Jawad Hassan , Adnan Sohail , Ali Ismail Awad , M. Ahmed Zaka
{"title":"LETM-IoT: A lightweight and efficient trust mechanism for Sybil attacks in Internet of Things networks","authors":"Jawad Hassan , Adnan Sohail , Ali Ismail Awad , M. Ahmed Zaka","doi":"10.1016/j.adhoc.2024.103576","DOIUrl":null,"url":null,"abstract":"<div><p>The Internet of Things (IoT) has recently gained significance as a means of connecting various physical devices to the Internet, enabling various innovative applications. However, the security of IoT networks is a significant concern due to the large volume of data generated and transmitted over them. The limited resources of IoT devices, along with their mobility and diverse characteristics, pose significant challenges for maintaining security in routing protocols, such as the Routing Protocol for Low-Power and Lossy Networks (RPL). This lacks effective defense mechanisms against routing attacks, including Sybil and rank attacks. Various techniques have been proposed to address this issue, including cryptography and intrusion-detection systems. The use of these techniques on IoT nodes is limited by their low power and lossy nature, primarily due to the significant computational overhead they involve. In addition, conventional trust-management systems for addressing security concerns need to be improved due to their high computation, memory, and energy costs. Therefore, this paper presents a novel, Lightweight, and Efficient Trust-based Mechanism (LETM-IoT) for resource-limited IoT networks to mitigate Sybil attacks. We conducted extensive simulations in Cooja, the Contiki OS simulator, to assess the efficacy of the proposed LETM-IoT against three types of Sybil attack (A, B, and C). A comparison was also made with standard RPL and state-of-the-art approaches. The experimental findings show that LETM-IoT outperforms both of these in terms of average packet-delivery ratio by 0.20 percentage points, true-positive ratio by 1.34 percentage points, energy consumption by 2.5%, and memory utilization by 19.42%. The obtained results also show that LETM-IoT consumes increased storage by 5.02% compared to the standard RPL due to the existence of an embedded security module.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103576"},"PeriodicalIF":4.4000,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1570870524001872/pdfft?md5=76ec8ae4462665d30ce03fddc3ecca3b&pid=1-s2.0-S1570870524001872-main.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ad Hoc Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1570870524001872","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The Internet of Things (IoT) has recently gained significance as a means of connecting various physical devices to the Internet, enabling various innovative applications. However, the security of IoT networks is a significant concern due to the large volume of data generated and transmitted over them. The limited resources of IoT devices, along with their mobility and diverse characteristics, pose significant challenges for maintaining security in routing protocols, such as the Routing Protocol for Low-Power and Lossy Networks (RPL). This lacks effective defense mechanisms against routing attacks, including Sybil and rank attacks. Various techniques have been proposed to address this issue, including cryptography and intrusion-detection systems. The use of these techniques on IoT nodes is limited by their low power and lossy nature, primarily due to the significant computational overhead they involve. In addition, conventional trust-management systems for addressing security concerns need to be improved due to their high computation, memory, and energy costs. Therefore, this paper presents a novel, Lightweight, and Efficient Trust-based Mechanism (LETM-IoT) for resource-limited IoT networks to mitigate Sybil attacks. We conducted extensive simulations in Cooja, the Contiki OS simulator, to assess the efficacy of the proposed LETM-IoT against three types of Sybil attack (A, B, and C). A comparison was also made with standard RPL and state-of-the-art approaches. The experimental findings show that LETM-IoT outperforms both of these in terms of average packet-delivery ratio by 0.20 percentage points, true-positive ratio by 1.34 percentage points, energy consumption by 2.5%, and memory utilization by 19.42%. The obtained results also show that LETM-IoT consumes increased storage by 5.02% compared to the standard RPL due to the existence of an embedded security module.
期刊介绍:
The Ad Hoc Networks is an international and archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in ad hoc and sensor networking areas. The Ad Hoc Networks considers original, high quality and unpublished contributions addressing all aspects of ad hoc and sensor networks. Specific areas of interest include, but are not limited to:
Mobile and Wireless Ad Hoc Networks
Sensor Networks
Wireless Local and Personal Area Networks
Home Networks
Ad Hoc Networks of Autonomous Intelligent Systems
Novel Architectures for Ad Hoc and Sensor Networks
Self-organizing Network Architectures and Protocols
Transport Layer Protocols
Routing protocols (unicast, multicast, geocast, etc.)
Media Access Control Techniques
Error Control Schemes
Power-Aware, Low-Power and Energy-Efficient Designs
Synchronization and Scheduling Issues
Mobility Management
Mobility-Tolerant Communication Protocols
Location Tracking and Location-based Services
Resource and Information Management
Security and Fault-Tolerance Issues
Hardware and Software Platforms, Systems, and Testbeds
Experimental and Prototype Results
Quality-of-Service Issues
Cross-Layer Interactions
Scalability Issues
Performance Analysis and Simulation of Protocols.