Trust-aware and cooperative routing protocol for IoT security
The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to internal attackers and selfish behaviours. To addr...
Saved in:
Published in | Journal of information security and applications Vol. 52; p. 102467 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Elsevier Ltd
01.06.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to internal attackers and selfish behaviours. To address the lack of robust security mechanisms in RPL, we design a new Metric-based RPL Trustworthiness Scheme (MRTS) that introduces trust evaluation for secure routing topology construction. Extensive simulations show that MRTS is efficient in terms of packet delivery ratio, energy consumption, nodes’ rank changes, and throughput. In addition, a mathematical modelling analysis shows that MRTS meets the requirements of consistency, optimality, and loop-freeness and that the proposed trust-based routing metric has the isotonicity and monotonicity properties required for a routing protocol. By using game theory concepts, we formally describe MRTS as a strategy for the iterated Prisoner’s Dilemma and demonstrate its cooperation enforcement characteristic. Both mathematical analysis and evolutionary simulation results show clearly that MRTS, as a strategy, is an efficient approach in promoting the stability and the evolution of the Internet of Things network. |
---|---|
AbstractList | The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to internal attackers and selfish behaviours. To address the lack of robust security mechanisms in RPL, we design a new Metric-based RPL Trustworthiness Scheme (MRTS) that introduces trust evaluation for secure routing topology construction. Extensive simulations show that MRTS is efficient in terms of packet delivery ratio, energy consumption, nodes’ rank changes, and throughput. In addition, a mathematical modelling analysis shows that MRTS meets the requirements of consistency, optimality, and loop-freeness and that the proposed trust-based routing metric has the isotonicity and monotonicity properties required for a routing protocol. By using game theory concepts, we formally describe MRTS as a strategy for the iterated Prisoner’s Dilemma and demonstrate its cooperation enforcement characteristic. Both mathematical analysis and evolutionary simulation results show clearly that MRTS, as a strategy, is an efficient approach in promoting the stability and the evolution of the Internet of Things network. |
ArticleNumber | 102467 |
Author | Djedjig, Nabil Medjek, Faiza Romdhani, Imed Tandjaoui, Djamel |
Author_xml | – sequence: 1 givenname: Nabil surname: Djedjig fullname: Djedjig, Nabil email: djedjig_nabil@cerist.dz organization: Research Centre on Scientific and Technical Information, 03, Rue des Freres Aissou, Ben Aknoun, Algiers, Algeria – sequence: 2 givenname: Djamel surname: Tandjaoui fullname: Tandjaoui, Djamel organization: Research Centre on Scientific and Technical Information, 03, Rue des Freres Aissou, Ben Aknoun, Algiers, Algeria – sequence: 3 givenname: Faiza surname: Medjek fullname: Medjek, Faiza organization: Research Centre on Scientific and Technical Information, 03, Rue des Freres Aissou, Ben Aknoun, Algiers, Algeria – sequence: 4 givenname: Imed surname: Romdhani fullname: Romdhani, Imed organization: Edinburgh Napier University, School of Computing, 10 Colinton Road, Edinburgh, EH10 5DT, UK |
BookMark | eNp9j81qAjEUhbOwUGt9ga7yAmOTmIkTaBdF-iMI3UzXIdzcKRnsRG6ixbevg127OnDgO5zvjk2GNCBjD1IspJDmsV_0MfuFEmoslDarCZsqJXWlpDK3bJ5zL4SQStpaLafsuaVDLpX_9YTcD4FDSnskX-IROaVDicM331MqCdKOd4n4JrU8IxwoltM9u-n8LuP8P2fs6-21XX9U28_3zfplW8FS61LVRgcQICQKH6RF7esAnYdgO2jqpjE2hMYiCKuMr8_fZa2DlL4DtGhWdjlj6rILlHIm7Nye4o-nk5PCjd6ud6O3G73dxfsMPV0gPD87RiSXIeIAGCIhFBdSvIb_AU5vZWs |
CitedBy_id | crossref_primary_10_1109_ACCESS_2023_3296558 crossref_primary_10_1109_JIOT_2020_3035474 crossref_primary_10_1007_s12010_023_04636_1 crossref_primary_10_1007_s12652_021_03195_9 crossref_primary_10_3390_s22187052 crossref_primary_10_3390_s21227611 crossref_primary_10_1109_MCE_2022_3226585 crossref_primary_10_1109_JIOT_2021_3106898 crossref_primary_10_1109_ACCESS_2023_3286536 crossref_primary_10_1007_s10462_023_10560_x crossref_primary_10_1016_j_cose_2022_103035 crossref_primary_10_1155_2021_8847099 crossref_primary_10_3390_jcp2010009 crossref_primary_10_1007_s10922_021_09611_x crossref_primary_10_1109_ACCESS_2023_3327335 crossref_primary_10_1109_ACCESS_2024_3391918 crossref_primary_10_32604_cmc_2021_015533 crossref_primary_10_1007_s11277_022_09725_8 crossref_primary_10_1109_JIOT_2020_3031162 crossref_primary_10_1007_s10207_023_00665_3 crossref_primary_10_1080_01969722_2022_2146845 crossref_primary_10_3390_s22166215 crossref_primary_10_3390_app10186472 crossref_primary_10_3390_math9243286 crossref_primary_10_1007_s11227_022_04766_z crossref_primary_10_1007_s11277_023_10668_x crossref_primary_10_1109_COMST_2022_3192978 crossref_primary_10_3390_s22124539 crossref_primary_10_3390_s22186765 crossref_primary_10_1080_00051144_2023_2208462 crossref_primary_10_1109_ACCESS_2023_3331030 |
Cites_doi | 10.1109/TCOMM.2012.031912.110179 10.1016/j.future.2013.01.010 10.1109/TNSM.2018.2886379 10.1109/MIC.2008.79 10.1109/TWC.2002.804190 10.1109/JSAC.2005.861390 10.3390/info7020025 10.1016/j.adhoc.2013.04.014 10.1109/TDSC.2015.2420552 10.2991/ijcis.2018.25905181 10.1109/ACCESS.2018.2798626 10.1126/science.7466396 10.1016/j.adhoc.2015.05.004 10.1109/JIOT.2017.2755980 |
ContentType | Journal Article |
Copyright | 2020 Elsevier Ltd |
Copyright_xml | – notice: 2020 Elsevier Ltd |
DBID | AAYXX CITATION |
DOI | 10.1016/j.jisa.2020.102467 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
ExternalDocumentID | 10_1016_j_jisa_2020_102467 S2214212619306751 |
GroupedDBID | --M .~1 1~. 4.4 457 4G. 5VS 7-5 8P~ AACTN AAEDT AAEDW AAFJI AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABMAC ABXDB ABYKQ ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE AEBSH AEKER AFKWA AFTJW AGHFR AGUBO AIALX AIEXJ AIKHN AITUG AJBFU AJOXV AKYCK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOMHK AOUOD AVARZ AXJTR BKOJK BLXMC EBS EFJIC EFLBG EJD FDB FIRID FNPLU FYGXN GBLVA GBOLZ KOM M41 MO0 OAUVE P-8 P-9 PC. PRBVW RIG ROL SPC SPCBC SSB SSO SSV SSZ T5K ~G- AAXKI AAYXX AFJKZ AKRWK CITATION |
ID | FETCH-LOGICAL-c344t-564dc0c01e0ad19e4a5dcfacd9fc858869dd89ec0926a5202154d11afce9e6793 |
IEDL.DBID | .~1 |
ISSN | 2214-2126 |
IngestDate | Thu Sep 26 18:21:23 EDT 2024 Fri Feb 23 02:47:44 EST 2024 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Internet of things Cooperation enforcement Trust management Game theory Secure routing RPL |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c344t-564dc0c01e0ad19e4a5dcfacd9fc858869dd89ec0926a5202154d11afce9e6793 |
OpenAccessLink | https://napier-repository.worktribe.com/preview/2559666/Trust-aware%20and%20Cooperative%20Routing%20Protocol%20for%20IoT%20Security.pdf |
ParticipantIDs | crossref_primary_10_1016_j_jisa_2020_102467 elsevier_sciencedirect_doi_10_1016_j_jisa_2020_102467 |
PublicationCentury | 2000 |
PublicationDate | June 2020 2020-06-00 |
PublicationDateYYYYMMDD | 2020-06-01 |
PublicationDate_xml | – month: 06 year: 2020 text: June 2020 |
PublicationDecade | 2020 |
PublicationTitle | Journal of information security and applications |
PublicationYear | 2020 |
Publisher | Elsevier Ltd |
Publisher_xml | – name: Elsevier Ltd |
References | Zhang, Zhu, Song, Fang (bib0046) 2010 Thubert (bib0012) 2012 Medjek, Tandjaoui, Romdhani, Djedjig (bib0007) 2018 Vasseur, Kim, Pister, Dejean, Barthel (bib0013) 2012 Bao, Chen, Chang, Cho (bib0029) 2012; 9 Yavuz, Ünal, Gül (bib0024) 2018; 12 Karkazis, Papaefstathiou, Sarakis, Zahariadis, Velivassaki, Bargiotas (bib0030) 2014 Dvir, Holczer, Buttyan (bib0014) 2011 Airehrour, Gutierrez, Ray (bib0033) 2018 Heinzelman, Chandrakasan, Balakrishnan (bib0040) 2002; 1 Hui, Culler (bib0002) 2008 Ammar, Russello, Crispo (bib0003) 2018; 38 Pongle, Chavan (bib0022) 2015; 121 Yang, Wang (bib0043) 2008 Haas, Yang, Liu, Li, Li (bib0020) 2014 Gubbi, Buyya, Marusic, Palaniswami (bib0001) 2013; 29 Buttyan, Hubaux (bib0010) 2007 Le, Loo, Luo, Lasebae (bib0016) 2013 Shah, Yaqoob (bib0006) 2016 Djedjig, Tandjaoui, Medjek, Romdhani (bib0009) 2017 Le, Loo, Chai, Aiash (bib0015) 2016; 7 Axelrod R.. The evolution of cooperation1985;. Khan, Ullrich, Voyiatzis, Herrmann (bib0032) 2017 Liu, Sheng, Yin, Ali, Roggen (bib0047) 2017; 4 . Djedjig, Tandjaoui, Medjek (bib0031) 2015 Axelrod (bib0050) 1987 Hashemi, Aliee (bib0035) 2018 Mailath, Samuelson (bib0048) 2006 Lahbib, Toumi, Elleuch, Laouiti, Martin (bib0036) 2017 Yan, Zhang, Vasilakos (bib0044) 2014; 42 Chen, Guo, Wang, Tsai, Al-Hamadi, You (bib0028) 2018; 16 Axelrod, Hamilton (bib0051) 1981; 211 Ratliff J.. Game theory. Djedjig, Tandjaoui, Romdhani, Medjek (bib0011) 2018 Weekly, Pister (bib0019) 2012 Tsiftes, Eriksson, Dunkels (bib0039) 2010 Mayzaud, Badonnel, Chrisment (bib0017) 2016; 18 Kiran, Rani, Singh (bib0037) 2018; 18 Baccour, Koubâa, Mottola, Zúñiga, Youssef, Boano (bib0038) 2012; 8 Raza, Wallgren, Voigt (bib0021) 2013; 11 Chugh, Aboubaker, Loo (bib0018) 2012 Bao, Chen (bib0025) 2012 Napiah, Idris, Ramli, Ahmedy (bib0023) 2018; 6 Marti, Giuli, Lai, Baker (bib0041) 2000 Ko, Terzis, Dawson-Haggerty, Culler, Hui, Levis (bib0004) 2011; 49 Tsao, Alexander, Dohler, Daza, Lozano, Richardson (bib0008) 2015 Chen, Bao, Guo (bib0026) 2015; 13 Iterated prisoner’s dilemma simulation software. De Couto (bib0042) 2004 Airehrour, Gutierrez, Ray (bib0034) 2016 Theodorakopoulos, Baras (bib0045) 2006; 24 Chen, Guo (bib0027) 2015; 33 Winter, Thubert, Brandt, Hui, Kelsey, Levis (bib0005) 2012 Kiran (10.1016/j.jisa.2020.102467_bib0037) 2018; 18 Heinzelman (10.1016/j.jisa.2020.102467_bib0040) 2002; 1 Chen (10.1016/j.jisa.2020.102467_bib0026) 2015; 13 Ko (10.1016/j.jisa.2020.102467_bib0004) 2011; 49 Raza (10.1016/j.jisa.2020.102467_bib0021) 2013; 11 Theodorakopoulos (10.1016/j.jisa.2020.102467_bib0045) 2006; 24 Airehrour (10.1016/j.jisa.2020.102467_bib0034) 2016 Gubbi (10.1016/j.jisa.2020.102467_bib0001) 2013; 29 Yang (10.1016/j.jisa.2020.102467_bib0043) 2008 Liu (10.1016/j.jisa.2020.102467_bib0047) 2017; 4 Yan (10.1016/j.jisa.2020.102467_bib0044) 2014; 42 Dvir (10.1016/j.jisa.2020.102467_bib0014) 2011 Vasseur (10.1016/j.jisa.2020.102467_bib0013) 2012 Lahbib (10.1016/j.jisa.2020.102467_bib0036) 2017 Napiah (10.1016/j.jisa.2020.102467_bib0023) 2018; 6 Chen (10.1016/j.jisa.2020.102467_bib0028) 2018; 16 Tsao (10.1016/j.jisa.2020.102467_bib0008) 2015 Weekly (10.1016/j.jisa.2020.102467_bib0019) 2012 Chen (10.1016/j.jisa.2020.102467_bib0027) 2015; 33 Baccour (10.1016/j.jisa.2020.102467_bib0038) 2012; 8 Hashemi (10.1016/j.jisa.2020.102467_bib0035) 2018 Djedjig (10.1016/j.jisa.2020.102467_bib0011) 2018 Marti (10.1016/j.jisa.2020.102467_bib0041) 2000 Buttyan (10.1016/j.jisa.2020.102467_bib0010) 2007 Le (10.1016/j.jisa.2020.102467_bib0015) 2016; 7 Winter (10.1016/j.jisa.2020.102467_bib0005) 2012 Zhang (10.1016/j.jisa.2020.102467_bib0046) 2010 Khan (10.1016/j.jisa.2020.102467_bib0032) 2017 Djedjig (10.1016/j.jisa.2020.102467_bib0031) 2015 Shah (10.1016/j.jisa.2020.102467_bib0006) 2016 Le (10.1016/j.jisa.2020.102467_bib0016) 2013 Hui (10.1016/j.jisa.2020.102467_bib0002) 2008 Medjek (10.1016/j.jisa.2020.102467_bib0007) 2018 Tsiftes (10.1016/j.jisa.2020.102467_bib0039) 2010 Yavuz (10.1016/j.jisa.2020.102467_bib0024) 2018; 12 Djedjig (10.1016/j.jisa.2020.102467_bib0009) 2017 Pongle (10.1016/j.jisa.2020.102467_bib0022) 2015; 121 Karkazis (10.1016/j.jisa.2020.102467_bib0030) 2014 Thubert (10.1016/j.jisa.2020.102467_bib0012) 2012 Chugh (10.1016/j.jisa.2020.102467_bib0018) 2012 Bao (10.1016/j.jisa.2020.102467_bib0025) 2012 Axelrod (10.1016/j.jisa.2020.102467_bib0051) 1981; 211 10.1016/j.jisa.2020.102467_bib0053 10.1016/j.jisa.2020.102467_bib0052 Ammar (10.1016/j.jisa.2020.102467_bib0003) 2018; 38 De Couto (10.1016/j.jisa.2020.102467_bib0042) 2004 Mailath (10.1016/j.jisa.2020.102467_bib0048) 2006 10.1016/j.jisa.2020.102467_bib0049 Haas (10.1016/j.jisa.2020.102467_bib0020) 2014 Mayzaud (10.1016/j.jisa.2020.102467_bib0017) 2016; 18 Airehrour (10.1016/j.jisa.2020.102467_bib0033) 2018 Bao (10.1016/j.jisa.2020.102467_bib0029) 2012; 9 Axelrod (10.1016/j.jisa.2020.102467_bib0050) 1987 |
References_xml | – year: 2018 ident: bib0033 article-title: Sectrust-rpl: a secure trust-aware rpl routing protocol for internet of things publication-title: Future Gener Comput Syst contributor: fullname: Ray – year: 2012 ident: bib0013 article-title: Routing metrics used for path calculation in low power and lossy networks publication-title: RFC 6551, Int Eng Task Force contributor: fullname: Barthel – start-page: 381 year: 2016 end-page: 385 ident: bib0006 article-title: A survey: Internet of things (iot) technologies, applications and challenges publication-title: 2016 IEEE smart energy grid engineering (SEGE) contributor: fullname: Yaqoob – start-page: 27 year: 2017 ident: bib0032 article-title: A trust-based resilient routing mechanism for the internet of things publication-title: Proceedings of the 12th International Conference on Availability, Reliability and Security contributor: fullname: Herrmann – volume: 4 start-page: 2172 year: 2017 end-page: 2185 ident: bib0047 article-title: Performance analysis of routing protocol for low power and lossy networks (rpl) in large scale networks publication-title: IEEE Internet Things J contributor: fullname: Roggen – start-page: 1 year: 2017 end-page: 5 ident: bib0036 article-title: Link reliable and trust aware rpl routing protocol for internet of things publication-title: 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA) contributor: fullname: Martin – volume: 7 start-page: 25 year: 2016 ident: bib0015 article-title: A specification-based ids for detecting attacks on rpl-based network topology publication-title: Information contributor: fullname: Aiash – start-page: 406 year: 2010 end-page: 407 ident: bib0039 article-title: Low-power wireless ipv6 routing with contikirpl publication-title: Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks contributor: fullname: Dunkels – start-page: 1615 year: 2008 end-page: 1623 ident: bib0043 article-title: Design guidelines for routing metrics in multihop wireless networks publication-title: INFOCOM 2008. The 27th conference on computer communications. IEEE contributor: fullname: Wang – volume: 33 start-page: 154 year: 2015 end-page: 167 ident: bib0027 article-title: Hierarchical trust management of community of interest groups in mobile ad hoc networks publication-title: Ad Hoc Netw contributor: fullname: Guo – start-page: 255 year: 2000 end-page: 265 ident: bib0041 article-title: Mitigating routing misbehavior in mobile ad hoc networks publication-title: Proceedings of the 6th annual international conference on Mobile computing and networking contributor: fullname: Baker – start-page: 1 year: 2012 end-page: 6 ident: bib0025 article-title: Trust management for the internet of things and its application to service composition publication-title: IEEE WoWMoM 2012 Workshop on the Internet of Things: Smart Objects and Services contributor: fullname: Chen – volume: 9 start-page: 169 year: 2012 end-page: 183 ident: bib0029 article-title: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection publication-title: Netw Serv Manag IEEE Trans contributor: fullname: Cho – year: 2006 ident: bib0048 article-title: Repeated games and reputations: long-run relationships contributor: fullname: Samuelson – start-page: 1 year: 1987 end-page: 16 ident: bib0050 article-title: The evolution of strategies in the iterated prisoner’s dilemma publication-title: DynNorms contributor: fullname: Axelrod – start-page: 115 year: 2016 end-page: 120 ident: bib0034 article-title: Securing rpl routing protocol from blackhole attacks using a trust-based mechanism publication-title: 2016 26th International Telecommunication Networks and Applications Conference (ITNAC) contributor: fullname: Ray – volume: 16 start-page: 246 year: 2018 end-page: 263 ident: bib0028 article-title: Trust-based service management for mobile cloud iot systems publication-title: IEEE Trans Netw Serv Manage contributor: fullname: You – volume: 121 year: 2015 ident: bib0022 article-title: Real time intrusion and wormhole attack detection in internet of things publication-title: Int J Comput Appl contributor: fullname: Chavan – volume: 38 start-page: 8 year: 2018 end-page: 27 ident: bib0003 article-title: Internet of things: a survey on the security of iot frameworks publication-title: J Inf Secur Appl contributor: fullname: Crispo – volume: 11 start-page: 2661 year: 2013 end-page: 2674 ident: bib0021 article-title: Svelte: real-time intrusion detection in the internet of things publication-title: Ad Hoc Netw contributor: fullname: Voigt – volume: 18 start-page: 459 year: 2016 end-page: 473 ident: bib0017 article-title: A taxonomy of attacks in rpl-based internet of things publication-title: Int J Netw Secur contributor: fullname: Chrisment – year: 2012 ident: bib0012 article-title: Objective function zero for the routing protocol for low-power and lossy networks (rpl) publication-title: RFC 6552, Int Eng Task Force contributor: fullname: Thubert – start-page: 709 year: 2011 end-page: 714 ident: bib0014 article-title: Vera-version number and rank authentication in rpl publication-title: Mobile adhoc and sensor systems (MASS), 2011 IEEE 8th international conference on contributor: fullname: Buttyan – start-page: 962 year: 2015 end-page: 967 ident: bib0031 article-title: Trust-based rpl for the internet of things publication-title: 2015 IEEE Symposium on Computers and Communication (ISCC) contributor: fullname: Medjek – volume: 8 start-page: 34 year: 2012 ident: bib0038 article-title: Radio link quality estimation in wireless sensor networks: a survey publication-title: ACM Trans Sens Netw (TOSN) contributor: fullname: Boano – start-page: 328 year: 2017 end-page: 335 ident: bib0009 article-title: New trust metric for the rpl routing protocol publication-title: Information and communication systems (ICICS), 2017 8th international conference on contributor: fullname: Romdhani – volume: 13 start-page: 684 year: 2015 end-page: 696 ident: bib0026 article-title: Trust-based service management for social internet of things systems publication-title: IEEE Trans Dependable Secure Comput contributor: fullname: Guo – start-page: 1 year: 2010 end-page: 9 ident: bib0046 article-title: A formal study of trust-based routing in wireless ad hoc networks publication-title: INFOCOM, 2010 proceedings IEEE contributor: fullname: Fang – volume: 1 start-page: 660 year: 2002 end-page: 670 ident: bib0040 article-title: An application-specific protocol architecture for wireless microsensor networks publication-title: IEEE Trans Wireless Commun contributor: fullname: Balakrishnan – start-page: 1 year: 2018 end-page: 30 ident: bib0035 article-title: Dynamic and comprehensive trust model for iot and its integration into rpl publication-title: J Supercomput contributor: fullname: Aliee – year: 2015 ident: bib0008 article-title: A security threat analysis for the routing protocol for low-power and lossy networks (rpls) publication-title: Tech. Rep. contributor: fullname: Richardson – start-page: 1 year: 2012 end-page: 6 ident: bib0019 article-title: Evaluating sinkhole defense techniques in rpl networks publication-title: 2012 20th IEEE international conference on network protocols (ICNP) contributor: fullname: Pister – volume: 12 start-page: 39 year: 2018 end-page: 58 ident: bib0024 article-title: Deep learning for detection of routing attacks in the internet of things publication-title: Int J Comput IntellSyst contributor: fullname: Gül – start-page: 550 year: 2014 end-page: 556 ident: bib0030 article-title: Evaluation of rpl with a transmission count-efficient and trust-aware routing metric publication-title: Communications (ICC), 2014 IEEE International Conference on contributor: fullname: Bargiotas – volume: 29 start-page: 1645 year: 2013 end-page: 1660 ident: bib0001 article-title: Internet of things (iot): a vision, architectural elements, and future directions publication-title: Future Gen Comput Syst contributor: fullname: Palaniswami – start-page: 122 year: 2018 end-page: 146 ident: bib0011 article-title: Trust management in the internet of things publication-title: Security and privacy in smart sensor networks contributor: fullname: Medjek – volume: 6 start-page: 16623 year: 2018 end-page: 16638 ident: bib0023 article-title: Compression header analyzer intrusion detection system (cha-ids) for 6lowpan communication protocol publication-title: IEEE Access contributor: fullname: Ahmedy – start-page: 569 year: 2014 end-page: 608 ident: bib0020 article-title: Current challenges and approaches in securing communications for sensors and actuators publication-title: The art of wireless sensor networks contributor: fullname: Li – year: 2012 ident: bib0005 article-title: Rpl: ipv6 routing protocol for low-power and lossy networks publication-title: RFC 6550, Int Eng Task Force contributor: fullname: Levis – start-page: 157 year: 2012 end-page: 162 ident: bib0018 article-title: Case study of a black hole attack on lowpan-rpl publication-title: Proc. of the sixth international conference on emerging security information, systems and technologies (SECURWARE), Rome, Italy (August 2012) contributor: fullname: Loo – volume: 18 start-page: 239 year: 2018 end-page: 245 ident: bib0037 article-title: Trust based defence system for ddos attack detection in rpl over internet of things publication-title: Int J Comput SciNetw Secur contributor: fullname: Singh – start-page: 37 year: 2008 end-page: 45 ident: bib0002 article-title: Extending ip to low-power, wireless personal area networks publication-title: IEEE Internet Comput contributor: fullname: Culler – year: 2004 ident: bib0042 publication-title: High-throughput routing for multi-hop wireless networks contributor: fullname: De Couto – volume: 49 year: 2011 ident: bib0004 article-title: Connecting low-power and lossy networks to the internet publication-title: IEEE Commun Mag contributor: fullname: Levis – volume: 42 start-page: 120 year: 2014 end-page: 134 ident: bib0044 article-title: A survey on trust management for internet of things publication-title: JNetwComputAppl contributor: fullname: Vasilakos – start-page: 000789 year: 2013 end-page: 000794 ident: bib0016 article-title: The impacts of internal threats towards routing protocol for low power and lossy network performance publication-title: Computers and communications (ISCC), 2013 IEEE symposium on contributor: fullname: Lasebae – start-page: 147 year: 2018 end-page: 178 ident: bib0007 article-title: Security threats in the internet of things: Rpl’s attacks and countermeasures publication-title: Security and privacy in smart sensor networks contributor: fullname: Djedjig – volume: 211 start-page: 1390 year: 1981 end-page: 1396 ident: bib0051 article-title: The evolution of cooperation publication-title: Science contributor: fullname: Hamilton – year: 2007 ident: bib0010 article-title: Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing contributor: fullname: Hubaux – volume: 24 start-page: 318 year: 2006 end-page: 328 ident: bib0045 article-title: On trust models and trust evaluation metrics for ad-hoc networks publication-title: IEEE J Sel Areas Commun contributor: fullname: Baras – start-page: 255 year: 2000 ident: 10.1016/j.jisa.2020.102467_bib0041 article-title: Mitigating routing misbehavior in mobile ad hoc networks contributor: fullname: Marti – year: 2007 ident: 10.1016/j.jisa.2020.102467_bib0010 contributor: fullname: Buttyan – start-page: 1 year: 2012 ident: 10.1016/j.jisa.2020.102467_bib0025 article-title: Trust management for the internet of things and its application to service composition contributor: fullname: Bao – start-page: 1 year: 2012 ident: 10.1016/j.jisa.2020.102467_bib0019 article-title: Evaluating sinkhole defense techniques in rpl networks contributor: fullname: Weekly – year: 2012 ident: 10.1016/j.jisa.2020.102467_bib0005 article-title: Rpl: ipv6 routing protocol for low-power and lossy networks publication-title: RFC 6550, Int Eng Task Force contributor: fullname: Winter – start-page: 962 year: 2015 ident: 10.1016/j.jisa.2020.102467_bib0031 article-title: Trust-based rpl for the internet of things contributor: fullname: Djedjig – volume: 9 start-page: 169 issue: 2 year: 2012 ident: 10.1016/j.jisa.2020.102467_bib0029 article-title: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection publication-title: Netw Serv Manag IEEE Trans doi: 10.1109/TCOMM.2012.031912.110179 contributor: fullname: Bao – volume: 29 start-page: 1645 issue: 7 year: 2013 ident: 10.1016/j.jisa.2020.102467_bib0001 article-title: Internet of things (iot): a vision, architectural elements, and future directions publication-title: Future Gen Comput Syst doi: 10.1016/j.future.2013.01.010 contributor: fullname: Gubbi – year: 2015 ident: 10.1016/j.jisa.2020.102467_bib0008 article-title: A security threat analysis for the routing protocol for low-power and lossy networks (rpls) contributor: fullname: Tsao – volume: 16 start-page: 246 issue: 1 year: 2018 ident: 10.1016/j.jisa.2020.102467_bib0028 article-title: Trust-based service management for mobile cloud iot systems publication-title: IEEE Trans Netw Serv Manage doi: 10.1109/TNSM.2018.2886379 contributor: fullname: Chen – start-page: 37 issue: 4 year: 2008 ident: 10.1016/j.jisa.2020.102467_bib0002 article-title: Extending ip to low-power, wireless personal area networks publication-title: IEEE Internet Comput doi: 10.1109/MIC.2008.79 contributor: fullname: Hui – volume: 1 start-page: 660 issue: 4 year: 2002 ident: 10.1016/j.jisa.2020.102467_bib0040 article-title: An application-specific protocol architecture for wireless microsensor networks publication-title: IEEE Trans Wireless Commun doi: 10.1109/TWC.2002.804190 contributor: fullname: Heinzelman – volume: 49 issue: 4 year: 2011 ident: 10.1016/j.jisa.2020.102467_bib0004 article-title: Connecting low-power and lossy networks to the internet publication-title: IEEE Commun Mag contributor: fullname: Ko – volume: 121 issue: 9 year: 2015 ident: 10.1016/j.jisa.2020.102467_bib0022 article-title: Real time intrusion and wormhole attack detection in internet of things publication-title: Int J Comput Appl contributor: fullname: Pongle – start-page: 328 year: 2017 ident: 10.1016/j.jisa.2020.102467_bib0009 article-title: New trust metric for the rpl routing protocol contributor: fullname: Djedjig – volume: 24 start-page: 318 issue: LCA-ARTICLE-2007-016 year: 2006 ident: 10.1016/j.jisa.2020.102467_bib0045 article-title: On trust models and trust evaluation metrics for ad-hoc networks publication-title: IEEE J Sel Areas Commun doi: 10.1109/JSAC.2005.861390 contributor: fullname: Theodorakopoulos – ident: 10.1016/j.jisa.2020.102467_bib0053 – volume: 18 start-page: 459 issue: 3 year: 2016 ident: 10.1016/j.jisa.2020.102467_bib0017 article-title: A taxonomy of attacks in rpl-based internet of things publication-title: Int J Netw Secur contributor: fullname: Mayzaud – volume: 7 start-page: 25 issue: 2 year: 2016 ident: 10.1016/j.jisa.2020.102467_bib0015 article-title: A specification-based ids for detecting attacks on rpl-based network topology publication-title: Information doi: 10.3390/info7020025 contributor: fullname: Le – volume: 11 start-page: 2661 issue: 8 year: 2013 ident: 10.1016/j.jisa.2020.102467_bib0021 article-title: Svelte: real-time intrusion detection in the internet of things publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2013.04.014 contributor: fullname: Raza – start-page: 122 year: 2018 ident: 10.1016/j.jisa.2020.102467_bib0011 article-title: Trust management in the internet of things contributor: fullname: Djedjig – start-page: 27 year: 2017 ident: 10.1016/j.jisa.2020.102467_bib0032 article-title: A trust-based resilient routing mechanism for the internet of things contributor: fullname: Khan – volume: 42 start-page: 120 year: 2014 ident: 10.1016/j.jisa.2020.102467_bib0044 article-title: A survey on trust management for internet of things publication-title: JNetwComputAppl contributor: fullname: Yan – volume: 13 start-page: 684 issue: 6 year: 2015 ident: 10.1016/j.jisa.2020.102467_bib0026 article-title: Trust-based service management for social internet of things systems publication-title: IEEE Trans Dependable Secure Comput doi: 10.1109/TDSC.2015.2420552 contributor: fullname: Chen – start-page: 1 year: 1987 ident: 10.1016/j.jisa.2020.102467_bib0050 article-title: The evolution of strategies in the iterated prisoner’s dilemma publication-title: DynNorms contributor: fullname: Axelrod – year: 2006 ident: 10.1016/j.jisa.2020.102467_bib0048 contributor: fullname: Mailath – start-page: 406 year: 2010 ident: 10.1016/j.jisa.2020.102467_bib0039 article-title: Low-power wireless ipv6 routing with contikirpl contributor: fullname: Tsiftes – start-page: 381 year: 2016 ident: 10.1016/j.jisa.2020.102467_bib0006 article-title: A survey: Internet of things (iot) technologies, applications and challenges contributor: fullname: Shah – start-page: 115 year: 2016 ident: 10.1016/j.jisa.2020.102467_bib0034 article-title: Securing rpl routing protocol from blackhole attacks using a trust-based mechanism contributor: fullname: Airehrour – start-page: 157 year: 2012 ident: 10.1016/j.jisa.2020.102467_bib0018 article-title: Case study of a black hole attack on lowpan-rpl contributor: fullname: Chugh – ident: 10.1016/j.jisa.2020.102467_bib0052 – start-page: 709 year: 2011 ident: 10.1016/j.jisa.2020.102467_bib0014 article-title: Vera-version number and rank authentication in rpl contributor: fullname: Dvir – volume: 18 start-page: 239 issue: 12 year: 2018 ident: 10.1016/j.jisa.2020.102467_bib0037 article-title: Trust based defence system for ddos attack detection in rpl over internet of things publication-title: Int J Comput SciNetw Secur contributor: fullname: Kiran – start-page: 550 year: 2014 ident: 10.1016/j.jisa.2020.102467_bib0030 article-title: Evaluation of rpl with a transmission count-efficient and trust-aware routing metric contributor: fullname: Karkazis – year: 2004 ident: 10.1016/j.jisa.2020.102467_bib0042 contributor: fullname: De Couto – volume: 12 start-page: 39 issue: 1 year: 2018 ident: 10.1016/j.jisa.2020.102467_bib0024 article-title: Deep learning for detection of routing attacks in the internet of things publication-title: Int J Comput IntellSyst doi: 10.2991/ijcis.2018.25905181 contributor: fullname: Yavuz – volume: 38 start-page: 8 year: 2018 ident: 10.1016/j.jisa.2020.102467_bib0003 article-title: Internet of things: a survey on the security of iot frameworks publication-title: J Inf Secur Appl contributor: fullname: Ammar – start-page: 000789 year: 2013 ident: 10.1016/j.jisa.2020.102467_bib0016 article-title: The impacts of internal threats towards routing protocol for low power and lossy network performance contributor: fullname: Le – ident: 10.1016/j.jisa.2020.102467_bib0049 – start-page: 569 year: 2014 ident: 10.1016/j.jisa.2020.102467_bib0020 article-title: Current challenges and approaches in securing communications for sensors and actuators contributor: fullname: Haas – start-page: 1 year: 2017 ident: 10.1016/j.jisa.2020.102467_bib0036 article-title: Link reliable and trust aware rpl routing protocol for internet of things contributor: fullname: Lahbib – start-page: 1 year: 2010 ident: 10.1016/j.jisa.2020.102467_bib0046 article-title: A formal study of trust-based routing in wireless ad hoc networks contributor: fullname: Zhang – year: 2012 ident: 10.1016/j.jisa.2020.102467_bib0013 article-title: Routing metrics used for path calculation in low power and lossy networks publication-title: RFC 6551, Int Eng Task Force contributor: fullname: Vasseur – volume: 6 start-page: 16623 year: 2018 ident: 10.1016/j.jisa.2020.102467_bib0023 article-title: Compression header analyzer intrusion detection system (cha-ids) for 6lowpan communication protocol publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2798626 contributor: fullname: Napiah – start-page: 147 year: 2018 ident: 10.1016/j.jisa.2020.102467_bib0007 article-title: Security threats in the internet of things: Rpl’s attacks and countermeasures contributor: fullname: Medjek – start-page: 1615 year: 2008 ident: 10.1016/j.jisa.2020.102467_bib0043 article-title: Design guidelines for routing metrics in multihop wireless networks contributor: fullname: Yang – volume: 211 start-page: 1390 issue: 4489 year: 1981 ident: 10.1016/j.jisa.2020.102467_bib0051 article-title: The evolution of cooperation publication-title: Science doi: 10.1126/science.7466396 contributor: fullname: Axelrod – year: 2018 ident: 10.1016/j.jisa.2020.102467_bib0033 article-title: Sectrust-rpl: a secure trust-aware rpl routing protocol for internet of things publication-title: Future Gener Comput Syst contributor: fullname: Airehrour – volume: 33 start-page: 154 year: 2015 ident: 10.1016/j.jisa.2020.102467_bib0027 article-title: Hierarchical trust management of community of interest groups in mobile ad hoc networks publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2015.05.004 contributor: fullname: Chen – start-page: 1 year: 2018 ident: 10.1016/j.jisa.2020.102467_bib0035 article-title: Dynamic and comprehensive trust model for iot and its integration into rpl publication-title: J Supercomput contributor: fullname: Hashemi – year: 2012 ident: 10.1016/j.jisa.2020.102467_bib0012 article-title: Objective function zero for the routing protocol for low-power and lossy networks (rpl) publication-title: RFC 6552, Int Eng Task Force contributor: fullname: Thubert – volume: 4 start-page: 2172 issue: 6 year: 2017 ident: 10.1016/j.jisa.2020.102467_bib0047 article-title: Performance analysis of routing protocol for low power and lossy networks (rpl) in large scale networks publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2017.2755980 contributor: fullname: Liu – volume: 8 start-page: 34 issue: 4 year: 2012 ident: 10.1016/j.jisa.2020.102467_bib0038 article-title: Radio link quality estimation in wireless sensor networks: a survey publication-title: ACM Trans Sens Netw (TOSN) contributor: fullname: Baccour |
SSID | ssj0001219523 |
Score | 2.5199473 |
Snippet | The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL... |
SourceID | crossref elsevier |
SourceType | Aggregation Database Publisher |
StartPage | 102467 |
SubjectTerms | Cooperation enforcement Game theory Internet of things RPL Secure routing Trust management |
Title | Trust-aware and cooperative routing protocol for IoT security |
URI | https://dx.doi.org/10.1016/j.jisa.2020.102467 |
Volume | 52 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV27asMwFBUhXbr0XZo-goZuRY1sS641htKQtDRLE8hm9LiGZLBD4tCt317JkiGF0qGjjS-YI-meI-k-ELo3NGEaFCMp1U-EMSqJMCohhUxAxsBBGXfe8T5Nx3P2uuCLDnpuc2FcWGXw_d6nN946vBkENAfr5XLwEbtqYZHbATSyt8lgt_Rn5_TjV7R3zhIJ3nR5c98TZxByZ3yY18rdGcdWNLkiBr7d_C_8tMc5oxN0FMQiHvr_OUUdKM_QcduIAYd1eY4s4-y2NZGfcgNYlgbrqlqDr-mNN9XOhTZjV5GhssOOrUzFk2qGt6F13QWaj15mz2MS-iIQnTBWE54yo6mmEVBpIgFMcqMLqY0odMazLBXGZAI0FXEqeexYnZkokoUGAaldkJeoW1YlXCFsYu5uBoEyo5iAxO5nilQUSmVcU6N4Dz20aORrX_4ib-PCVrnDLnfY5R67HuItYPmPQcytf_7D7vqfdjfo0D35yK1b1K03O7izGqFW_WYS9NHBcPI2nn4D4pu7gg |
link.rule.ids | 315,783,787,4509,24128,27936,27937,45597,45691 |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07a8MwEBYhHdql79L0qaFbUSPbkmuNJTQkbZKlCWQTehmSwQ6JQ7f-9kqWDCmUDl1tDsQn6e476dMdAA8aJ0QZSVCK1TMiBAvEtExQLhIjYkON1O68YzxJBzPyNqfzFug1b2GcrDL4fu_Ta28dvnQDmt3VYtH9iF21sMhlADXttSnQHnH82C7qp69o56AlYrRu8-YMkLMIj2e8zmvpLo1jy5pcFQPfb_6XALUTdPrH4DCwRfjiB3QCWqY4BUdNJwYYNuYZsCFnu6mQ-BRrA0WhoSrLlfFFveG63DptM3QlGUo779DyVDgsp3ATetedg1n_ddoboNAYAamEkArRlGiFFY4MFjpihgiqVS6UZrnKaJalTOuMGYVZnAoau7BOdBSJXBlmUrsjL0C7KAtzCaCOqbsaNJhoSZhJbEKTpyyXMqMKa0k74LFBg698_QveCMOW3GHHHXbcY9cBtAGM_5hFbh30H3ZX_7S7B_uD6XjER8PJ-zU4cH-8jOsGtKv11txawlDJu3pBfAOK4r0b |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Trust-aware+and+cooperative+routing+protocol+for+IoT+security&rft.jtitle=Journal+of+information+security+and+applications&rft.au=Djedjig%2C+Nabil&rft.au=Tandjaoui%2C+Djamel&rft.au=Medjek%2C+Faiza&rft.au=Romdhani%2C+Imed&rft.date=2020-06-01&rft.issn=2214-2126&rft.volume=52&rft.spage=102467&rft_id=info:doi/10.1016%2Fj.jisa.2020.102467&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jisa_2020_102467 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2214-2126&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2214-2126&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2214-2126&client=summon |