Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Jun 16;22(12):4539.
doi: 10.3390/s22124539.

Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security

Affiliations

Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security

Umer Farooq et al. Sensors (Basel). .

Abstract

Recently, the Internet of Things (IoT) has emerged as an important way to connect diverse physical devices to the internet. The IoT paves the way for a slew of new cutting-edge applications. Despite the prospective benefits and many security solutions offered in the literature, the security of IoT networks remains a critical concern, considering the massive amount of data generated and transmitted. The resource-constrained, mobile, and heterogeneous nature of the IoT makes it increasingly challenging to preserve security in routing protocols, such as the routing protocol for low-power and lossy networks (RPL). RPL does not offer good protection against routing attacks, such as rank, Sybil, and sinkhole attacks. Therefore, to augment the security of RPL, this article proposes the energy-efficient multi-mobile agent-based trust framework for RPL (MMTM-RPL). The goal of MMTM-RPL is to mitigate internal attacks in IoT-based wireless sensor networks using fog layer capabilities. MMTM-RPL mitigates rank, Sybil, and sinkhole attacks while minimizing energy and message overheads by 25-30% due to the use of mobile agents and dynamic itineraries. MMTM-RPL enhances the security of RPL and improves network lifetime (by 25-30% or more) and the detection rate (by 10% or more) compared to state-of-the-art approaches, namely, DCTM-RPL, RBAM-IoT, RPL-MRC, and DSH-RPL.

Keywords: Internet of Things; RPL; Sybil attack; mobile agent; rank attack; sinkhole attack; trust.

PubMed Disclaimer

Conflict of interest statement

The authors declare that there is no conflict of interest.

Figures

Figure 1
Figure 1
Proposed device and control layers.
Figure 2
Figure 2
Topology discovery in RPL.
Figure 3
Figure 3
Workflow of the proposed MMTM-RPL framework. The numbers in the figure represent the steps taken for malicious node detection and isolation.
Figure 4
Figure 4
Comparison of network lifetime for different attacks: (a) Rank attack, (b) Sybil attack, and (c) Sinkhole attack.
Figure 4
Figure 4
Comparison of network lifetime for different attacks: (a) Rank attack, (b) Sybil attack, and (c) Sinkhole attack.
Figure 5
Figure 5
Comparison of average residual energy for different attacks: (a) Rank attack, (b) Sybil attack, and (c) Sinkhole attack.
Figure 5
Figure 5
Comparison of average residual energy for different attacks: (a) Rank attack, (b) Sybil attack, and (c) Sinkhole attack.
Figure 6
Figure 6
Comparison of control message overhead for different attacks: (a) Rank attack, (b) Sybil attack, and (c) Sinkhole attack.
Figure 6
Figure 6
Comparison of control message overhead for different attacks: (a) Rank attack, (b) Sybil attack, and (c) Sinkhole attack.
Figure 7
Figure 7
Comparison of attack detection rate for different attacks: (a) Rank attack, (b) Sybil attack, and (c) Sinkhole attack.
Figure 8
Figure 8
Comparison of attack detection time for different attacks: (a) Rank attack, (b) Sybil attack, and (c) Sinkhole attack.
Figure 9
Figure 9
Comparison of end-to-end delay for different attacks: (a) Rank attack, (b) Sybil attack, and (c) Sinkhole attack.
Figure 10
Figure 10
Overview of results for the different frameworks: (a) Network lifetime, (b) Average residual energy, (c) Control message overhead, (d) Attack detection rate, (e) Attack detection time, (f) End-to-end delay.

References

    1. Tariq N., Asim M., Khan F.A., Baker T., Khalid U., Derhab A. A blockchain-based multi-mobile code-driven trust mechanism for detecting internal attacks in internet of things. Sensors. 2021;21:23. doi: 10.3390/s21010023. - DOI - PMC - PubMed
    1. Cohen A.E., Jiang G.G., Heide D.A., Pellegrini V., Suri N. Radio frequency IoT sensors in military operations in a smart city; Proceedings of the MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM); Angeles, CA, USA. 29–31 October 2018; pp. 763–767.
    1. Pittman J. Forget the Consumer Internet of Things: IIoT Is Where It’s Really At. [(accessed on 1 May 2022)]. Available online: https://www.ge.com/news/reports/forget-consumer-internet-things-iiot-really.
    1. Dighriri M., Lee G.M., Baker T. Technology for Smart Futures. Springer; Berlin/Heidelberg, Germany: 2017. Measurement and Classification of Smart Systems Data Traffic Over 5G Mobile Networks; pp. 195–217. - DOI
    1. Pu C. Sybil attack in RPL-based internet of things: Analysis and defenses. IEEE Internet Things J. 2020;7:4937–4949. doi: 10.1109/JIOT.2020.2971463. - DOI

LinkOut - more resources