Trust-Aware Routing Framework for Internet of Things

2021 ◽  
Vol 12 (1) ◽  
pp. 48-59
Author(s):  
S. Sankar ◽  
Ramasubbareddy Somula ◽  
R. Lakshmana Kumar ◽  
P. Srinivasan ◽  
M. Amala Jayanthi

Establishing security in internet of things (IoT) is a critical challenge, as it is connected to the network's extremely resource-constrained devices. The RPL is a standard routing protocol for IoT. It is well-suited for low power and lossy networks (LLN). The RPL provides little security in the IoT network against various attacks. However, one needs to strengthen the security concern in RPL. So, this paper proposes a trust-aware, energy-based reliable routing (TAER-RPL) for IoT to enhance security among network nodes. The TAER-RPL is taken into account the routing metrics, namely trust, ETX, RER to pick the optimal parent for data transmission. The simulation is conducted in COOJA simulator. TAER-RPL's efficiency is compared with SecTrust-RPL and RPL. The TAER-RPL increases the lifespan of the network by 15%.

2019 ◽  
Vol 13 (12) ◽  
pp. 1
Author(s):  
Adeeb Saaidah ◽  
Omar Almomani ◽  
Laila Al-Qaisi. ◽  
Nesreen Alsharman ◽  
Faisal Alzyoud

Internet of Things (IOT) system often consists of thousands of constrained connected devices. Resource-constrained devices one of critical issues in a low- power and lossy network LLNs. RPL is IPv6 routing protocol. It’s designed by IETF to be simple and inter-operable networking protocol to overcome these resource limitations. The RPL carries out Objective Functions (OFs) in the aim of finding the best path. The OFs chooses the best parent nodes aiming to build the route and optimize it. The metrics used to build the OF must be selected in an effective and accurate manner for finding the optimal path and meets all constraints. A survey about node metrics which can be utilized in OFs of RPL is presented, and node metrics calculations are explained then discussed thoroughly. The researcher displays the most relevant research efforts regarding the RPL OFs existing in literature.


Author(s):  
Zohreh Royaee ◽  
Hamid Mirvaziri ◽  
Amid Khatibi bardsiri

<p>The IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) was proposed for various applications of IPv6 low power wireless networks. While RPL supports various routing metrics and is designed to be suitable for wireless sensor network environments, it does not consider the mobility of nodes. Therefore, there is a need for a method that is energy efficient and that provides stable and reliable data transmission by considering the mobility of nodes in RPL networks. In this paper a new heuristic flabellum algorithm inspired by physical and biological behaviour of flabella in the sea is presented, and bottleneck and swarm problems are resolved through managing the moving nodes by flabellum algorithm. Finally, the proposed algorithm’s performance is evaluated using the Cooja simulator. The proposed algorithm;Flabellum RPL; shows significant improvements with regards to packet delivery, and convergence and lifetime.</p>


2020 ◽  
Vol 26 (11) ◽  
pp. 1366-1381
Author(s):  
Sathishkumar Natesan ◽  
Rajakumar Krishnan

The Routing Protocol for Low Power and Lossy Networks (RPL) is operated by gadgets comprised of many devices of embedded type with limited energy, memory as well as resources that do their process. The improvements in the life of the network and energy conservation are the key challenging features in Low Power and Lossy Networks (LLN). Obviously, the LLN has a key strategic part in routing. The Internet of Things (IoT) device is expected to make the apt choice. In LLN, the poor routing choice leads to traffic congestion, reduction in power as well as packet loss ratio. The task in the proposal analyzes Delay (D), Load (L) and Battery Discharge Index (BDI) pivoted Energy Efficient Composite Metric Routing (EECMR) protocol for LLN. The performance of the work in the proposal is evaluated by the COOJA simulator. It outperforms with respect to Network Lifetime (NL), Delay as well as Packet Delivery Ratio (PDR) contrasted to the routing metrics like Traffic Load (TL), Link Quality (LQ), Residual Energy (RE), RE-Battery Discharge Index (RE-BDI) and Hop Count (HC).


Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 501 ◽  
Author(s):  
Evangelina Lara ◽  
Leocundo Aguilar ◽  
Mauricio A. Sanchez ◽  
Jesús A. García

The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as industrial espionage and sabotage. Furthermore, many IIoT devices are resource-constrained, which impedes the use of traditional security services for them. Authentication allows devices to be confident of each other’s identity, preventing some security attacks. Many authentication protocols have been proposed for IIoT; however, they have high computing requirements not viable to resource-constrained devices, or they have been found insecure. In this paper, an authentication protocol for resource-constrained IIoT devices is proposed. It is based on the lightweight operations xor, addition, and subtraction, and a hash function. Also, only four messages are exchanged between the principals to authenticate. It has a low execution-time and communication-cost. Its security was successfully assessed with the formal methods Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and Burrows–Abadi–Needham (BAN) logic, together with an informal analysis of its resistance to known attacks. Its performance and security were compared with state-of-the-art protocols, resulting in a good performance for resource-constrained IIoT devices, and higher security similar to computational expensive schemes.


2019 ◽  
Vol 8 (S3) ◽  
pp. 100-104
Author(s):  
Vikram Neerugatti ◽  
A. Rama Mohan Reddy

Internet of Things (IoT) is the advanced technology, were the constrained nodes/things (all the objects around us such as chair, home, car, keys, etc.) will be connected to the internet to form a network, for sharing and monitoring the data, remotely. RPL (IPv6 Routing Protocol for Low Power and Lossy networks) is a routing protocol particularly designed for the constrained (low powered, low computation, less size, etc.) networks with the protocol 6LoWPAN (IPv6 Low Powered wireless Personal Area Networks). Due to the constrained behaviour of the RPL protocol, it will leads to many RPL routing attacks such as Sinkhole, Black hole, Wormhole, Selective forwarding, rank attacks, etc. This paper was focused on the Wormhole attack. The Wormhole attack will select the packets from one location and drops those packets in some other location (malicious) by forming the Tunnelling. To detect this attack here proposed and implemented a novel approach called (ADWA). Acknowledgement based technique for detection of the wormhole attack in RPL based Internet of Things networks. This approach was shown efficient results with the Telosb sky emulator nodes in the Contiki Cooja simulator, in terms of the Packet delivery ratio, delay and detection of wormhole attack.


2019 ◽  
Vol 8 (4) ◽  
pp. 7190-7196

Internet of Things (IoT) opens the way for many of the research areas out of which Network lifetime extension is one of the craziest research areas. Proposing a design for any sensor network routing protocol needs to concentrate on extending the network's existence. Minimizing energy consumption leads to an extension of the life of the network. Routing Protocol for Low power and Lossy Networks (RPL) is the routing protocol designed by IETF especially which meets the necessities of the constrained environments in IoT. This research article attempts improve performance of the RPL protocol by incorporating the soft-computing techniques. Here, a fuzzy logic-based approach is used which considers DIO_MIN as the essential factor/metric to improve the performance of RPL (i.e., reducing the energy consumption). The COOJA simulator is used for performing the simulations and assessment purpose. Results obtained from this research prove that fuzzy logic can be exercised to improving routing protocol quality (i.e., RPL) in terms of energy consumption.


2017 ◽  
Vol 13 (2) ◽  
pp. 87 ◽  
Author(s):  
Jose V. V. Sobral ◽  
Joel J. P. C. Rodrigues ◽  
Neeraj Kumar ◽  
Chunsheng Zhu ◽  
Raja W. Ahmad

LOADng (Lightweight On-demand Ad hoc Distance-vector Routing Protocol - Next Generation) is an emerging routing protocol that emerged as an alternative to RPL (IPv6 Routing Protocol for Low power and Lossy Networks). Although some work has been dedicated to study LOADng, these works do not analyze the performance of this protocol with different routing metrics. A routing metric is responsible for defining values for paths during the route creation process. Moreover, based on these metrics information a routing protocol will select the path to forward a message. Thus, this work aims to realize a performance assessment study considering different routing metrics applied to LOADng. The scenarios under study consider different traffic patterns and network sizes. The routing metrics are evaluated considering the packet delivery ratio, average energy spent per bit delivered, average latency, and number of hops. The results reveals that routing metrics used by this protocol may influence (directly) the network performance.


Sensors ◽  
2019 ◽  
Vol 19 (24) ◽  
pp. 5486 ◽  
Author(s):  
Sankar Sennan ◽  
Sathiyabhama Balasubramaniyam ◽  
Ashish Kr. Luhach ◽  
Somula Ramasubbareddy ◽  
Naveen Chilamkurti ◽  
...  

Energy conservation is one of the most critical problems in Internet of Things (IoT). It can be achieved in several ways, one of which is to select the optimal route for data transfer. IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is a standardized routing protocol for IoT. The RPL changes its path frequently while transmitting the data from source to the destination, due to high data traffic in dense networks. Hence, it creates data traffic across the nodes in the networks. To solve this issue, we propose Energy and Delay Aware Data aggregation in Routing Protocol (EDADA-RPL) for IoT. It has two processes, namely parent selection and data aggregation. The process of parent selection uses routing metric residual energy (RER) to choose the best possible parent for data transmission. The data aggregation process uses the compressed sensing (CS) theory in the parent node to combine data packets from the child nodes. Finally, the aggregated data transmits from a downward parent to the sink. The sink node collects all the aggregated data and it performs the reconstruction operation to get the original data of the participant node. The simulation is carried out using the Contiki COOJA simulator. EDADA-RPL’s performance is compared to RPL and LA-RPL. The EDADA-RPL offers good performance in terms of network lifetime, delay, and packet delivery ratio.


Sign in / Sign up

Export Citation Format

Share Document