Visible to the public A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks

TitleA Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks
Publication TypeConference Paper
Year of Publication2019
AuthorsThulasiraman, Preetha, Wang, Yizhong
Conference Name2019 16th IEEE Annual Consumer Communications Networking Conference (CCNC)
Date Publishedjan
PublisherIEEE
ISBN Number978-1-5386-5553-5
KeywordsArchitecture, ARSSI, average received signal strength indicator, commercial off the shelf standards, common security techniques, composability, Computer architecture, Conferences, control overhead, Cooja network simulator, COTS IoT devices, denial of service attack, Internet of Things, lightweight trust-based security architecture, military communities, mobile IoT network, mobile IoT wireless network, mobile radio, Network Security Architecture, network whitelist, node trust value, nonce identity value, privacy, pubcrawl, Resiliency, Routing, routing path, Routing protocols, RPL, RPL IoT routing algorithm, RSSI, Scalability, security, Sensor networks, Sybil based identity attacks, telecommunication network routing, telecommunication security, Trust Routing, Whitelists, Wireless sensor networks, Wireshark
Abstract

Military communities have come to rely heavily on commercial off the shelf (COTS) standards and technologies for Internet of Things (IoT) operations. One of the major obstacles to military use of COTS IoT devices is the security of data transfer. In this paper, we successfully design and develop a lightweight, trust-based security architecture to support routing in a mobile IoT network. Specifically, we modify the RPL IoT routing algorithm using common security techniques, including a nonce identity value, timestamp, and network whitelist. Our approach allows RPL to select a routing path over a mobile IoT wireless network based on a computed node trust value and average received signal strength indicator (ARSSI) value across network members. We conducted simulations using the Cooja network simulator and Wireshark to validate the algorithm against stipulated threat models. We demonstrate that our algorithm can protect the network against Denial of Service (DoS) and Sybil based identity attacks. We also show that the control overhead required for our algorithm is less than 5% and that the packet delivery rate improves by nearly 10%.

URLhttps://ieeexplore.ieee.org/document/8651846
DOI10.1109/CCNC.2019.8651846
Citation Keythulasiraman_lightweight_2019