یک پروتکل RPL کارآمد مبتنی براعتماد آگاه به انرژی برای اینترنت اشیا
الموضوعات :فرزانه کاویانی باغبادرانی 1 , محمدرضا سلطان آقایی 2 , فرساد زمانی بروجنی 3
1 - گروه کامپیوتر، دانشکده فنی و مهندسی، دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)، اصفهان، ایران.
2 - گروه کامپیوتر، دانشکده فنی و مهندسی، دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)، اصفهان، ایران.
3 - دانشکده مهندسی کامپیوتر، دانشگاه آزاد اسلامی واحد علوم و تحقیقات،تهران، ایران.
الکلمات المفتاحية: اینترنت اشیا, مدل های اعتماد, آگاه به انرژی, پروتکل RPL.,
ملخص المقالة :
اینترنت اشیا (IoT) به عنوان یکی از جدیدترین فناوری های ارتباطی برای کاربردهای مختلف در نظر گرفته می شود. از سوی دیگر با چالش های زیادی مواجه بوده است که یکی از مهم ترین آنها مربوط به امنیت است. به دلیل محدودیت های زیاد، اینترنت اشیاء در برابر حملات بسیار آسیب پذیر است و به دلیل کاربردهای حساس، به شدت در معرض حملات قرار می گیرد. مطالعات مختلفی برای بهبود امنیت اینترنت اشیا معرفی شده است. اکثر روش ها بر بهبود امنیت پروتکل RPL بر اساس توسعه مدل های اعتماد متمرکز شده اند. با این حال، بیشتر این تحقیقات رفتارهایی را برای محاسبه ارزش اعتماد در نظر گرفته اند. این روش ارزیابی اعتماد به دلیل حملات گسترده گره های مخرب کافی نیست. در این مقاله، یک روش بهبود یافته بر اساس توسعه RPL با استفاده از مدل های اعتماد با سیستم تشخیص نفوذ پیشنهاد شده است. روش پیشنهادی بر سه اصل مهم، از جمله ایجاد توپولوژی مسیریابی ایمن و قابل اعتماد، ارزیابی اعتماد، و شناسایی گرههای مخرب تمرکز دارد. در مرحله اول توپولوژی مسیریابی شبکه بر اساس اعتماد و شرایط گره ها شکل می گیرد. در مرحله دوم، مطابق با تبادل داده ها، اعتماد گره ها ارزیابی شده و عوامل مخرب شناسایی می شوند. نتایج شبیه سازی با استفاده از Cooja نشان دهنده برتری روش پیشنهادی در بهبود قابلیت اطمینان مسیریابی و تبادل داده نسبت به عملیات قبلی است.
[1] Hassan, Rondik J., et al. "State of art survey for iot effects on smart city technology: challenges, opportunities, and solutions." Asian Journal of Research in Computer Science 22 (2021): 32-48.
[2] Hassan, Rosilah, et al. "Internet of Things and its applications: A comprehensive survey." Symmetry 12.10 (2020): 1674.
[3] Khanna, Abhishek, and Sanmeet Kaur. "Internet of things (IoT), applications and challenges: a comprehensive review." Wireless Personal Communications 114.2 (2020): 1687-1762.
[4] Al-Emran, Mostafa, Sohail Iqbal Malik, and Mohammed N. Al-Kabi. "A survey of Internet of Things (IoT) in education: Opportunities and challenges." Toward social internet of things (SIoT): enabling technologies, architectures and applications (2020): 197-209.
[5] Abiodun, Oludare Isaac, et al. "A review on the security of the internet of things: challenges and solutions." Wireless Personal Communications 119.3 (2021): 2603-2637.
[6] Muzammal, Syeda M., Raja Kumar Murugesan, and N. Z. Jhanjhi. "A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches." IEEE Internet of Things Journal 8.6 (2020): 4186-4210.
[7] Sharma, Avani, et al. "Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes." Computer Communications 160 (2020): 475-493.
[8] Chahal, Rajanpreet Kaur, Neeraj Kumar, and Shalini Batra. "Trust management in social Internet of Things: A taxonomy, open issues, and challenges." Computer Communications 150 (2020): 13-46.
[9] Pourghebleh, Behrouz, Karzan Wakil, and Nima Jafari Navimipour. "A comprehensive study on the trust management techniques in the Internet of Things." IEEE Internet of Things Journal 6.6 (2019): 9326-9337.
[10] Solapure, Sharwari S., and Harish H. Kenchannavar. "Design and analysis of RPL objective functions using variant routing metrics for IoT applications." Wireless Networks 26 (2020): 4637-4656.
[11] Lamaazi, Hanane, and Nabil Benamar. "A comprehensive survey on enhancements and limitations of the RPL protocol: A focus on the objective function." Ad Hoc Networks 96 (2020): 102001.
[12] Dey, Amlan Jyoti, and Hiren Kumar Deva Sarma. "Routing techniques in internet of things: A review." Trends in Communication, Cloud, and Big Data (2020): 41-50.
[13] Marietta, J., and B. Chandra Mohan. "A review on routing in internet of things." Wireless Personal Communications 111.1 (2020): 209-233.
[14] Gaddour, Olfa, and Anis Koubâa. "RPL in a nutshell: A survey." Computer Networks 56.14 (2012): 3163-3178.
[15] Kushalnagar, Nandakishore, Gabriel Montenegro, and Christian Schumacher. "IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals." (2007): 1-11.
[16] Simoglou, George, et al. "Intrusion detection systems for RPL security: a comparative analysis." Computers & Security (2021): 102219.
[17] Almusaylim, Zahrah A., Abdulaziz Alhumam, and N. Z. Jhanjhi. "Proposing a secure RPL based internet of things routing protocol: a review." Ad Hoc Networks 101 (2020): 102096.
[18] Raoof, Ahmed, Ashraf Matrawy, and Chung-Horng Lung. "Routing attacks and mitigation methods for RPL-based Internet of Things." IEEE Communications Surveys & Tutorials 21.2 (2018): 1582-1606.
[19] Verma, Abhishek, and Virender Ranga. "Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review." IEEE Sensors Journal 20.11 (2020): 5666-5690.
[20] Khraisat, Ansam, and Ammar Alazab. "A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges." Cybersecurity 4.1 (2021): 1-27.
[21] Hajiheidari, Somayye, et al. "Intrusion detection systems in the Internet of things: A comprehensive investigation." Computer Networks 160 (2019): 165-191.
[22] Arshad, Junaid, et al. "A review of performance, energy and privacy of intrusion detection systems for IoT." Electronics 9.4 (2020): 629.
[23] Seyfollahi, Ali, and Ali Ghaffari. "A review of intrusion detection systems in RPL routing protocol based on machine learning for internet of things applications." Wireless Communications and Mobile Computing 2021 (2021).
[24] Napiah, Mohamad Nazrin, et al. "Compression header analyzer intrusion detection system (CHA-IDS) for 6LoWPAN communication protocol." IEEE Access 6 (2018): 16623-16638.
[25] Smys, S., Abul Basar, and Haoxiang Wang. "Hybrid intrusion detection system for internet of things (IoT)." Journal of ISMAC 2.04 (2020): 190-199.
[26] Agiollo, Andrea, et al. "DETONAR: Detection of routing attacks in RPL-based IoT." IEEE Transactions on Network and Service Management 18.2 (2021): 1178-1190.
[27] Pasikhani, Aryan M., et al. "Intrusion Detection Systems in RPL-based 6LoWPAN: A Systematic Literature Review." IEEE Sensors Journal (2021).
[28] Boyanapalli, Arathi, and A. Shanthini. "A Comparative Study of Techniques, Datasets and Performances for Intrusion Detection Systems in IoT." Artificial Intelligence Techniques for Advanced Computing Applications, 2021. 225-236.
[29] Arış, Ahmet, Sıddıka Berna Örs Yalçın, and Sema F. Oktuğ. "New lightweight mitigation techniques for RPL version number attacks." Ad Hoc Networks 85 (2019): 81-91.
[30] Ioulianou, Philokypros, et al. "A signature-based intrusion detection system for the internet of things." Information and Communication Technology Form (2018).
[31] Kfoury, Elie, et al. "A self organizing map intrusion detection system for rpl protocol attacks." International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 11.1 (2019): 30-43.
[32] Luangoudom, Sonxay, et al. "svBLOCK: mitigating black hole attack in low-power and lossy networks." International Journal of Sensor Networks 32.2 (2020): 77-86.
[33] Soni, Gaurav, and R. Sudhakar. "A L-IDS against dropping attack to secure and improve RPL performance in WSN aided IoT." 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, 2020.
[34] Mayzaud, Anthéa, et al. "Using the RPL protocol for supporting passive monitoring in the Internet of Things." NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2016.
[35] Mayzaud, Anthéa, Rémi Badonnel, and Isabelle Chrisment. "Detecting version number attacks in RPL-based networks using a distributed monitoring architecture." 2016 12th International Conference on Network and Service Management (CNSM). IEEE, 2016.
[36] Yavuz, Furkan Yusuf, Ü. N. A. L. Devrim, and G. Ü. L. Ensar. "Deep learning for detection of routing attacks in the internet of things." International Journal of Computational Intelligence Systems 12.1 (2018): 39-58.
[37] Li, Yuxi, et al. "Deep learning in security of internet of things." IEEE Internet of Things Journal (2021).
[38] Thamilarasu, Geethapriya, and Shiven Chawla. "Towards deep-learning-driven intrusion detection for the internet of things." Sensors 19.9 (2019): 1977.
[39] Junior, Franklin Magalhães Ribeiro, and Carlos Alberto Kamienski. "A Survey on Trustworthiness for the Internet of Things." IEEE Access 9 (2021): 42493-42514.
[40] Mohammadi, Venus, et al. "Trust-based recommendation systems in Internet of Things: a systematic literature review." Human-centric Computing and Information Sciences 9.1 (2019): 1-61.
[41] Kuseh, Simon Wewoliamo, et al. "A Survey of Trust Management Schemes for Social Internet of Things." Inform 7.1 (2022).
[42] Kumar, Rajesh, and Rewa Sharma. "Leveraging blockchain for ensuring trust in IoT: A survey." Journal of King Saud University-Computer and Information Sciences (2021).
[43] Karkazis, Panagiotis, et al. "Evaluation of RPL with a transmission count-efficient and trust-aware routing metric." 2014 IEEE International Conference on Communications (ICC). IEEE, 2014.
[44] Sankar, S., et al. "Trust-Aware Routing Framework for Internet of Things." International Journal of Knowledge and Systems Science (IJKSS) 12.1 (2021): 48-59.
[45] Hashemi, Seyyed Yasser, and Fereidoon Shams Aliee. "Fuzzy, Dynamic and Trust Based Routing Protocol for IoT." Journal of Network & Systems Management 28.4 (2020).
[46] Djedjig, Nabil, et al. "New trust metric for the RPL routing protocol." 2017 8th International Conference on Information and Communication Systems (ICICS). IEEE, 2017.
[47] Djedjig, Nabil, et al. "Trust-aware and cooperative routing protocol for IoT security." Journal of Information Security and Applications 52 (2020): 102467.
[48] Muzammal, Syeda Mariam, Raja Kumar Murugesan, Noor Zaman Jhanjhi, and Low Tang Jung. "SMTrust: proposing trust-based secure routing protocol for RPL attacks for IoT applications." In 2020 International Conference on Computational Intelligence (ICCI), pp. 305-310. IEEE, 2020.
[49] ul Hassan, Temur, et al. "CTrust‐RPL: A control layer‐based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks‐based Internet of Things applications." Transactions on Emerging Telecommunications Technologies 32.3 (2021): e4224.
[50] Patel, Anshuman, and Devesh Jinwala. "A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things." International Journal of Information Security and Privacy (IJISP) 15.4 (2021): 1-17.
[51] Hashemi, Seyyed Yasser, and Fereidoon Shams Aliee. "Dynamic and comprehensive trust model for IoT and its integration into RPL." The Journal of Supercomputing 75.7 (2019): 3555-3584.
[52] Zangeneh, Saeid, and Rassoul Roustaei. "A Novel Approach for Protecting RPL Routing Protocol against Blackhole Attacks in IoT Networks." (2021).
[53] Airehrour, David, Jairo A. Gutierrez, and Sayan Kumar Ray. "SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things." Future Generation Computer Systems 93 (2019): 860-876.
[54] Airehrour, David, Jairo Gutierrez, and Sayan Kumar Ray. "Securing RPL routing protocol from blackhole attacks using a trust-based mechanism." 2016 26th International Telecommunication Networks and Applications Conference (ITNAC). IEEE, 2016.
[55] Prathapchandran, K., and T. Janani. "A Trust-Based Security Model to Detect Misbehaving Nodes in Internet of Things (IoT) Environment using Logistic Regression." Journal of Physics: Conference Series. Vol. 1850. No. 1. IOP Publishing, 2021.
[56] Thubert, Pascal. "Objective function zero for the routing protocol for low-power and lossy networks (RPL)." (2012).
[57] Gnawali, Omprakash, and Philip Levis. "The minimum rank with hysteresis objective function." RFC 6719 (2012).
[58] Amirinasab Nasab, Mehdi, et al. "Energy-efficient method for wireless sensor networks low-power radio operation in internet of things." Electronics 9.2 (2020): 320.
[59] Weng, Jianshu, Chunyan Miao, and Angela Goh. "An entropy-based approach to protecting rating systems from unfair testimonies." IEICE TRANSACTIONS on Information and Systems 89.9 (2006): 2502-2511.
[60] Leloglu, Engin. "A review of security concerns in Internet of Things." Journal of Computer and Communications 5.1 (2016): 121-136.
[61] Abbas, Adeel, et al. "A new ensemble-based intrusion detection system for internet of things." Arabian Journal for Science and Engineering 47.2 (2022): 1805-1819.
[62] Dunkels, Adam, Bjorn Gronvall, and Thiemo Voigt. "Contiki-a lightweight and flexible operating system for tiny networked sensors." 29th annual IEEE international conference on local computer networks. IEEE, 2004.
[63] Tsiftes, Nicolas, Joakim Eriksson, and Adam Dunkels. "Low-power wireless IPv6 routing with ContikiRPL." Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks. 2010.