Mitigating Denial of Service Attacks in RPL-Based IoT Environments: Trust-Based Approach

被引:8
|
作者
Azzedin, Farag [1 ]
机构
[1] King Fahd Univ Petr & Minerals, Interdisciplinary Res Ctr Intelligent Secure Syst, Informat & Comp Sci Dept, Dhahran 31261, Saudi Arabia
关键词
Internet of Things; Security; Routing protocols; Topology; Linear programming; Trusted computing; Denial-of-service attack; Data integrity; Energy management; Attacks; hello flooding; IoT; power drain; RPL; trust; version number modification; ROUTING PROTOCOL; INTERNET; THINGS; LIGHTWEIGHT; NETWORKS; SECURITY; CONTIKI;
D O I
10.1109/ACCESS.2023.3331030
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In domains such as telehealth, intelligent transportation, and autonomous agriculture, ensuring secure routing of collected and exchanged data is paramount. Since its inception, there have been many research challenges for the RPL routing protocol that operates in resource-constrained environments and utilizes battery-powered IoT devices. Hence, researchers have focused on this crucial challenge by advising solutions to mitigate attacks that deplete nodes' energy and hence create energy gaps in the network. In this article, we study the impact of two energy exhaustion attacks (hello flooding and version number modification) on the RPL protocol and we present a novel mitigation solution based on behavioural trust. We present an in-depth study of the impact on radio energy consumption of the hello flooding and version number modification attacks in RPL as the number of network nodes increases. We showed that the impact of the former is localized to nodes in the vicinity of the attacker while the latter has a global impact that extends to the entire network. The obtained results from our simulations show that version number modification attack in particular has devastating impact on the network. We also propose a trust-based solution to mitigate these attacks and demonstrate its effectiveness. Accordingly, we conduct comparative study of these attacks and empirically investigate their impact on network performance by running extensive evaluation experiments. Our findings verify the effectiveness of our proposed trust system in mitigating both attacks.
引用
收藏
页码:129077 / 129089
页数:13
相关论文
共 50 条
  • [21] Trust-based Service Provider Selection in Open Environments
    Billhardt, Holger
    Hermoso, Ramon
    Ossowski, Sascha
    Centeno, Roberto
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 1375 - 1380
  • [22] RPL-Based IoT Networks under Simple and Complex Routing Security Attacks: An Experimental Study
    Alsukayti, Ibrahim S.
    Alreshoodi, Mohammed
    APPLIED SCIENCES-BASEL, 2023, 13 (08):
  • [23] DE2RA-RPL: detection and elimination of resource-related attacks in IoT RPL-based protocol
    Paganraj, Deepavathi
    Chelliah, Mala
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (15): : 22397 - 22427
  • [24] Trust-based Neighbor Unreachability Detection for RPL
    Guclu, Sila Ozen
    Ozcelebi, Tanir
    Lukkien, Johan J.
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [25] THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack
    Arshad, Danyal
    Asim, Muhammad
    Tariq, Noshina
    Baker, Thar
    Tawfik, Hissam
    Obe, Dhiya Al-Jumeily
    PLOS ONE, 2022, 17 (07):
  • [26] A trust-based selection approach for composite service
    Li, Jun
    Zheng, Xiao-Lin
    Chen, De-Ren
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2012, 46 (05): : 885 - 892
  • [27] Trust-Based Service Management for Mobile Cloud IoT Systems
    Chen, Ing-Ray
    Guo, Jia
    Wang, Ding-Chau
    Tsai, Jeffrey J. P.
    Al-Hamadi, Hamid
    You, Ilsun
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (01): : 246 - 263
  • [28] Securing RPL Routing Protocol from Blackhole Attacks Using a Trust-based Mechanism
    Airehrour, David
    Gutierrez, Jairo
    Ray, Sayan Kumar
    2016 26TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2016, : 115 - 120
  • [29] Trust-based Service Provider Selection in Service-oriented Environments
    Su, Xing
    Zhang, Minjie
    Mu, Yi
    Bai, Quan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (10): : 1 - 9
  • [30] Routing Attacks and Mitigation Methods for RPL-Based Internet of Things
    Raoof, Ahmed
    Matrawy, Ashraf
    Lung, Chung-Horng
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1582 - 1606