A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks
Title | A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Thulasiraman, Preetha, Wang, Yizhong |
Conference Name | 2019 16th IEEE Annual Consumer Communications Networking Conference (CCNC) |
Date Published | jan |
Publisher | IEEE |
ISBN Number | 978-1-5386-5553-5 |
Keywords | Architecture, ARSSI, average received signal strength indicator, commercial off the shelf standards, common security techniques, composability, Computer architecture, Conferences, control overhead, Cooja network simulator, COTS IoT devices, denial of service attack, Internet of Things, lightweight trust-based security architecture, military communities, mobile IoT network, mobile IoT wireless network, mobile radio, Network Security Architecture, network whitelist, node trust value, nonce identity value, privacy, pubcrawl, Resiliency, Routing, routing path, Routing protocols, RPL, RPL IoT routing algorithm, RSSI, Scalability, security, Sensor networks, Sybil based identity attacks, telecommunication network routing, telecommunication security, Trust Routing, Whitelists, Wireless sensor networks, Wireshark |
Abstract | Military communities have come to rely heavily on commercial off the shelf (COTS) standards and technologies for Internet of Things (IoT) operations. One of the major obstacles to military use of COTS IoT devices is the security of data transfer. In this paper, we successfully design and develop a lightweight, trust-based security architecture to support routing in a mobile IoT network. Specifically, we modify the RPL IoT routing algorithm using common security techniques, including a nonce identity value, timestamp, and network whitelist. Our approach allows RPL to select a routing path over a mobile IoT wireless network based on a computed node trust value and average received signal strength indicator (ARSSI) value across network members. We conducted simulations using the Cooja network simulator and Wireshark to validate the algorithm against stipulated threat models. We demonstrate that our algorithm can protect the network against Denial of Service (DoS) and Sybil based identity attacks. We also show that the control overhead required for our algorithm is less than 5% and that the packet delivery rate improves by nearly 10%. |
URL | https://ieeexplore.ieee.org/document/8651846 |
DOI | 10.1109/CCNC.2019.8651846 |
Citation Key | thulasiraman_lightweight_2019 |
- Scalability
- nonce identity value
- privacy
- pubcrawl
- Resiliency
- Routing
- routing path
- Routing protocols
- RPL
- RPL IoT routing algorithm
- RSSI
- node trust value
- security
- sensor networks
- Sybil based identity attacks
- telecommunication network routing
- telecommunication security
- Trust Routing
- Whitelists
- wireless sensor networks
- Wireshark
- COTS IoT devices
- ARSSI
- average received signal strength indicator
- commercial off the shelf standards
- common security techniques
- composability
- computer architecture
- Conferences
- control overhead
- Cooja network simulator
- architecture
- denial of service attack
- Internet of Things
- lightweight trust-based security architecture
- military communities
- mobile IoT network
- mobile IoT wireless network
- mobile radio
- Network Security Architecture
- network whitelist