Visible to the public Trust-Based Enhanced Secure Routing against Rank and Sybil Attacks in IoT

TitleTrust-Based Enhanced Secure Routing against Rank and Sybil Attacks in IoT
Publication TypeConference Paper
Year of Publication2019
AuthorsTandon, Aditya, Srivastava, Prakash
Conference Name2019 Twelfth International Conference on Contemporary Computing (IC3)
ISBN Number978-1-7281-3591-5
Keywordscomposability, computer network security, energy consumption, forwarding data packets, Internet of Things, IoT, IoT network, performance evaluation, PROTECT, providing routing security using the technique of collective trust mechanism, pubcrawl, rank attack, resource constrained characteristics, Routing, routing protocol for low power and lossy network, Routing protocols, RPL security, Scalability, Sec-Trust protocol, Secure DODAG Construction, security, standardized proactive routing protocol, Sybil attack, sybil attacks, trust evaluation methods, Trust Routing, trust value, trust-based enhanced secure RPL routing attacks, trustworthy nodes

The Internet of Things (IoT) is an emerging technology that plays a vital role in interconnecting various objects into a network to provide desired services within its resource constrained characteristics. In IoT, the Routing Protocol for Low power and Lossy network (RPL) is the standardized proactive routing protocol that achieves satisfying resource consumption, but it does not consider the node's routing behavior for forwarding data packets. The malicious intruders exploit these loopholes for launching various forms of routing attacks. Different security mechanisms have been introduced for detecting these attacks singly. However, the launch of multiple attacks such as Rank attack and Sybil attacks simultaneously in the IoT network is one of the devastating and destructive situations. This problem can be solved by establishing secure routing with trustworthy nodes. The trustworthiness of the nodes is determined using trust evaluation methods, where the parameters considered are based on the factors that influence in detecting the attacks. In this work, Providing Routing Security using the Technique of Collective Trust (PROTECT) mechanism is introduced, and it aims to provide a secure RPL routing by simultaneously detecting both Rank and Sybil attacks in the network. The advantage of the proposed scheme is highlighted by comparing its performance with the performance of the Sec-Trust protocol in terms of detection accuracy, energy consumption, and throughput.

Citation Keytandon_trust-based_2019