Trust-Based Enhanced Secure Routing against Rank and Sybil Attacks in IoT
Title | Trust-Based Enhanced Secure Routing against Rank and Sybil Attacks in IoT |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Tandon, Aditya, Srivastava, Prakash |
Conference Name | 2019 Twelfth International Conference on Contemporary Computing (IC3) |
Publisher | IEEE |
ISBN Number | 978-1-7281-3591-5 |
Keywords | composability, computer network security, energy consumption, forwarding data packets, Internet of Things, IoT, IoT network, performance evaluation, PROTECT, providing routing security using the technique of collective trust mechanism, pubcrawl, rank attack, resource constrained characteristics, Routing, routing protocol for low power and lossy network, Routing protocols, RPL security, Scalability, Sec-Trust protocol, Secure DODAG Construction, security, standardized proactive routing protocol, Sybil attack, sybil attacks, trust evaluation methods, Trust Routing, trust value, trust-based enhanced secure RPL routing attacks, trustworthy nodes |
Abstract | The Internet of Things (IoT) is an emerging technology that plays a vital role in interconnecting various objects into a network to provide desired services within its resource constrained characteristics. In IoT, the Routing Protocol for Low power and Lossy network (RPL) is the standardized proactive routing protocol that achieves satisfying resource consumption, but it does not consider the node's routing behavior for forwarding data packets. The malicious intruders exploit these loopholes for launching various forms of routing attacks. Different security mechanisms have been introduced for detecting these attacks singly. However, the launch of multiple attacks such as Rank attack and Sybil attacks simultaneously in the IoT network is one of the devastating and destructive situations. This problem can be solved by establishing secure routing with trustworthy nodes. The trustworthiness of the nodes is determined using trust evaluation methods, where the parameters considered are based on the factors that influence in detecting the attacks. In this work, Providing Routing Security using the Technique of Collective Trust (PROTECT) mechanism is introduced, and it aims to provide a secure RPL routing by simultaneously detecting both Rank and Sybil attacks in the network. The advantage of the proposed scheme is highlighted by comparing its performance with the performance of the Sec-Trust protocol in terms of detection accuracy, energy consumption, and throughput. |
URL | https://ieeexplore.ieee.org/document/8844935 |
DOI | 10.1109/IC3.2019.8844935 |
Citation Key | tandon_trust-based_2019 |
- routing protocol for low power and lossy network
- trustworthy nodes
- trust-based enhanced secure RPL routing attacks
- trust value
- Trust Routing
- trust evaluation methods
- sybil attacks
- Sybil attack
- standardized proactive routing protocol
- security
- Secure DODAG Construction
- Sec-Trust protocol
- Scalability
- RPL security
- Routing protocols
- composability
- Routing
- resource constrained characteristics
- rank attack
- pubcrawl
- providing routing security using the technique of collective trust mechanism
- PROTECT
- performance evaluation
- IoT network
- IoT
- Internet of Things
- forwarding data packets
- energy consumption
- computer network security