SMTrust: Proposing Trust-Based Secure Routing Protocol for RPL Attacks for IoT Applications

With large scale generation and exchange of data between IoT devices and constrained IoT security to protect data communication, it becomes easy for attackers to compromise data routes. In IoT networks, IPv6 Routing Protocol is the de facto routing protocol for Low Power and Lossy Networks (RPL). RPL offers limited security against several RPL-specific and WSN-inherited attacks in IoT applications. Additionally, IoT devices are limited in memory, processing, and power to operate properly using the traditional Internet and routing security solutions. Several mitigation schemes for the security of IoT networks and routing, have been proposed including Machine Learning-based, IDS-based, and Trust-based approaches. In existing trust-based methods, mobility of nodes is not considered at all or its insufficient for mobile sink nodes, specifically for security against RPL attacks. This research work proposes a conceptual design, named SMTrust, for security of routing protocol in IoT, considering the mobility-based trust metrics. The proposed solution intends to provide defense against popular RPL attacks, for example, Blackhole, Greyhole, Rank, Version Number attacks, etc. We believe that SMTrust shall provide better network performance for attacks detection accuracy, mobility and scalability as compared to existing trust models, such as, DCTM-RPL and SecTrust-RPL. The novelty of our solution is that it considers the mobility metrics of the sensor nodes as well as the sink nodes, which has not been addressed by the existing models. This consideration makes it suitable for mobile IoT environment. The proposed design of SMTrust, as secure routing protocol, when embedded in RPL, shall ensure confidentiality, integrity, and availability among the sensor nodes during routing process in IoT communication and networks.

[1]  Fereidoon Shams Aliee,et al.  Dynamic and comprehensive trust model for IoT and its integration into RPL , 2018, The Journal of Supercomputing.

[2]  Noor Zaman,et al.  Proposing secure and lightweight authentication scheme for IoT based E-health applications , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).

[3]  Furkan Yusuf Yavuz,et al.  Deep Learning for Detection of Routing Attacks in the Internet of Things , 2018, Int. J. Comput. Intell. Syst..

[4]  A. Sunitha Nandhini,et al.  A Novel Security and Energy Efficient Data Aggregation for Medical Internet of Things Using Trust , 2020 .

[5]  Farookh Khadeer Hussain,et al.  A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT) , 2018, Computing.

[6]  Ahmad Akbari,et al.  A trust management scheme for IoT-enabled environmental health/accessibility monitoring services , 2018, International Journal of Information Security.

[7]  Stephen E. Deering,et al.  Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.

[8]  Geethapriya Thamilarasu,et al.  Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things , 2019, Sensors.

[9]  Jiannong Cao,et al.  CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things , 2019, IEEE Internet of Things Journal.

[10]  Syeda Mariam Muzammal,et al.  A Study on Secured Authentication and Authorization in Internet of Things: Potential of Blockchain Technology , 2019 .

[11]  A Meena Kowshalya,et al.  Dynamic trust management for secure communications in social internet of things (SIoT) , 2018, Sādhanā.

[12]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[13]  Sayan Kumar Ray,et al.  A Trust-based Defence Scheme for Mitigating Blackhole and Selective Forwarding Attacks in the RPL Routing Protocol , 2018 .

[14]  Thomas Lagkas,et al.  Network Protocols, Schemes, and Mechanisms for Internet of Things (IoT): Features, Open Challenges, and Trends , 2018, Wirel. Commun. Mob. Comput..

[15]  Angel Lozano,et al.  A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs) , 2015, RFC.

[16]  Raja Kumar Murugesan,et al.  A Study on Leveraging Blockchain Technology for IoT Security Enhancement , 2018, 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA).

[17]  M. Humayun,et al.  Smart Secure and Energy Efficient Scheme for E-Health Applications using IoT: A Review , 2020 .

[18]  Preetha Thulasiraman,et al.  A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[19]  Sayan Kumar Ray,et al.  SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..

[20]  Mohsen Guizani,et al.  Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of Things , 2018, 2018 IEEE 43rd Conference on Local Computer Networks (LCN).

[21]  Abdur Rehman,et al.  Detection of rank attack in routing protocol for Low Power and Lossy Networks , 2018, Ann. des Télécommunications.

[22]  Mangal Sain,et al.  Survey on security in Internet of Things: State of the art and challenges , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[23]  A. Shanmugam,et al.  Jensen–Shannon Divergence Based Independent Component Analysis to Detect and Prevent Black Hole Attacks in Healthcare WSN , 2019, Wireless Personal Communications.

[24]  Nitin Khanna,et al.  Study of trust‐based mechanism and its component model in MANET: Current research state, issues, and future recommendation , 2019, Int. J. Commun. Syst..

[25]  Victor C. M. Leung,et al.  Trust management for secure cognitive radio vehicular ad hoc networks , 2019, Ad Hoc Networks.

[26]  Mohammad Nauman,et al.  Trust in IoT: dynamic remote attestation through efficient behavior capture , 2017, Cluster Computing.

[27]  N. Z. Jhanjhi,et al.  Proposing a Secure RPL based Internet of Things Routing Protocol: A Review , 2020, Ad Hoc Networks.

[28]  Pete Burnap,et al.  A Supervised Intrusion Detection System for Smart Home IoT Devices , 2019, IEEE Internet of Things Journal.

[29]  Mansour Sheikhan,et al.  Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..

[30]  Donn B. Parker,et al.  Restating the Foundation of Information Security , 1991, SEC.

[31]  Zhihua Zhang,et al.  Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks , 2017, IEEE Access.

[32]  Chung-Horng Lung,et al.  Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[33]  Noor Zaman,et al.  Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication , 2020, IEEE Access.

[34]  Gianluca Dini,et al.  An Implementation and Evaluation of the Security Features of RPL , 2017, ADHOC-NOW.

[35]  Shaveta Rani,et al.  Towards a Light Weight Routing Security in IoT Using Non-cooperative Game Models and Dempster–Shaffer Theory , 2020, Wirel. Pers. Commun..