lossy networks. RFC 6550:1–157
Tseng F, Chou L, Chao H (2011) A survey of black hole attacks in wireless mobile ad hoc networks. Hum Cent Comput Inf Sci 1:1–16
Gaddour O, Koubaa A, Baccour N, Abid M (2014) OF-FL: QoS-aware fuzzy logic objective function for the RPL routing protocol. In: 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), pp 365–372
Gaddour O, Koubaa A (2012) RPL in a nutshell: a survey. Comput Netw 56:3163–3178
Vasseur J, Kim M, Pister KS, Dejean N, Barthel D (2012) Routing metrics used for path calculation in low-power and lossy networks. RFC 6551:1–30
Thubert P (2012) Objective function zero for the routing protocol for low-power and lossy networks (RPL). RFC 6552:1–14
Gnawali O, Levis P (2012) Internet engineering task force (ietf) the minimum rank with hysteresis objective function
Lamaazi H, Benamar N (2018) OF-EC: a novel energy consumption aware objective function for RPL based on fuzzy logic. J Netw Comput Appl 117:42–58
Sharkawy B, Khattab A, Elsayed KM (2014) Fault-tolerant RPL through context awareness. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp 437–441
Gaddour O, Koubaa A, Abid M (2015) Quality-of-service aware routing for static and mobile IPv6-based low-power and lossy sensor networks using RPL. Adhoc Netw 33:233–256
Kharrufa H, Al-Kashoash HA, Kemp AH (2018) A game theoretic optimization of RPL for mobile Internet of Things applications. IEEE Sens J 18:2520–2530
Karkazis P, Leligou H, Sarakis L, Zahariadis TB, Trakadas P, Velivassaki TH, Capsalis CN (2012) Design of primary and composite routing metrics for RPL-compliant wireless sensor networks. Int Conf Telecommun Multimed (TEMU) 2012:13–18
Hong K, Choi L (2011) DAG-based multipath routing for mobile sensor networks. ICTC 2011:261–266
Airehrour D, Gutierrez JA, Ray SK (2018) SecTrust-RPL: a secure trust-aware RPL routing protocol for Internet of Things. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2018.03.021
Djedjig N, Tandjaoui D, Medjek F (2015) Trust-based RPL for the Internet of Things. In: 2015 IEEE Symposium on Computers and Communication (ISCC), pp 962–967
Djedjig N, Tandjaoui D, Medjek F, Romdhani I (2017) New trust metric for the RPL routing protocol. In: 2017 8th International Conference on Information and Communication Systems (ICICS), pp 328–335
Iuchi K, Matsunaga T, Toyoda K, Sasase I (2015) Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network. In: 2015 21st Asia-Pacific Conference on Communications (APCC), pp 299–303
Seeber S, Sehgal A, Stelte B, Rodosek GD, Schnwlder J (2013) Towards a trust computing architecture for RPL in cyber physical systems. In: Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013), pp 134–137
Guclu SO, Ozcelebi T, Lukkien JJ (2016) Trust-based neighbor unreachability detection for RPL. In: 2016 25th International Conference on Computer Communication and Networks (ICCCN), pp 1–6
Mayzaud A, Badonnel R, Chrisment I (2016) A taxonomy of attacks in RPL-based Internet of Things. Int J Netw Secur 18:459–473
Frigyik BA, Kapila A, Gupta MR (2010) Introduction to the Dirichlet distribution and related processes
Zhang W, Zhu S, Tang J et al (2018) A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks. J Supercomput 74:1779. https://doi.org/10.1007/s11227-017-2150-3
Mui L, Mohtashemi M (2001) A computational model of trust and reputation. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences, HICSS
Bernab JB, Ramos JL, Gmez-Skarmeta AF (2016) TACIoT: multidimensional trust-aware access control system for the Internet of Things. Soft Comput 20:1763–1779
Dunkels A, Schmidt O, Finne N, Eriksson J, sterlind F, Tsiftes N, Durvy M (2011) The Contiki OS: the operating system for the Internet of Things. http://www.contiki-os.org. Accessed 01 Sept 2018
Aschenbruck N, Ernst R, Gerhards-Padilla E, Schwamborn M (2010) BonnMotion: a mobility scenario generation and analysis tool. In: SimuTools
Baccour N, Koubaa A, Jama MB, Youssef H, Zuniga M, Alves M (2009) A comparative simulation study of link quality estimators in wireless sensor networks. In: 2009 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp 1–10
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hashemi, S.Y., Shams Aliee, F. Dynamic and comprehensive trust model for IoT and its integration into RPL. J Supercomput 75, 3555–3584 (2019). https://doi.org/10.1007/s11227-018-2700-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-018-2700-3