Skip to main content
Erschienen in: Journal of Network and Systems Management 4/2020

11.05.2020

Fuzzy, Dynamic and Trust Based Routing Protocol for IoT

verfasst von: Seyyed Yasser Hashemi, Fereidoon Shams Aliee

Erschienen in: Journal of Network and Systems Management | Ausgabe 4/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT) could be described as the pervasive and global network where real-world entities augmented with computing devices, sensors and actuators are connected to the Internet, enabling them to publish their generated data. Thus, an efficient and secure routing service is required to enable efficient communication of information among IoT nodes. This sophisticated, dynamic, and ultra-large-scale network requires the use of contextual information, attention to security issues and the consideration of service quality to make proper routing decisions. The routing protocol for low-power and lossy networks (RPL) and improved versions of it are experiencing severe performance gaps under network attacks such as BLACKHOLE, SYBIL and RANK. This paper uses the concept of trust as an umbrella to cover countermeasures for addressing the consequences of attacks. Accordingly, a multi-fuzzy, dynamic and hierarchical trust model (FDTM-IoT) is proposed. The main dimensions of this model are contextual information (CI), quality of service (QoS) and quality of P2P communication (QPC). Each dimension also has its own sub-dimensions or criteria. FDTM-IoT is integrated into RPL (FDTM-RPL) as objective function. FDTM-RPL use trust to deal with attacks. In the proposed method, fuzzy logic has been used in trust calculations to consider uncertainty as one of the most important inherent characteristics of trust. The efficiency of FDTM-RPL in various scenarios (including small-scale to large-scale networks, mobile environment as well as different transmission rates and under different attacks) has been compared with standard RPL protocols. FDTM-RPL provides high performance in detecting attacks. Additionally, it improves network performance in a variety of criteria, including end-to-end delay and packet loss rates.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Tseng, F.H., Chou, L.D., Chao, H.C.: A survey of black hole attacks in wireless mobile ad hoc networks. Hum.-centric Comput. Inf. Sci. 1, 1–16 (2011)CrossRef Tseng, F.H., Chou, L.D., Chao, H.C.: A survey of black hole attacks in wireless mobile ad hoc networks. Hum.-centric Comput. Inf. Sci. 1, 1–16 (2011)CrossRef
2.
Zurück zum Zitat Djedjig, N., Tandjaoui, D., Medjek, F., Romdhani, I.: Trust-aware and cooperative routing protocol for IoT security. J. Inf. Secur. Appl. 52, 102467 (2020) Djedjig, N., Tandjaoui, D., Medjek, F., Romdhani, I.: Trust-aware and cooperative routing protocol for IoT security. J. Inf. Secur. Appl. 52, 102467 (2020)
3.
Zurück zum Zitat Thulasiraman, P., Wang, Y.: A lightweight trust-based security architecture for RPL in mobile IoT networks. In: 2019 16th IEEE Annual Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, pp. 1–6 (2019) Thulasiraman, P., Wang, Y.: A lightweight trust-based security architecture for RPL in mobile IoT networks. In: 2019 16th IEEE Annual Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, pp. 1–6 (2019)
4.
Zurück zum Zitat Murali, S., Jamalipour, A.: A lightweight intrusion detection for sybil attack under mobile RPL in the internet of things. IEEE Internet Things J. 7(1), 379–388 (2020)CrossRef Murali, S., Jamalipour, A.: A lightweight intrusion detection for sybil attack under mobile RPL in the internet of things. IEEE Internet Things J. 7(1), 379–388 (2020)CrossRef
5.
Zurück zum Zitat Winter, T., Thubert, P., Brandt, A., Hui, J.W., Kelsey, R., Levis, P., Pister, K.S.J., Struik, R., Vasseur, J.P., Alexander, R.K.: RPL: Ipv6 routing protocol for low-power and lossy networks. RFC 6550, 1–157 (2012) Winter, T., Thubert, P., Brandt, A., Hui, J.W., Kelsey, R., Levis, P., Pister, K.S.J., Struik, R., Vasseur, J.P., Alexander, R.K.: RPL: Ipv6 routing protocol for low-power and lossy networks. RFC 6550, 1–157 (2012)
6.
Zurück zum Zitat Gaddour, O., Koubaa, A., Baccour, N., Abid, M.: Of-fl: Qos-aware fuzzy logic objective function for the RPL routing protocol. In: 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), pp. 365–372 (2014) Gaddour, O., Koubaa, A., Baccour, N., Abid, M.: Of-fl: Qos-aware fuzzy logic objective function for the RPL routing protocol. In: 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), pp. 365–372 (2014)
7.
Zurück zum Zitat Gaddour, O., Koubaa, Anis: RPL in a nutshell: a survey. Comput. Netw. 56, 3163–3178 (2012)CrossRef Gaddour, O., Koubaa, Anis: RPL in a nutshell: a survey. Comput. Netw. 56, 3163–3178 (2012)CrossRef
8.
Zurück zum Zitat Vasseur, J.P., Kim, M., Pister, K.S.J., Dejean, N., Barthel, Dominique: Routing metrics used for path calculation in low-power and lossy networks. RFC 6551, 1–30 (2012) Vasseur, J.P., Kim, M., Pister, K.S.J., Dejean, N., Barthel, Dominique: Routing metrics used for path calculation in low-power and lossy networks. RFC 6551, 1–30 (2012)
9.
Zurück zum Zitat Thubert, Pascal: Objective function zero for the routing protocol for low-power and lossy networks (RPL). RFC 6552, 1–14 (2012) Thubert, Pascal: Objective function zero for the routing protocol for low-power and lossy networks (RPL). RFC 6552, 1–14 (2012)
10.
Zurück zum Zitat Gnawali, O., Levis, P.: Internet engineering task force (IETF) the minimum rank with hysteresis objective function (2012) Gnawali, O., Levis, P.: Internet engineering task force (IETF) the minimum rank with hysteresis objective function (2012)
11.
Zurück zum Zitat Hashemi, S.Y., Aliee, F.S.: Dynamic and comprehensive trust model for IOT and its integration into RPL. J. Supercomput. 75, 3555–3584 (2019)CrossRef Hashemi, S.Y., Aliee, F.S.: Dynamic and comprehensive trust model for IOT and its integration into RPL. J. Supercomput. 75, 3555–3584 (2019)CrossRef
12.
Zurück zum Zitat Airehrour, D., Gutiérrez, J.A., Ray, Sayan Kumar: Sectrust-RPL: a secure trust-aware RPL routing protocol for internet of things. Fut. Gen. Comput. Syst. 93, 860–876 (2018)CrossRef Airehrour, D., Gutiérrez, J.A., Ray, Sayan Kumar: Sectrust-RPL: a secure trust-aware RPL routing protocol for internet of things. Fut. Gen. Comput. Syst. 93, 860–876 (2018)CrossRef
13.
Zurück zum Zitat Djedjig, N., Tandjaoui, D., Medjek, F.: Trust-based RPL for the internet of things. In: 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 962–967 (2015) Djedjig, N., Tandjaoui, D., Medjek, F.: Trust-based RPL for the internet of things. In: 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 962–967 (2015)
14.
Zurück zum Zitat Djedjig, N., Tandjaoui, D., Medjek, F., Romdhani, I.: New trust metric for the RPL routing protocol. In: 2017 8th International Conference on Information and Communication Systems (ICICS), pp. 328–335 (2017) Djedjig, N., Tandjaoui, D., Medjek, F., Romdhani, I.: New trust metric for the RPL routing protocol. In: 2017 8th International Conference on Information and Communication Systems (ICICS), pp. 328–335 (2017)
15.
Zurück zum Zitat Iuchi, K., Matsunaga, T., Toyoda, K., Sasase, I.: Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network. In: 2015 21st Asia-Pacific Conference on Communications (APCC), pp. 299–303 (2015) Iuchi, K., Matsunaga, T., Toyoda, K., Sasase, I.: Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network. In: 2015 21st Asia-Pacific Conference on Communications (APCC), pp. 299–303 (2015)
16.
Zurück zum Zitat Seeber, S., Sehgal, A., Stelte, B., Rodosek, G.D., Schönwälder, J.: Towards a trust computing architecture for RPL in cyber physical systems. In: Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013), pp. 134–137 (2013) Seeber, S., Sehgal, A., Stelte, B., Rodosek, G.D., Schönwälder, J.: Towards a trust computing architecture for RPL in cyber physical systems. In: Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013), pp. 134–137 (2013)
17.
Zurück zum Zitat Guclu, S.O., Ozcelebi, T., Lukkien, J.J.: Trust-based neighbor unreachability detection for RPL. In: 2016 25th International Conference on Computer Communication and Networks (ICCCN), pp. 1–6 (2016) Guclu, S.O., Ozcelebi, T., Lukkien, J.J.: Trust-based neighbor unreachability detection for RPL. In: 2016 25th International Conference on Computer Communication and Networks (ICCCN), pp. 1–6 (2016)
18.
Zurück zum Zitat Bernabé, J.B., Ramos, J.H., Gómez-Skarmeta, A.F.: Taciot: multidimensional trust-aware access control system for the internet of things. Soft Comput. 20, 1763–1779 (2016)CrossRef Bernabé, J.B., Ramos, J.H., Gómez-Skarmeta, A.F.: Taciot: multidimensional trust-aware access control system for the internet of things. Soft Comput. 20, 1763–1779 (2016)CrossRef
19.
Zurück zum Zitat Kamgueu, P.O., Nataf, E., Djotio, T.N.: On design and deployment of fuzzy-based metric for routing in low-power and lossy networks. In: 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), pp. 789–795 (2015) Kamgueu, P.O., Nataf, E., Djotio, T.N.: On design and deployment of fuzzy-based metric for routing in low-power and lossy networks. In: 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), pp. 789–795 (2015)
20.
Zurück zum Zitat Takagi, T., Sugeno, M.: Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst. Man Cybern. 15, 116–132 (1985)CrossRef Takagi, T., Sugeno, M.: Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst. Man Cybern. 15, 116–132 (1985)CrossRef
21.
Zurück zum Zitat Adam, D.A., Schmidt, O., Finne, N., Eriksson, J., sterlind, F., Tsiftes, N., Durvy, M.: The contiki os: the operating system for the internet of things. http://www.contiki-os.org. Accessed 01 Apr 2019 Adam, D.A., Schmidt, O., Finne, N., Eriksson, J., sterlind, F., Tsiftes, N., Durvy, M.: The contiki os: the operating system for the internet of things. http://​www.​contiki-os.​org. Accessed 01 Apr 2019
22.
Zurück zum Zitat Aschenbruck, N., Ernst, R., Gerhards-Padilla, E., Schwamborn, M.: Bonnmotion: a mobility scenario generation and analysis tool. In: SimuTools (2010) Aschenbruck, N., Ernst, R., Gerhards-Padilla, E., Schwamborn, M.: Bonnmotion: a mobility scenario generation and analysis tool. In: SimuTools (2010)
23.
Zurück zum Zitat Baccour, N., Koubaa, A., Jamâa, M.B., Youssef, H., Zuniga, M., Alves, M.: A comparative simulation study of link quality estimators in wireless sensor networks. In: 2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems, pp. 1–10 (2009) Baccour, N., Koubaa, A., Jamâa, M.B., Youssef, H., Zuniga, M., Alves, M.: A comparative simulation study of link quality estimators in wireless sensor networks. In: 2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems, pp. 1–10 (2009)
Metadaten
Titel
Fuzzy, Dynamic and Trust Based Routing Protocol for IoT
verfasst von
Seyyed Yasser Hashemi
Fereidoon Shams Aliee
Publikationsdatum
11.05.2020
Verlag
Springer US
Erschienen in
Journal of Network and Systems Management / Ausgabe 4/2020
Print ISSN: 1064-7570
Elektronische ISSN: 1573-7705
DOI
https://doi.org/10.1007/s10922-020-09535-y

Weitere Artikel der Ausgabe 4/2020

Journal of Network and Systems Management 4/2020 Zur Ausgabe