A Novel Approach Towards Enhancing the Performance of Trust Based RPL Protocol in Internet of Things

Trust calculation in a Routing Protocol of Low Power and Lossy (RPL) is an interesting area to study due to its varying network parameters and features This work proposes an effective method of calculating the trust score for each node using valuation by the cluster head of the network. In addition to the trust calculated by the cluster head for each node the system also involves the node deciding which type of cluster to join based on its expected trust value and the credibility of the cluster to be joined. Thus the existing system functioning from the cluster point of view has been modified to accommodate and include the cluster and node credibility with provision for the node to choose a trusted network.

[1]  Jiguo Li,et al.  Searchable ciphertext‐policy attribute‐based encryption with revocation in cloud storage , 2017, Int. J. Commun. Syst..

[2]  Dong Yang,et al.  TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[3]  Manoj Misra,et al.  Trust Based Multi Path DSR Protocol , 2010, 2010 International Conference on Availability, Reliability and Security.

[4]  Gutierrez Jairo,et al.  Securing RPL routing protocol from blackhole attacks using a trust-based mechanism , 2016 .

[5]  Christian Müller-Schloer,et al.  Comparing the Effects of Disturbances in Self-adaptive Systems - A Generalised Approach for the Quantification of Robustness , 2018, Trans. Comput. Collect. Intell..

[6]  Fenye Bao,et al.  Dynamic trust management for internet of things applications , 2012, Self-IoT '12.

[7]  Jia Guo,et al.  Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[8]  Deepika Kukreja,et al.  Analytical models for trust based routing protocols in wireless ad hoc networks , 2012, SOEN.

[9]  Djamel Tandjaoui,et al.  Trust-based RPL for the Internet of Things , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[10]  Rana Ejaz Ahmed A Fault-Tolerant Routing Protocol for Mobile Ad Hoc Networks , 2011 .

[11]  Jin-Hee Cho,et al.  Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[12]  N. Nalini,et al.  Performance analysis of routing protocols for IoT , 2018 .

[13]  Jia Guo,et al.  Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).

[14]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[15]  Deepika Kukreja,et al.  Trust based Routing using Dominating Set Approach (TRDSA) in Wireless Ad-Hoc Networks , 2012 .

[16]  Jin-Hee Cho,et al.  On the tradeoff between altruism and selfishness in MANET trust management , 2013, Ad Hoc Networks.

[17]  Sayan Kumar Ray,et al.  SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..

[18]  Sayan Kumar Ray,et al.  Securing RPL routing protocol from blackhole attacks using a trust-based mechanism , 2016, 2016 26th International Telecommunication Networks and Applications Conference (ITNAC).

[19]  Akanksha Jain,et al.  A Survey on Miscellaneous Attacks and Countermeasures for RPL Routing Protocol in IoT , 2019 .

[20]  Mohsen Guizani,et al.  A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.

[21]  Jia Guo,et al.  Hierarchical trust management of community of interest groups in mobile ad hoc networks , 2015, Ad Hoc Networks.

[22]  Hongke Zhang,et al.  TC-BAC: A trust and centrality degree based access control model in wireless sensor networks , 2013, Ad Hoc Networks.

[23]  Jin-Hee Cho,et al.  On modeling of adversary behavior and defense for survivability of military MANET applications , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[24]  Jin-Hee Cho,et al.  Composite trust-based public key management in mobile ad hoc networks , 2013, SAC '13.

[25]  Ing-Ray Chen,et al.  Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless Sensor Networks , 2015, IEEE Transactions on Network and Service Management.

[26]  Ananthram Swami,et al.  Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks , 2009 .

[27]  Huang Chuanhe,et al.  Trusted Dynamic Source Routing Protocol , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.