TARRP: Trust Aware RPL Routing Protocol for IoT

IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC International Journal of Communication Systems Pub Date : 2025-01-21 DOI:10.1002/dac.6124
Mostafa Nazarian Parizi, Seyyed Hamid Ghafouri, Mohammad Sadegh Hajmohammadi
{"title":"TARRP: Trust Aware RPL Routing Protocol for IoT","authors":"Mostafa Nazarian Parizi,&nbsp;Seyyed Hamid Ghafouri,&nbsp;Mohammad Sadegh Hajmohammadi","doi":"10.1002/dac.6124","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The internet of things (IoT) is vulnerable to attacks due to its unique characteristics and numerous limitations, and it is highly prone to attack due to sensitive applications. Most of these attacks are aimed at routing and data transmission (which are the most vital pillars of IoT). So far, many research studies have been proposed to improve the security of routing and data transmission, and most of these methods have been developed based on trust models. Trust models are considered as a powerful and complementary tool for security systems that provide the ability to detect malicious nodes. However, most of these researches to advance their goals are only focused on examining the behavior of nodes during data transmission, and based on this, the trust value of nodes is calculated. This way of assessing trust is not enough due to the widespread attacks of malicious nodes. In this paper, a reliable routing method based on the optimization of IPv6 routing protocol for low power and lossy networks (RPL) routing protocol and trust models is introduced called TARRP (Trust Aware RPL Routing Protocol). TARRP is a two-step method in which the purpose of the first stage is to create a trusty and reliable topology. The second stage is to assess the trust and identify malicious nodes. In addition to implementing trust, TARRP also manages related recommendations and attacks. The results of simulations using cooja in different scenarios showed the superiority of TARRP in improving routing trust and data exchange compared to previous work.</p>\n </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 4","pages":""},"PeriodicalIF":1.8000,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Communication Systems","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/dac.6124","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

The internet of things (IoT) is vulnerable to attacks due to its unique characteristics and numerous limitations, and it is highly prone to attack due to sensitive applications. Most of these attacks are aimed at routing and data transmission (which are the most vital pillars of IoT). So far, many research studies have been proposed to improve the security of routing and data transmission, and most of these methods have been developed based on trust models. Trust models are considered as a powerful and complementary tool for security systems that provide the ability to detect malicious nodes. However, most of these researches to advance their goals are only focused on examining the behavior of nodes during data transmission, and based on this, the trust value of nodes is calculated. This way of assessing trust is not enough due to the widespread attacks of malicious nodes. In this paper, a reliable routing method based on the optimization of IPv6 routing protocol for low power and lossy networks (RPL) routing protocol and trust models is introduced called TARRP (Trust Aware RPL Routing Protocol). TARRP is a two-step method in which the purpose of the first stage is to create a trusty and reliable topology. The second stage is to assess the trust and identify malicious nodes. In addition to implementing trust, TARRP also manages related recommendations and attacks. The results of simulations using cooja in different scenarios showed the superiority of TARRP in improving routing trust and data exchange compared to previous work.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
TARRP:物联网的信任感知RPL路由协议
物联网(IoT)因其独特的特性和众多限制而容易受到攻击,而且由于其应用敏感,极易受到攻击。这些攻击大多针对路由和数据传输(这是物联网最重要的支柱)。迄今为止,已有许多研究提出要提高路由和数据传输的安全性,其中大多数方法都是基于信任模型开发的。信任模型被认为是安全系统的强大补充工具,能提供检测恶意节点的能力。然而,这些研究为了推进目标,大多只关注检查节点在数据传输过程中的行为,并在此基础上计算节点的信任值。由于恶意节点的攻击非常普遍,这种评估信任度的方法是不够的。本文介绍了一种基于低功耗和有损网络(RPL)路由协议和信任模型的 IPv6 路由协议优化的可靠路由方法,称为 TARRP(Trust Aware RPL Routing Protocol)。TARRP 是一种分两步走的方法,第一阶段的目的是创建一个可信和可靠的拓扑结构。第二阶段是评估信任度并识别恶意节点。除了实施信任,TARRP 还管理相关建议和攻击。使用 cooja 在不同场景下进行的模拟结果表明,与之前的工作相比,TARRP 在改善路由信任和数据交换方面更具优势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
5.90
自引率
9.50%
发文量
323
审稿时长
7.9 months
期刊介绍: The International Journal of Communication Systems provides a forum for R&D, open to researchers from all types of institutions and organisations worldwide, aimed at the increasingly important area of communication technology. The Journal''s emphasis is particularly on the issues impacting behaviour at the system, service and management levels. Published twelve times a year, it provides coverage of advances that have a significant potential to impact the immense technical and commercial opportunities in the communications sector. The International Journal of Communication Systems strives to select a balance of contributions that promotes technical innovation allied to practical relevance across the range of system types and issues. The Journal addresses both public communication systems (Telecommunication, mobile, Internet, and Cable TV) and private systems (Intranets, enterprise networks, LANs, MANs, WANs). The following key areas and issues are regularly covered: -Transmission/Switching/Distribution technologies (ATM, SDH, TCP/IP, routers, DSL, cable modems, VoD, VoIP, WDM, etc.) -System control, network/service management -Network and Internet protocols and standards -Client-server, distributed and Web-based communication systems -Broadband and multimedia systems and applications, with a focus on increased service variety and interactivity -Trials of advanced systems and services; their implementation and evaluation -Novel concepts and improvements in technique; their theoretical basis and performance analysis using measurement/testing, modelling and simulation -Performance evaluation issues and methods.
期刊最新文献
SmartRoute Optimization Network: Anomaly-Aware Energy-Efficient Routing for Real-Time Landslide Monitoring in WSNs KLeFHNet: Kronecker LeNet Forward Harmonic Net for Crop Recommendation With Routing in Wireless Sensor Networks for Agriculture False Data Detection in Wireless Body Area Network Using BiLSTM Adaptive Multilayer Contrastive Graph Neural Networks for Channel Estimation in Reconfigurable Intelligent Surface-Aided MIMO Systems Node Localization in 3D WSN Using Optimized Deep Learning Mechanism
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1