Trust-aware and cooperative routing protocol for IoT security

The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to internal attackers and selfish behaviours. To addr...

Full description

Saved in:
Bibliographic Details
Published inJournal of information security and applications Vol. 52; p. 102467
Main Authors Djedjig, Nabil, Tandjaoui, Djamel, Medjek, Faiza, Romdhani, Imed
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.06.2020
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to internal attackers and selfish behaviours. To address the lack of robust security mechanisms in RPL, we design a new Metric-based RPL Trustworthiness Scheme (MRTS) that introduces trust evaluation for secure routing topology construction. Extensive simulations show that MRTS is efficient in terms of packet delivery ratio, energy consumption, nodes’ rank changes, and throughput. In addition, a mathematical modelling analysis shows that MRTS meets the requirements of consistency, optimality, and loop-freeness and that the proposed trust-based routing metric has the isotonicity and monotonicity properties required for a routing protocol. By using game theory concepts, we formally describe MRTS as a strategy for the iterated Prisoner’s Dilemma and demonstrate its cooperation enforcement characteristic. Both mathematical analysis and evolutionary simulation results show clearly that MRTS, as a strategy, is an efficient approach in promoting the stability and the evolution of the Internet of Things network.
AbstractList The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to internal attackers and selfish behaviours. To address the lack of robust security mechanisms in RPL, we design a new Metric-based RPL Trustworthiness Scheme (MRTS) that introduces trust evaluation for secure routing topology construction. Extensive simulations show that MRTS is efficient in terms of packet delivery ratio, energy consumption, nodes’ rank changes, and throughput. In addition, a mathematical modelling analysis shows that MRTS meets the requirements of consistency, optimality, and loop-freeness and that the proposed trust-based routing metric has the isotonicity and monotonicity properties required for a routing protocol. By using game theory concepts, we formally describe MRTS as a strategy for the iterated Prisoner’s Dilemma and demonstrate its cooperation enforcement characteristic. Both mathematical analysis and evolutionary simulation results show clearly that MRTS, as a strategy, is an efficient approach in promoting the stability and the evolution of the Internet of Things network.
ArticleNumber 102467
Author Djedjig, Nabil
Medjek, Faiza
Romdhani, Imed
Tandjaoui, Djamel
Author_xml – sequence: 1
  givenname: Nabil
  surname: Djedjig
  fullname: Djedjig, Nabil
  email: djedjig_nabil@cerist.dz
  organization: Research Centre on Scientific and Technical Information, 03, Rue des Freres Aissou, Ben Aknoun, Algiers, Algeria
– sequence: 2
  givenname: Djamel
  surname: Tandjaoui
  fullname: Tandjaoui, Djamel
  organization: Research Centre on Scientific and Technical Information, 03, Rue des Freres Aissou, Ben Aknoun, Algiers, Algeria
– sequence: 3
  givenname: Faiza
  surname: Medjek
  fullname: Medjek, Faiza
  organization: Research Centre on Scientific and Technical Information, 03, Rue des Freres Aissou, Ben Aknoun, Algiers, Algeria
– sequence: 4
  givenname: Imed
  surname: Romdhani
  fullname: Romdhani, Imed
  organization: Edinburgh Napier University, School of Computing, 10 Colinton Road, Edinburgh, EH10 5DT, UK
BookMark eNp9j81qAjEUhbOwUGt9ga7yAmOTmIkTaBdF-iMI3UzXIdzcKRnsRG6ixbevg127OnDgO5zvjk2GNCBjD1IspJDmsV_0MfuFEmoslDarCZsqJXWlpDK3bJ5zL4SQStpaLafsuaVDLpX_9YTcD4FDSnskX-IROaVDicM331MqCdKOd4n4JrU8IxwoltM9u-n8LuP8P2fs6-21XX9U28_3zfplW8FS61LVRgcQICQKH6RF7esAnYdgO2jqpjE2hMYiCKuMr8_fZa2DlL4DtGhWdjlj6rILlHIm7Nye4o-nk5PCjd6ud6O3G73dxfsMPV0gPD87RiSXIeIAGCIhFBdSvIb_AU5vZWs
CitedBy_id crossref_primary_10_1109_ACCESS_2023_3296558
crossref_primary_10_1109_JIOT_2020_3035474
crossref_primary_10_1007_s12010_023_04636_1
crossref_primary_10_1007_s12652_021_03195_9
crossref_primary_10_3390_s22187052
crossref_primary_10_3390_s21227611
crossref_primary_10_1109_MCE_2022_3226585
crossref_primary_10_1109_JIOT_2021_3106898
crossref_primary_10_1109_ACCESS_2023_3286536
crossref_primary_10_1007_s10462_023_10560_x
crossref_primary_10_1016_j_cose_2022_103035
crossref_primary_10_1155_2021_8847099
crossref_primary_10_3390_jcp2010009
crossref_primary_10_1007_s10922_021_09611_x
crossref_primary_10_1109_ACCESS_2023_3327335
crossref_primary_10_1109_ACCESS_2024_3391918
crossref_primary_10_32604_cmc_2021_015533
crossref_primary_10_1007_s11277_022_09725_8
crossref_primary_10_1109_JIOT_2020_3031162
crossref_primary_10_1007_s10207_023_00665_3
crossref_primary_10_1080_01969722_2022_2146845
crossref_primary_10_3390_s22166215
crossref_primary_10_3390_app10186472
crossref_primary_10_3390_math9243286
crossref_primary_10_1007_s11227_022_04766_z
crossref_primary_10_1007_s11277_023_10668_x
crossref_primary_10_1109_COMST_2022_3192978
crossref_primary_10_3390_s22124539
crossref_primary_10_3390_s22186765
crossref_primary_10_1080_00051144_2023_2208462
crossref_primary_10_1109_ACCESS_2023_3331030
Cites_doi 10.1109/TCOMM.2012.031912.110179
10.1016/j.future.2013.01.010
10.1109/TNSM.2018.2886379
10.1109/MIC.2008.79
10.1109/TWC.2002.804190
10.1109/JSAC.2005.861390
10.3390/info7020025
10.1016/j.adhoc.2013.04.014
10.1109/TDSC.2015.2420552
10.2991/ijcis.2018.25905181
10.1109/ACCESS.2018.2798626
10.1126/science.7466396
10.1016/j.adhoc.2015.05.004
10.1109/JIOT.2017.2755980
ContentType Journal Article
Copyright 2020 Elsevier Ltd
Copyright_xml – notice: 2020 Elsevier Ltd
DBID AAYXX
CITATION
DOI 10.1016/j.jisa.2020.102467
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
ExternalDocumentID 10_1016_j_jisa_2020_102467
S2214212619306751
GroupedDBID --M
.~1
1~.
4.4
457
4G.
5VS
7-5
8P~
AACTN
AAEDT
AAEDW
AAFJI
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
AEBSH
AEKER
AFKWA
AFTJW
AGHFR
AGUBO
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
AKYCK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOMHK
AOUOD
AVARZ
AXJTR
BKOJK
BLXMC
EBS
EFJIC
EFLBG
EJD
FDB
FIRID
FNPLU
FYGXN
GBLVA
GBOLZ
KOM
M41
MO0
OAUVE
P-8
P-9
PC.
PRBVW
RIG
ROL
SPC
SPCBC
SSB
SSO
SSV
SSZ
T5K
~G-
AAXKI
AAYXX
AFJKZ
AKRWK
CITATION
ID FETCH-LOGICAL-c344t-564dc0c01e0ad19e4a5dcfacd9fc858869dd89ec0926a5202154d11afce9e6793
IEDL.DBID .~1
ISSN 2214-2126
IngestDate Thu Sep 26 18:21:23 EDT 2024
Fri Feb 23 02:47:44 EST 2024
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Internet of things
Cooperation enforcement
Trust management
Game theory
Secure routing
RPL
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c344t-564dc0c01e0ad19e4a5dcfacd9fc858869dd89ec0926a5202154d11afce9e6793
OpenAccessLink https://napier-repository.worktribe.com/preview/2559666/Trust-aware%20and%20Cooperative%20Routing%20Protocol%20for%20IoT%20Security.pdf
ParticipantIDs crossref_primary_10_1016_j_jisa_2020_102467
elsevier_sciencedirect_doi_10_1016_j_jisa_2020_102467
PublicationCentury 2000
PublicationDate June 2020
2020-06-00
PublicationDateYYYYMMDD 2020-06-01
PublicationDate_xml – month: 06
  year: 2020
  text: June 2020
PublicationDecade 2020
PublicationTitle Journal of information security and applications
PublicationYear 2020
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Zhang, Zhu, Song, Fang (bib0046) 2010
Thubert (bib0012) 2012
Medjek, Tandjaoui, Romdhani, Djedjig (bib0007) 2018
Vasseur, Kim, Pister, Dejean, Barthel (bib0013) 2012
Bao, Chen, Chang, Cho (bib0029) 2012; 9
Yavuz, Ünal, Gül (bib0024) 2018; 12
Karkazis, Papaefstathiou, Sarakis, Zahariadis, Velivassaki, Bargiotas (bib0030) 2014
Dvir, Holczer, Buttyan (bib0014) 2011
Airehrour, Gutierrez, Ray (bib0033) 2018
Heinzelman, Chandrakasan, Balakrishnan (bib0040) 2002; 1
Hui, Culler (bib0002) 2008
Ammar, Russello, Crispo (bib0003) 2018; 38
Pongle, Chavan (bib0022) 2015; 121
Yang, Wang (bib0043) 2008
Haas, Yang, Liu, Li, Li (bib0020) 2014
Gubbi, Buyya, Marusic, Palaniswami (bib0001) 2013; 29
Buttyan, Hubaux (bib0010) 2007
Le, Loo, Luo, Lasebae (bib0016) 2013
Shah, Yaqoob (bib0006) 2016
Djedjig, Tandjaoui, Medjek, Romdhani (bib0009) 2017
Le, Loo, Chai, Aiash (bib0015) 2016; 7
Axelrod R.. The evolution of cooperation1985;.
Khan, Ullrich, Voyiatzis, Herrmann (bib0032) 2017
Liu, Sheng, Yin, Ali, Roggen (bib0047) 2017; 4
.
Djedjig, Tandjaoui, Medjek (bib0031) 2015
Axelrod (bib0050) 1987
Hashemi, Aliee (bib0035) 2018
Mailath, Samuelson (bib0048) 2006
Lahbib, Toumi, Elleuch, Laouiti, Martin (bib0036) 2017
Yan, Zhang, Vasilakos (bib0044) 2014; 42
Chen, Guo, Wang, Tsai, Al-Hamadi, You (bib0028) 2018; 16
Axelrod, Hamilton (bib0051) 1981; 211
Ratliff J.. Game theory.
Djedjig, Tandjaoui, Romdhani, Medjek (bib0011) 2018
Weekly, Pister (bib0019) 2012
Tsiftes, Eriksson, Dunkels (bib0039) 2010
Mayzaud, Badonnel, Chrisment (bib0017) 2016; 18
Kiran, Rani, Singh (bib0037) 2018; 18
Baccour, Koubâa, Mottola, Zúñiga, Youssef, Boano (bib0038) 2012; 8
Raza, Wallgren, Voigt (bib0021) 2013; 11
Chugh, Aboubaker, Loo (bib0018) 2012
Bao, Chen (bib0025) 2012
Napiah, Idris, Ramli, Ahmedy (bib0023) 2018; 6
Marti, Giuli, Lai, Baker (bib0041) 2000
Ko, Terzis, Dawson-Haggerty, Culler, Hui, Levis (bib0004) 2011; 49
Tsao, Alexander, Dohler, Daza, Lozano, Richardson (bib0008) 2015
Chen, Bao, Guo (bib0026) 2015; 13
Iterated prisoner’s dilemma simulation software.
De Couto (bib0042) 2004
Airehrour, Gutierrez, Ray (bib0034) 2016
Theodorakopoulos, Baras (bib0045) 2006; 24
Chen, Guo (bib0027) 2015; 33
Winter, Thubert, Brandt, Hui, Kelsey, Levis (bib0005) 2012
Kiran (10.1016/j.jisa.2020.102467_bib0037) 2018; 18
Heinzelman (10.1016/j.jisa.2020.102467_bib0040) 2002; 1
Chen (10.1016/j.jisa.2020.102467_bib0026) 2015; 13
Ko (10.1016/j.jisa.2020.102467_bib0004) 2011; 49
Raza (10.1016/j.jisa.2020.102467_bib0021) 2013; 11
Theodorakopoulos (10.1016/j.jisa.2020.102467_bib0045) 2006; 24
Airehrour (10.1016/j.jisa.2020.102467_bib0034) 2016
Gubbi (10.1016/j.jisa.2020.102467_bib0001) 2013; 29
Yang (10.1016/j.jisa.2020.102467_bib0043) 2008
Liu (10.1016/j.jisa.2020.102467_bib0047) 2017; 4
Yan (10.1016/j.jisa.2020.102467_bib0044) 2014; 42
Dvir (10.1016/j.jisa.2020.102467_bib0014) 2011
Vasseur (10.1016/j.jisa.2020.102467_bib0013) 2012
Lahbib (10.1016/j.jisa.2020.102467_bib0036) 2017
Napiah (10.1016/j.jisa.2020.102467_bib0023) 2018; 6
Chen (10.1016/j.jisa.2020.102467_bib0028) 2018; 16
Tsao (10.1016/j.jisa.2020.102467_bib0008) 2015
Weekly (10.1016/j.jisa.2020.102467_bib0019) 2012
Chen (10.1016/j.jisa.2020.102467_bib0027) 2015; 33
Baccour (10.1016/j.jisa.2020.102467_bib0038) 2012; 8
Hashemi (10.1016/j.jisa.2020.102467_bib0035) 2018
Djedjig (10.1016/j.jisa.2020.102467_bib0011) 2018
Marti (10.1016/j.jisa.2020.102467_bib0041) 2000
Buttyan (10.1016/j.jisa.2020.102467_bib0010) 2007
Le (10.1016/j.jisa.2020.102467_bib0015) 2016; 7
Winter (10.1016/j.jisa.2020.102467_bib0005) 2012
Zhang (10.1016/j.jisa.2020.102467_bib0046) 2010
Khan (10.1016/j.jisa.2020.102467_bib0032) 2017
Djedjig (10.1016/j.jisa.2020.102467_bib0031) 2015
Shah (10.1016/j.jisa.2020.102467_bib0006) 2016
Le (10.1016/j.jisa.2020.102467_bib0016) 2013
Hui (10.1016/j.jisa.2020.102467_bib0002) 2008
Medjek (10.1016/j.jisa.2020.102467_bib0007) 2018
Tsiftes (10.1016/j.jisa.2020.102467_bib0039) 2010
Yavuz (10.1016/j.jisa.2020.102467_bib0024) 2018; 12
Djedjig (10.1016/j.jisa.2020.102467_bib0009) 2017
Pongle (10.1016/j.jisa.2020.102467_bib0022) 2015; 121
Karkazis (10.1016/j.jisa.2020.102467_bib0030) 2014
Thubert (10.1016/j.jisa.2020.102467_bib0012) 2012
Chugh (10.1016/j.jisa.2020.102467_bib0018) 2012
Bao (10.1016/j.jisa.2020.102467_bib0025) 2012
Axelrod (10.1016/j.jisa.2020.102467_bib0051) 1981; 211
10.1016/j.jisa.2020.102467_bib0053
10.1016/j.jisa.2020.102467_bib0052
Ammar (10.1016/j.jisa.2020.102467_bib0003) 2018; 38
De Couto (10.1016/j.jisa.2020.102467_bib0042) 2004
Mailath (10.1016/j.jisa.2020.102467_bib0048) 2006
10.1016/j.jisa.2020.102467_bib0049
Haas (10.1016/j.jisa.2020.102467_bib0020) 2014
Mayzaud (10.1016/j.jisa.2020.102467_bib0017) 2016; 18
Airehrour (10.1016/j.jisa.2020.102467_bib0033) 2018
Bao (10.1016/j.jisa.2020.102467_bib0029) 2012; 9
Axelrod (10.1016/j.jisa.2020.102467_bib0050) 1987
References_xml – year: 2018
  ident: bib0033
  article-title: Sectrust-rpl: a secure trust-aware rpl routing protocol for internet of things
  publication-title: Future Gener Comput Syst
  contributor:
    fullname: Ray
– year: 2012
  ident: bib0013
  article-title: Routing metrics used for path calculation in low power and lossy networks
  publication-title: RFC 6551, Int Eng Task Force
  contributor:
    fullname: Barthel
– start-page: 381
  year: 2016
  end-page: 385
  ident: bib0006
  article-title: A survey: Internet of things (iot) technologies, applications and challenges
  publication-title: 2016 IEEE smart energy grid engineering (SEGE)
  contributor:
    fullname: Yaqoob
– start-page: 27
  year: 2017
  ident: bib0032
  article-title: A trust-based resilient routing mechanism for the internet of things
  publication-title: Proceedings of the 12th International Conference on Availability, Reliability and Security
  contributor:
    fullname: Herrmann
– volume: 4
  start-page: 2172
  year: 2017
  end-page: 2185
  ident: bib0047
  article-title: Performance analysis of routing protocol for low power and lossy networks (rpl) in large scale networks
  publication-title: IEEE Internet Things J
  contributor:
    fullname: Roggen
– start-page: 1
  year: 2017
  end-page: 5
  ident: bib0036
  article-title: Link reliable and trust aware rpl routing protocol for internet of things
  publication-title: 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA)
  contributor:
    fullname: Martin
– volume: 7
  start-page: 25
  year: 2016
  ident: bib0015
  article-title: A specification-based ids for detecting attacks on rpl-based network topology
  publication-title: Information
  contributor:
    fullname: Aiash
– start-page: 406
  year: 2010
  end-page: 407
  ident: bib0039
  article-title: Low-power wireless ipv6 routing with contikirpl
  publication-title: Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks
  contributor:
    fullname: Dunkels
– start-page: 1615
  year: 2008
  end-page: 1623
  ident: bib0043
  article-title: Design guidelines for routing metrics in multihop wireless networks
  publication-title: INFOCOM 2008. The 27th conference on computer communications. IEEE
  contributor:
    fullname: Wang
– volume: 33
  start-page: 154
  year: 2015
  end-page: 167
  ident: bib0027
  article-title: Hierarchical trust management of community of interest groups in mobile ad hoc networks
  publication-title: Ad Hoc Netw
  contributor:
    fullname: Guo
– start-page: 255
  year: 2000
  end-page: 265
  ident: bib0041
  article-title: Mitigating routing misbehavior in mobile ad hoc networks
  publication-title: Proceedings of the 6th annual international conference on Mobile computing and networking
  contributor:
    fullname: Baker
– start-page: 1
  year: 2012
  end-page: 6
  ident: bib0025
  article-title: Trust management for the internet of things and its application to service composition
  publication-title: IEEE WoWMoM 2012 Workshop on the Internet of Things: Smart Objects and Services
  contributor:
    fullname: Chen
– volume: 9
  start-page: 169
  year: 2012
  end-page: 183
  ident: bib0029
  article-title: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
  publication-title: Netw Serv Manag IEEE Trans
  contributor:
    fullname: Cho
– year: 2006
  ident: bib0048
  article-title: Repeated games and reputations: long-run relationships
  contributor:
    fullname: Samuelson
– start-page: 1
  year: 1987
  end-page: 16
  ident: bib0050
  article-title: The evolution of strategies in the iterated prisoner’s dilemma
  publication-title: DynNorms
  contributor:
    fullname: Axelrod
– start-page: 115
  year: 2016
  end-page: 120
  ident: bib0034
  article-title: Securing rpl routing protocol from blackhole attacks using a trust-based mechanism
  publication-title: 2016 26th International Telecommunication Networks and Applications Conference (ITNAC)
  contributor:
    fullname: Ray
– volume: 16
  start-page: 246
  year: 2018
  end-page: 263
  ident: bib0028
  article-title: Trust-based service management for mobile cloud iot systems
  publication-title: IEEE Trans Netw Serv Manage
  contributor:
    fullname: You
– volume: 121
  year: 2015
  ident: bib0022
  article-title: Real time intrusion and wormhole attack detection in internet of things
  publication-title: Int J Comput Appl
  contributor:
    fullname: Chavan
– volume: 38
  start-page: 8
  year: 2018
  end-page: 27
  ident: bib0003
  article-title: Internet of things: a survey on the security of iot frameworks
  publication-title: J Inf Secur Appl
  contributor:
    fullname: Crispo
– volume: 11
  start-page: 2661
  year: 2013
  end-page: 2674
  ident: bib0021
  article-title: Svelte: real-time intrusion detection in the internet of things
  publication-title: Ad Hoc Netw
  contributor:
    fullname: Voigt
– volume: 18
  start-page: 459
  year: 2016
  end-page: 473
  ident: bib0017
  article-title: A taxonomy of attacks in rpl-based internet of things
  publication-title: Int J Netw Secur
  contributor:
    fullname: Chrisment
– year: 2012
  ident: bib0012
  article-title: Objective function zero for the routing protocol for low-power and lossy networks (rpl)
  publication-title: RFC 6552, Int Eng Task Force
  contributor:
    fullname: Thubert
– start-page: 709
  year: 2011
  end-page: 714
  ident: bib0014
  article-title: Vera-version number and rank authentication in rpl
  publication-title: Mobile adhoc and sensor systems (MASS), 2011 IEEE 8th international conference on
  contributor:
    fullname: Buttyan
– start-page: 962
  year: 2015
  end-page: 967
  ident: bib0031
  article-title: Trust-based rpl for the internet of things
  publication-title: 2015 IEEE Symposium on Computers and Communication (ISCC)
  contributor:
    fullname: Medjek
– volume: 8
  start-page: 34
  year: 2012
  ident: bib0038
  article-title: Radio link quality estimation in wireless sensor networks: a survey
  publication-title: ACM Trans Sens Netw (TOSN)
  contributor:
    fullname: Boano
– start-page: 328
  year: 2017
  end-page: 335
  ident: bib0009
  article-title: New trust metric for the rpl routing protocol
  publication-title: Information and communication systems (ICICS), 2017 8th international conference on
  contributor:
    fullname: Romdhani
– volume: 13
  start-page: 684
  year: 2015
  end-page: 696
  ident: bib0026
  article-title: Trust-based service management for social internet of things systems
  publication-title: IEEE Trans Dependable Secure Comput
  contributor:
    fullname: Guo
– start-page: 1
  year: 2010
  end-page: 9
  ident: bib0046
  article-title: A formal study of trust-based routing in wireless ad hoc networks
  publication-title: INFOCOM, 2010 proceedings IEEE
  contributor:
    fullname: Fang
– volume: 1
  start-page: 660
  year: 2002
  end-page: 670
  ident: bib0040
  article-title: An application-specific protocol architecture for wireless microsensor networks
  publication-title: IEEE Trans Wireless Commun
  contributor:
    fullname: Balakrishnan
– start-page: 1
  year: 2018
  end-page: 30
  ident: bib0035
  article-title: Dynamic and comprehensive trust model for iot and its integration into rpl
  publication-title: J Supercomput
  contributor:
    fullname: Aliee
– year: 2015
  ident: bib0008
  article-title: A security threat analysis for the routing protocol for low-power and lossy networks (rpls)
  publication-title: Tech. Rep.
  contributor:
    fullname: Richardson
– start-page: 1
  year: 2012
  end-page: 6
  ident: bib0019
  article-title: Evaluating sinkhole defense techniques in rpl networks
  publication-title: 2012 20th IEEE international conference on network protocols (ICNP)
  contributor:
    fullname: Pister
– volume: 12
  start-page: 39
  year: 2018
  end-page: 58
  ident: bib0024
  article-title: Deep learning for detection of routing attacks in the internet of things
  publication-title: Int J Comput IntellSyst
  contributor:
    fullname: Gül
– start-page: 550
  year: 2014
  end-page: 556
  ident: bib0030
  article-title: Evaluation of rpl with a transmission count-efficient and trust-aware routing metric
  publication-title: Communications (ICC), 2014 IEEE International Conference on
  contributor:
    fullname: Bargiotas
– volume: 29
  start-page: 1645
  year: 2013
  end-page: 1660
  ident: bib0001
  article-title: Internet of things (iot): a vision, architectural elements, and future directions
  publication-title: Future Gen Comput Syst
  contributor:
    fullname: Palaniswami
– start-page: 122
  year: 2018
  end-page: 146
  ident: bib0011
  article-title: Trust management in the internet of things
  publication-title: Security and privacy in smart sensor networks
  contributor:
    fullname: Medjek
– volume: 6
  start-page: 16623
  year: 2018
  end-page: 16638
  ident: bib0023
  article-title: Compression header analyzer intrusion detection system (cha-ids) for 6lowpan communication protocol
  publication-title: IEEE Access
  contributor:
    fullname: Ahmedy
– start-page: 569
  year: 2014
  end-page: 608
  ident: bib0020
  article-title: Current challenges and approaches in securing communications for sensors and actuators
  publication-title: The art of wireless sensor networks
  contributor:
    fullname: Li
– year: 2012
  ident: bib0005
  article-title: Rpl: ipv6 routing protocol for low-power and lossy networks
  publication-title: RFC 6550, Int Eng Task Force
  contributor:
    fullname: Levis
– start-page: 157
  year: 2012
  end-page: 162
  ident: bib0018
  article-title: Case study of a black hole attack on lowpan-rpl
  publication-title: Proc. of the sixth international conference on emerging security information, systems and technologies (SECURWARE), Rome, Italy (August 2012)
  contributor:
    fullname: Loo
– volume: 18
  start-page: 239
  year: 2018
  end-page: 245
  ident: bib0037
  article-title: Trust based defence system for ddos attack detection in rpl over internet of things
  publication-title: Int J Comput SciNetw Secur
  contributor:
    fullname: Singh
– start-page: 37
  year: 2008
  end-page: 45
  ident: bib0002
  article-title: Extending ip to low-power, wireless personal area networks
  publication-title: IEEE Internet Comput
  contributor:
    fullname: Culler
– year: 2004
  ident: bib0042
  publication-title: High-throughput routing for multi-hop wireless networks
  contributor:
    fullname: De Couto
– volume: 49
  year: 2011
  ident: bib0004
  article-title: Connecting low-power and lossy networks to the internet
  publication-title: IEEE Commun Mag
  contributor:
    fullname: Levis
– volume: 42
  start-page: 120
  year: 2014
  end-page: 134
  ident: bib0044
  article-title: A survey on trust management for internet of things
  publication-title: JNetwComputAppl
  contributor:
    fullname: Vasilakos
– start-page: 000789
  year: 2013
  end-page: 000794
  ident: bib0016
  article-title: The impacts of internal threats towards routing protocol for low power and lossy network performance
  publication-title: Computers and communications (ISCC), 2013 IEEE symposium on
  contributor:
    fullname: Lasebae
– start-page: 147
  year: 2018
  end-page: 178
  ident: bib0007
  article-title: Security threats in the internet of things: Rpl’s attacks and countermeasures
  publication-title: Security and privacy in smart sensor networks
  contributor:
    fullname: Djedjig
– volume: 211
  start-page: 1390
  year: 1981
  end-page: 1396
  ident: bib0051
  article-title: The evolution of cooperation
  publication-title: Science
  contributor:
    fullname: Hamilton
– year: 2007
  ident: bib0010
  article-title: Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing
  contributor:
    fullname: Hubaux
– volume: 24
  start-page: 318
  year: 2006
  end-page: 328
  ident: bib0045
  article-title: On trust models and trust evaluation metrics for ad-hoc networks
  publication-title: IEEE J Sel Areas Commun
  contributor:
    fullname: Baras
– start-page: 255
  year: 2000
  ident: 10.1016/j.jisa.2020.102467_bib0041
  article-title: Mitigating routing misbehavior in mobile ad hoc networks
  contributor:
    fullname: Marti
– year: 2007
  ident: 10.1016/j.jisa.2020.102467_bib0010
  contributor:
    fullname: Buttyan
– start-page: 1
  year: 2012
  ident: 10.1016/j.jisa.2020.102467_bib0025
  article-title: Trust management for the internet of things and its application to service composition
  contributor:
    fullname: Bao
– start-page: 1
  year: 2012
  ident: 10.1016/j.jisa.2020.102467_bib0019
  article-title: Evaluating sinkhole defense techniques in rpl networks
  contributor:
    fullname: Weekly
– year: 2012
  ident: 10.1016/j.jisa.2020.102467_bib0005
  article-title: Rpl: ipv6 routing protocol for low-power and lossy networks
  publication-title: RFC 6550, Int Eng Task Force
  contributor:
    fullname: Winter
– start-page: 962
  year: 2015
  ident: 10.1016/j.jisa.2020.102467_bib0031
  article-title: Trust-based rpl for the internet of things
  contributor:
    fullname: Djedjig
– volume: 9
  start-page: 169
  issue: 2
  year: 2012
  ident: 10.1016/j.jisa.2020.102467_bib0029
  article-title: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
  publication-title: Netw Serv Manag IEEE Trans
  doi: 10.1109/TCOMM.2012.031912.110179
  contributor:
    fullname: Bao
– volume: 29
  start-page: 1645
  issue: 7
  year: 2013
  ident: 10.1016/j.jisa.2020.102467_bib0001
  article-title: Internet of things (iot): a vision, architectural elements, and future directions
  publication-title: Future Gen Comput Syst
  doi: 10.1016/j.future.2013.01.010
  contributor:
    fullname: Gubbi
– year: 2015
  ident: 10.1016/j.jisa.2020.102467_bib0008
  article-title: A security threat analysis for the routing protocol for low-power and lossy networks (rpls)
  contributor:
    fullname: Tsao
– volume: 16
  start-page: 246
  issue: 1
  year: 2018
  ident: 10.1016/j.jisa.2020.102467_bib0028
  article-title: Trust-based service management for mobile cloud iot systems
  publication-title: IEEE Trans Netw Serv Manage
  doi: 10.1109/TNSM.2018.2886379
  contributor:
    fullname: Chen
– start-page: 37
  issue: 4
  year: 2008
  ident: 10.1016/j.jisa.2020.102467_bib0002
  article-title: Extending ip to low-power, wireless personal area networks
  publication-title: IEEE Internet Comput
  doi: 10.1109/MIC.2008.79
  contributor:
    fullname: Hui
– volume: 1
  start-page: 660
  issue: 4
  year: 2002
  ident: 10.1016/j.jisa.2020.102467_bib0040
  article-title: An application-specific protocol architecture for wireless microsensor networks
  publication-title: IEEE Trans Wireless Commun
  doi: 10.1109/TWC.2002.804190
  contributor:
    fullname: Heinzelman
– volume: 49
  issue: 4
  year: 2011
  ident: 10.1016/j.jisa.2020.102467_bib0004
  article-title: Connecting low-power and lossy networks to the internet
  publication-title: IEEE Commun Mag
  contributor:
    fullname: Ko
– volume: 121
  issue: 9
  year: 2015
  ident: 10.1016/j.jisa.2020.102467_bib0022
  article-title: Real time intrusion and wormhole attack detection in internet of things
  publication-title: Int J Comput Appl
  contributor:
    fullname: Pongle
– start-page: 328
  year: 2017
  ident: 10.1016/j.jisa.2020.102467_bib0009
  article-title: New trust metric for the rpl routing protocol
  contributor:
    fullname: Djedjig
– volume: 24
  start-page: 318
  issue: LCA-ARTICLE-2007-016
  year: 2006
  ident: 10.1016/j.jisa.2020.102467_bib0045
  article-title: On trust models and trust evaluation metrics for ad-hoc networks
  publication-title: IEEE J Sel Areas Commun
  doi: 10.1109/JSAC.2005.861390
  contributor:
    fullname: Theodorakopoulos
– ident: 10.1016/j.jisa.2020.102467_bib0053
– volume: 18
  start-page: 459
  issue: 3
  year: 2016
  ident: 10.1016/j.jisa.2020.102467_bib0017
  article-title: A taxonomy of attacks in rpl-based internet of things
  publication-title: Int J Netw Secur
  contributor:
    fullname: Mayzaud
– volume: 7
  start-page: 25
  issue: 2
  year: 2016
  ident: 10.1016/j.jisa.2020.102467_bib0015
  article-title: A specification-based ids for detecting attacks on rpl-based network topology
  publication-title: Information
  doi: 10.3390/info7020025
  contributor:
    fullname: Le
– volume: 11
  start-page: 2661
  issue: 8
  year: 2013
  ident: 10.1016/j.jisa.2020.102467_bib0021
  article-title: Svelte: real-time intrusion detection in the internet of things
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2013.04.014
  contributor:
    fullname: Raza
– start-page: 122
  year: 2018
  ident: 10.1016/j.jisa.2020.102467_bib0011
  article-title: Trust management in the internet of things
  contributor:
    fullname: Djedjig
– start-page: 27
  year: 2017
  ident: 10.1016/j.jisa.2020.102467_bib0032
  article-title: A trust-based resilient routing mechanism for the internet of things
  contributor:
    fullname: Khan
– volume: 42
  start-page: 120
  year: 2014
  ident: 10.1016/j.jisa.2020.102467_bib0044
  article-title: A survey on trust management for internet of things
  publication-title: JNetwComputAppl
  contributor:
    fullname: Yan
– volume: 13
  start-page: 684
  issue: 6
  year: 2015
  ident: 10.1016/j.jisa.2020.102467_bib0026
  article-title: Trust-based service management for social internet of things systems
  publication-title: IEEE Trans Dependable Secure Comput
  doi: 10.1109/TDSC.2015.2420552
  contributor:
    fullname: Chen
– start-page: 1
  year: 1987
  ident: 10.1016/j.jisa.2020.102467_bib0050
  article-title: The evolution of strategies in the iterated prisoner’s dilemma
  publication-title: DynNorms
  contributor:
    fullname: Axelrod
– year: 2006
  ident: 10.1016/j.jisa.2020.102467_bib0048
  contributor:
    fullname: Mailath
– start-page: 406
  year: 2010
  ident: 10.1016/j.jisa.2020.102467_bib0039
  article-title: Low-power wireless ipv6 routing with contikirpl
  contributor:
    fullname: Tsiftes
– start-page: 381
  year: 2016
  ident: 10.1016/j.jisa.2020.102467_bib0006
  article-title: A survey: Internet of things (iot) technologies, applications and challenges
  contributor:
    fullname: Shah
– start-page: 115
  year: 2016
  ident: 10.1016/j.jisa.2020.102467_bib0034
  article-title: Securing rpl routing protocol from blackhole attacks using a trust-based mechanism
  contributor:
    fullname: Airehrour
– start-page: 157
  year: 2012
  ident: 10.1016/j.jisa.2020.102467_bib0018
  article-title: Case study of a black hole attack on lowpan-rpl
  contributor:
    fullname: Chugh
– ident: 10.1016/j.jisa.2020.102467_bib0052
– start-page: 709
  year: 2011
  ident: 10.1016/j.jisa.2020.102467_bib0014
  article-title: Vera-version number and rank authentication in rpl
  contributor:
    fullname: Dvir
– volume: 18
  start-page: 239
  issue: 12
  year: 2018
  ident: 10.1016/j.jisa.2020.102467_bib0037
  article-title: Trust based defence system for ddos attack detection in rpl over internet of things
  publication-title: Int J Comput SciNetw Secur
  contributor:
    fullname: Kiran
– start-page: 550
  year: 2014
  ident: 10.1016/j.jisa.2020.102467_bib0030
  article-title: Evaluation of rpl with a transmission count-efficient and trust-aware routing metric
  contributor:
    fullname: Karkazis
– year: 2004
  ident: 10.1016/j.jisa.2020.102467_bib0042
  contributor:
    fullname: De Couto
– volume: 12
  start-page: 39
  issue: 1
  year: 2018
  ident: 10.1016/j.jisa.2020.102467_bib0024
  article-title: Deep learning for detection of routing attacks in the internet of things
  publication-title: Int J Comput IntellSyst
  doi: 10.2991/ijcis.2018.25905181
  contributor:
    fullname: Yavuz
– volume: 38
  start-page: 8
  year: 2018
  ident: 10.1016/j.jisa.2020.102467_bib0003
  article-title: Internet of things: a survey on the security of iot frameworks
  publication-title: J Inf Secur Appl
  contributor:
    fullname: Ammar
– start-page: 000789
  year: 2013
  ident: 10.1016/j.jisa.2020.102467_bib0016
  article-title: The impacts of internal threats towards routing protocol for low power and lossy network performance
  contributor:
    fullname: Le
– ident: 10.1016/j.jisa.2020.102467_bib0049
– start-page: 569
  year: 2014
  ident: 10.1016/j.jisa.2020.102467_bib0020
  article-title: Current challenges and approaches in securing communications for sensors and actuators
  contributor:
    fullname: Haas
– start-page: 1
  year: 2017
  ident: 10.1016/j.jisa.2020.102467_bib0036
  article-title: Link reliable and trust aware rpl routing protocol for internet of things
  contributor:
    fullname: Lahbib
– start-page: 1
  year: 2010
  ident: 10.1016/j.jisa.2020.102467_bib0046
  article-title: A formal study of trust-based routing in wireless ad hoc networks
  contributor:
    fullname: Zhang
– year: 2012
  ident: 10.1016/j.jisa.2020.102467_bib0013
  article-title: Routing metrics used for path calculation in low power and lossy networks
  publication-title: RFC 6551, Int Eng Task Force
  contributor:
    fullname: Vasseur
– volume: 6
  start-page: 16623
  year: 2018
  ident: 10.1016/j.jisa.2020.102467_bib0023
  article-title: Compression header analyzer intrusion detection system (cha-ids) for 6lowpan communication protocol
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2798626
  contributor:
    fullname: Napiah
– start-page: 147
  year: 2018
  ident: 10.1016/j.jisa.2020.102467_bib0007
  article-title: Security threats in the internet of things: Rpl’s attacks and countermeasures
  contributor:
    fullname: Medjek
– start-page: 1615
  year: 2008
  ident: 10.1016/j.jisa.2020.102467_bib0043
  article-title: Design guidelines for routing metrics in multihop wireless networks
  contributor:
    fullname: Yang
– volume: 211
  start-page: 1390
  issue: 4489
  year: 1981
  ident: 10.1016/j.jisa.2020.102467_bib0051
  article-title: The evolution of cooperation
  publication-title: Science
  doi: 10.1126/science.7466396
  contributor:
    fullname: Axelrod
– year: 2018
  ident: 10.1016/j.jisa.2020.102467_bib0033
  article-title: Sectrust-rpl: a secure trust-aware rpl routing protocol for internet of things
  publication-title: Future Gener Comput Syst
  contributor:
    fullname: Airehrour
– volume: 33
  start-page: 154
  year: 2015
  ident: 10.1016/j.jisa.2020.102467_bib0027
  article-title: Hierarchical trust management of community of interest groups in mobile ad hoc networks
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2015.05.004
  contributor:
    fullname: Chen
– start-page: 1
  year: 2018
  ident: 10.1016/j.jisa.2020.102467_bib0035
  article-title: Dynamic and comprehensive trust model for iot and its integration into rpl
  publication-title: J Supercomput
  contributor:
    fullname: Hashemi
– year: 2012
  ident: 10.1016/j.jisa.2020.102467_bib0012
  article-title: Objective function zero for the routing protocol for low-power and lossy networks (rpl)
  publication-title: RFC 6552, Int Eng Task Force
  contributor:
    fullname: Thubert
– volume: 4
  start-page: 2172
  issue: 6
  year: 2017
  ident: 10.1016/j.jisa.2020.102467_bib0047
  article-title: Performance analysis of routing protocol for low power and lossy networks (rpl) in large scale networks
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2017.2755980
  contributor:
    fullname: Liu
– volume: 8
  start-page: 34
  issue: 4
  year: 2012
  ident: 10.1016/j.jisa.2020.102467_bib0038
  article-title: Radio link quality estimation in wireless sensor networks: a survey
  publication-title: ACM Trans Sens Netw (TOSN)
  contributor:
    fullname: Baccour
SSID ssj0001219523
Score 2.5199473
Snippet The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL...
SourceID crossref
elsevier
SourceType Aggregation Database
Publisher
StartPage 102467
SubjectTerms Cooperation enforcement
Game theory
Internet of things
RPL
Secure routing
Trust management
Title Trust-aware and cooperative routing protocol for IoT security
URI https://dx.doi.org/10.1016/j.jisa.2020.102467
Volume 52
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV27asMwFBUhXbr0XZo-goZuRY1sS641htKQtDRLE8hm9LiGZLBD4tCt317JkiGF0qGjjS-YI-meI-k-ELo3NGEaFCMp1U-EMSqJMCohhUxAxsBBGXfe8T5Nx3P2uuCLDnpuc2FcWGXw_d6nN946vBkENAfr5XLwEbtqYZHbATSyt8lgt_Rn5_TjV7R3zhIJ3nR5c98TZxByZ3yY18rdGcdWNLkiBr7d_C_8tMc5oxN0FMQiHvr_OUUdKM_QcduIAYd1eY4s4-y2NZGfcgNYlgbrqlqDr-mNN9XOhTZjV5GhssOOrUzFk2qGt6F13QWaj15mz2MS-iIQnTBWE54yo6mmEVBpIgFMcqMLqY0odMazLBXGZAI0FXEqeexYnZkokoUGAaldkJeoW1YlXCFsYu5uBoEyo5iAxO5nilQUSmVcU6N4Dz20aORrX_4ib-PCVrnDLnfY5R67HuItYPmPQcytf_7D7vqfdjfo0D35yK1b1K03O7izGqFW_WYS9NHBcPI2nn4D4pu7gg
link.rule.ids 315,783,787,4509,24128,27936,27937,45597,45691
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07a8MwEBYhHdql79L0qaFbUSPbkmuNJTQkbZKlCWQTehmSwQ6JQ7f-9kqWDCmUDl1tDsQn6e476dMdAA8aJ0QZSVCK1TMiBAvEtExQLhIjYkON1O68YzxJBzPyNqfzFug1b2GcrDL4fu_Ta28dvnQDmt3VYtH9iF21sMhlADXttSnQHnH82C7qp69o56AlYrRu8-YMkLMIj2e8zmvpLo1jy5pcFQPfb_6XALUTdPrH4DCwRfjiB3QCWqY4BUdNJwYYNuYZsCFnu6mQ-BRrA0WhoSrLlfFFveG63DptM3QlGUo779DyVDgsp3ATetedg1n_ddoboNAYAamEkArRlGiFFY4MFjpihgiqVS6UZrnKaJalTOuMGYVZnAoau7BOdBSJXBlmUrsjL0C7KAtzCaCOqbsaNJhoSZhJbEKTpyyXMqMKa0k74LFBg698_QveCMOW3GHHHXbcY9cBtAGM_5hFbh30H3ZX_7S7B_uD6XjER8PJ-zU4cH-8jOsGtKv11txawlDJu3pBfAOK4r0b
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Trust-aware+and+cooperative+routing+protocol+for+IoT+security&rft.jtitle=Journal+of+information+security+and+applications&rft.au=Djedjig%2C+Nabil&rft.au=Tandjaoui%2C+Djamel&rft.au=Medjek%2C+Faiza&rft.au=Romdhani%2C+Imed&rft.date=2020-06-01&rft.issn=2214-2126&rft.volume=52&rft.spage=102467&rft_id=info:doi/10.1016%2Fj.jisa.2020.102467&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jisa_2020_102467
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2214-2126&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2214-2126&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2214-2126&client=summon