Computer Science ›› 2019, Vol. 46 ›› Issue (6): 153-161.doi: 10.11896/j.issn.1002-137X.2019.06.023

Previous Articles     Next Articles

Secure Routing Mechanism Based on Trust Against Packet Dropping Attack in Internet of Things

ZHANG Guang-hua1,2, YANG Yao-hong1, ZHANG Dong-wen1, LI Jun3   

  1. (College of Information Science and Engineering,Hebei University of Science and Technology,Shijiazhuang 050018,China)1
    (State Key Laboratory of Integrated Services Networks,Xidian University,Xi’an 710071,China)2
    (College of Mathematics and Information Science,Hebei Normal University,Shijiazhuang 050024,China)3
  • Received:2018-08-20 Published:2019-06-24

Abstract: In an open Internet of Things environment,nodes are vulnerable to malicious packet dropping attacks (including black hole attacks and gray hole attacks) in the routing process,which will seriously affect the connectivity of the network and lead to the decrease of packet delivery rate and the increase of end-to-end delay.For this reason,this paper proposed a trust-based secure routing mechanism on the basis of RPL protocol.According to the behavior of the nodes in the data forwarding process,the penalty factor is introduced to evaluate the direct trust relationship between the nodes,the entropy is used to assign weights to the direct trust value and the indirect trust value,so that the comprehensive trust value of the evaluated nodes is obtained.The fuzzy set theory is used to classify the trust relationship between nodes,and the neighbor nodes with higher trust level are selected for the routing node to forward data,while the neighbor nodes with lower trust level are isolated from the network.In addition,in order to prevent normal nodes from being isolated from the network as malicious nodes due to some non-intrusion factors,a given recovery time will be provided to further determine whether to isolate them from the network.This paper used Contiki operating system and its Cooja network simulator to carry out the simulation experiment of this scheme.The results show that the malicious node detection rate,false detection rate,packet delivery rate and end-to-end delay of this scheme are improved when the number of nodes and the proportion of malicious nodes are different.In terms of security,the malicious node detection rate and false detection rate of this scheme are significantly better than tRPL protocol.In terms of routing performance,the packetdelivery rate and end-to-end delay of this scheme are significantly better than tRPL protocol and MRHOF-RPL protocol.The simulation analysis results fully demonstrate that this scheme can not only effectively identify malicious nodes,but also maintain better routing performance in the presence of malicious attacks.

Key words: Internet of things, Malicious detection, Packet dropping attack, RPL protocol, Trust evaluation

CLC Number: 

  • TP393
[1]ZHANG Y Q,ZHOU W,PENG A N.Survey of Internet of Things Security [J].Journal of Computer Research and Deve-lopment,2017,54(10):2130-2143.(in Chinese)
张玉清,周威,彭安妮.物联网安全综述[J].计算机研究与发展,2017,54(10):2130-2143.
[2]LIN J,YU W,ZHANG N,et al.A Survey on Internet of Things:Architecture,Enabling Technologies,Security and Privacy,and Applications[J].IEEE Internet of Things Journal,2017,4(5):1125-1142.
[3]ISLAM S M R,KWAK D,KABIR M H,et al.The Internet of Things for Health Care:A Comprehensive Survey [J].IEEE Access,2017,3:678-708.
[4]KURT M N,YILMAZ Y,WANG X.Distributed Quickest Detection of Cyber-Attacks in Smart Grid [J].IEEE Transactions on Information Forensics and Security,2018,13(99):1-16.
[5]ALFONSO V,JAMES F H,HUNG L H,et al.Predicts 2015:The Internet of Things[EB/OL].(2014-12-30) [2018-07-28].https://www.gartner.com/doc/2952822/predicts-internet-things.
[6]KSHIRSAGAR V H,KANTHE A M,SIMUNIC D.Trust Based Detection and Elimination of Packet Drop Attack in the Mobile Ad-Hoc Networks [J].Wireless Personal Communications,2018,100(2):311-320.
[7]HAN G,JIANG J,SHU L,et al.Management and Applications of Trust in Wireless Sensor Networks:A survey [J].Journal of Computer and System Sciences,2014,80(3):602-617.
[8]BAO F,CHEN I R,CHANG M,et al,Hierarchical Trust Mana-gement for Wireless Sensor Networks and Its Application to Trust-based Routing [C]∥Proceedings of ACM Symposium on Applied Computing.Taiwan:ACM,2011,1732-1738.
[9]BAO F,CHEN I R,CHANG M J,et al.Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection [J].IEEE Transactions on Network & Service Management,2012,9(2):169-183.
[10]HE D,CHEN C,CHAN S,et al.ReTrust:Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks [J].IEEE Transactions on Information Technology in Biomedicine,2012,16(4):623-632.
[11]YANG B,YAMAMOTO R,TANAKA Y.Dempster-Shafer Evi-dence Theory based Trust Management Strategy against Coo-perative Black Hole Attacks and Gray Hole Attacks in MANETs[C]∥16th International Conference on Advanced Communi-cation Technology.Pyeongchang:IEEE,2014:223-232.
[12]WANG B,CHEN X,CHANG W.A Light-weight Trust-based QoS Routing Algorithm for Ad Hoc Networks [J].Pervasive and Mobile Computing,2014,13(2014):164-180.
[13]BAO F,CHEN I R.Trust Management for the Internet of Things and Its Application to Service Composition [C]∥2012 IEEE International Symposium on a World of Wireless,Mobile and Multimedia Networks (WoWMoM).San Francisco:IEEE,2012:1-6.
[14]YAN Z,ZHANG P,VASILAKOS A V.A Survey on Trust Management for Internet of Things [J].Journal of Network and Computer Applications,2014,42(3):120-134.
[15]KARKAZIS P,LELIGOU H C,SARAKIS L,et al.Design of Primary and Composite Routing Metrics for RPL-compliant Wireless Sensor Networks [C]∥2012 International Conference on Telecommunications and Multimedia (TEMU).Chania:IEEE,2012:13-18.
[16]SEEBER S,SEHGAL A,STELTE B,et al.Towards a Trust Computing Architecture for RPL in Cyber Physical Systems [C]∥Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013).Zurich:IEEE,2013:134-137.
[17]DJEDJIG N,TANDJAOUI D,MEDJEK F.Trust-based RPL for the Internet of Things [C]∥2015 IEEE Symposium on Computers and Communication (ISCC).Larnaca:IEEE,2016:962-967.
[18]KHAN Z A,HERRMANN P.A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things [C]∥2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA).Taipei:IEEE,2017:1169-1176.
[19]KHAN Z A,ULLRICH J,VOYIATZIS A G,et al.A Trust-based Resilient Routing Mechanism for the Internet of Things [C]∥Proceedings of the 12th International Conference on Availability,Reliability and Security (ARES’17).Reggio Calabria:ACM,2017:1-6.
[20]THUBERT P,WINTER T,BRANDT A,et al.RPL:IPv6 Routing Protocol for Low power and Lossy Networks [J].Internet Requests for Comment,2012,6550(5):853-861.
[21]LUO J,LIU X,FAN M.A Trust Model based on Fuzzy Recommendation for Mobile Ad-hoc Networks [J].Computer Networks,2009,53(14):2396-2407.
[22]ZHOU Z P,SHAO N N.An Improved Trust Evaluation Model Based on Bayesian for WSNs [J].Chinese Journal of Sensors and Actuators,2016,29(6):927-933.(in Chinese)
周治平,邵楠楠.基于贝叶斯的改进WSNs信任评估模型[J].传感技术学报,2016,29(6):927-933.
[23]WU G,DU Z,HU Y,et al.A Dynamic Trust Model Exploiting the Time Slice in WSNs [J].Soft Computing,2014,18(9):1829-1840.
[24]VASSEUR J P,KIM M,PISTER K,et al.Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks [S/OL].[2018-07-28].https://tools.ietf.org/pdf/rfc6551.pdf.
[25]OSTERLIND F,DUNKELS A,ERIKSSON J,et al.Cross-Level Sensor Network Simulation with COOJA [C]∥Proceedings.2006 31st IEEE Conference on Local Computer Networks.Tampa:IEEE,2011:641-648.
[26]QASEM M,ALTAWSSI H,YASSIEN M B,et al.Performance Evaluation of RPL Objective Functions [C]∥IEEE Internatio-nal Conference on Computer and Information Technology;Ubiquitous Computing and Communications;Dependable,Autonomic and Secure Computing;Pervasive Intelligence and Computing.Liverpool:IEEE,2015:1606-1613.
[1] ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270.
[2] ZHANG Xi-ran, LIU Wan-ping, LONG Hua. Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things [J]. Computer Science, 2022, 49(6A): 738-743.
[3] DONG Dan-dan, SONG Kang. Performance Analysis on Reconfigurable Intelligent Surface Aided Two-way Internet of Things Communication System [J]. Computer Science, 2022, 49(6): 19-24.
[4] Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54.
[5] ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun. New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [J]. Computer Science, 2022, 49(3): 329-337.
[6] YANG Yu-li, LI Yu-hang, DENG An-hua. Trust Evaluation Model of Cloud Manufacturing Services for Personalized Needs [J]. Computer Science, 2022, 49(3): 354-359.
[7] LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54.
[8] LI Jia-ming, ZHAO Kuo, QU Ting, LIU Xiao-xiang. Research and Analysis of Blockchain Internet of Things Based on Knowledge Graph [J]. Computer Science, 2021, 48(6A): 563-567.
[9] WANG Xi-long, LI Xin, QIN Xiao-lin. Collaborative Scheduling of Source-Grid-Load-Storage with Distributed State Awareness UnderPower Internet of Things [J]. Computer Science, 2021, 48(2): 23-32.
[10] WANG Wei-hong, CHEN Zhen-yu. Intelligent Manufacturing Security Model Based on Improved Blockchain [J]. Computer Science, 2021, 48(2): 295-302.
[11] LIU Xin, HUANG Yuan-yuan, LIU Zi-ang, ZHOU Rui. IoTGuardEye:A Web Attack Detection Method for IoT Services [J]. Computer Science, 2021, 48(2): 324-329.
[12] LIU Wei, RUAN Min-jie, SHE Wei, ZHANG Zhi-hong, TIAN Zhao. PBFT Optimized Consensus Algorithm for Internet of Things [J]. Computer Science, 2021, 48(11): 151-158.
[13] LIANG Jun-bin, TIAN Feng-sen, JIANG Chan, WANG Tian-shu. Survey on Task Offloading Techniques for Mobile Edge Computing with Multi-devices and Multi-servers in Internet of Things [J]. Computer Science, 2021, 48(1): 16-25.
[14] GAO Ji-xu, WANG Jun. Multi-edge Collaborative Computing Unloading Scheme Based on Genetic Algorithm [J]. Computer Science, 2021, 48(1): 72-80.
[15] XIE Ying-ying, SHI Jian, HUANG Shuo-kang, LEI Kai. Survey on Internet of Things Based on Named Data Networking Facing 5G [J]. Computer Science, 2020, 47(4): 217-225.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!