You are on page 1of 5

Introducing Mobility Metrics in Trust-based

Security of Routing Protocol for Internet of Things


Syeda Mariam Muzammal *Raja Kumar Murugesan NZ Jhanjhi
School of Computer Science and School of Computer Science and School of Computer Science and
Engineering Engineering Engineering
Taylor’s University Taylor’s University Taylor’s University
Subang Jaya, Malaysia Subang Jaya, Malaysia Subang Jaya, Malaysia
syedamariammuzammal@sd.taylors.ed raj akumar. murugesan@taylors.edu.my noorzaman.jhanjhi@taylors. edu.my
u.my
2021 National Computing Colleges Conference (NCCC) | 978-1-7281-6719-0/20/$31.00 ©2021 IEEE | DOI: 10.1109/NCCC49330.2021.9428799

Abstract— Internet of Things (IoT) is flourishing in several connected with each other. The number of IoT-connected
application areas, such as smart cities, smart factories, smart devices is exponentially increasing, as predicted by Statista
homes, smart healthcare, etc. With the adoption of IoT in [2], depicted in Fig. 1. Network security becomes
critical scenarios, it is crucial to investigate its security aspects. challenging when a packet is routed through heterogeneous
All the layers of IoT are vulnerable to severely disruptive networks from resource-constrained devices to a server, over
attacks. However, the attacks in IoT Network layer have a high the Internet. Hence, with the widespread IoT applications
impact on communication between the connected objects. involving routing via RPL, it is imperative to address the
Routing in most of the IoT networks is carried out by IPv6
related attacks. Out of several security solutions proposed for
Routing Protocol for Low-Power and Lossy Networks (RPL).
secure routing, a trust-based approach possesses the
RPL-based IoT offers limited protection against routing
attacks. A trust-based approach for routing security is suitable
significance and viability for IoT networks and routing. A
to be integrated with IoT systems due to the resource- robust security solution w ill enhance protection against
constrained nature of devices. This research proposes a trust- attacks and facilitate the overall widescale adoption of IoT
based secure routing protocol to provide security against applications.
packet dropping attacks in RPL-based IoT networks. IoT This research work proposes a trust-based approach for
networks are dynamic and consist of both static and mobile routing security against packet dropping attacks in RPL. IoT
nodes. Hence the chosen trust metrics in the proposed method
network is dynamic that includes both static and mobile
also include the mobility-based metrics for trust evaluation.
nodes. Therefore, the mobility-based metrics are combined
The proposed solution is integrated into RPL as a modified
objective function, and the results are compared with the with the trust-based metrics to make the solution adaptable to
default RPL objective function, MRHOF. The analysis and the mobile IoT environment. Simulation experiments are
evaluation of the proposed protocol indicate its efficacy and conducted for evaluation of the proposed security solution
adaptability in a mobile IoT environment. and performance comparison with the default RPL objective
function (OF), Minimum Rank with Hysteresis Objective
Keywords—Internet of Things, Trust, Mobility, RPL, Security Function (m Rh OF).
The paper is organized as follows: Section II describes
I. I n t r o d u c t io n the background of the considered problem domain and the
Due to the expansion of digital and technological related work. Section III describes the materials and methods
paradigm, billions of heterogeneous IoT devices have been for the proposed solution. Section IV presents the results and
predicted by researchers for the upcoming years [1][2]. discussions. Finally, Section V concludes the paper.
Additionally, there have been some attacks in previous years,
such as Mirai Botnet attacks [3] and various others [4][5][6], II. B a c k g r o und and Re l at ed Wo r k
that were made possible using the low-powered and
This section describes the related work with respect to
resource-constrained IoT devices. IoT networks are
the background of the problem under consideration. In
vulnerable to several attacks. Most of the IoT applications
addition, trust-based approaches in the existing literature for
employ RPL routing protocol for routing. RPL routing
securing IoT networks and routing are summarized.
protocol is also prone to numerous disruptive attacks,
including Blackhole, Sinkhole, Wormhole, Rank, and A typical IoT architecture is composed of five layers
Version number modification attacks [7]. The packet [10]. These include the perception/ sensing layer, network/
dropping attacks in RPL cause the unavailability of data and transmission layer, middleware/ transport layer, application
resources. Such attacks need to be investigated to provide layer, and data/ cloud services. IoT layers suffer from various
secure communication among the connected nodes [8]. In security attacks [11], including Node capturing, Denial of
addition, it is crucial to provide a solution for the overall Service [12], Fake node or Sybil attack [13], Replay attack
security enhancement of IoT systems [9] to fulfil the [14], Side-channel attack [15] and routing threats in the data
requirements of the security triad, that is, confidentiality, forwarding process [16]. Fig. 2 shows the classification of
integrity, and availability (CIA). IoT network layer attacks.
One of the important components of IoT is networking, IoT network layer is composed of a layered protocol
which facilitates communication and interconnectivity. stack [17]. It consists of various communication and
Particularly, routing holds a prominent place, which involves connectivity protocols. IPv6 over Low-Power Wireless
building traffic routes for transmitting a packet from source Personal Area Network (6LoWPAN) is introduced by
to destination. Moreover, the security issues are crucial in Internet Engineering Task Force (IETF) for wireless
networks, specifically routing, when billions of devices are connectivity between resource-constrained devices. RPL is

*Corresponding Author
978-1-7281-6719-0/20/$31.00 ©2021 IEEE

Authorized licensed use limited to: Carleton University. Downloaded on June 04,2021 at 20:48:41 UTC from IEEE Xplore. Restrictions apply.
30

2S.44

2019 2020* 2021* 2022* 2023* 2024* 2025* 2026* 2027* 2023' 2029* 2030*

Fig. 1. Number of IoT Connected Devices Worldwide, from Year 2019 to 2030 [2]

the routing protocol specified by IETF for Low-power and protocol, considering the direct and recommended trust
Lossy Networks (LLNs) [18]. RPL is vulnerable to several metrics for evaluation. Their proposed solution is promising
disruptive attacks. The packet dropping attacks are in detecting the attacks. However, the focus of the evaluation
considered among the most disruptive attacks affecting the is only on static topologies, such as smart home applications.
availability of data and resources in the network. Similarly, [29] proposed a trust-aware and cooperative
secure routing with an IDS-based attack detection
Several solutions for secure routing and networks have
mechanism. Likewise, CTrust-RPL [23] has been proposed
been proposed in the existing literature, including machine
as an energy-efficient trust-based method for IoT routing
learning, intrusion detection, intrusion prevention, trust-
security. In their approach, the trust evaluation is based on
based, cryptographic, and blockchain-based techniques the forwarding behavior of the nodes.
[19] [20] [21] [22] [23] [24] [25] [26]. Trust-based secure routing
solutions are feasible because of the easy implementation From a security perspective in an IoT environment, the
and deployment of low-powered but smart objects in IoT selection of trust metrics plays a crucial role. Most of the
ecosystems [27]. existing methods only cover static nodes, except for one
trust-based study, DCTM [30], that covers mobile nodes, but
In [28], the authors propose a trust-aware secure routing
it considers only sender nodes and not the sink nodes for
evaluation. In reality, IoT networks are dynamic that include
Credentials breaches both static as well as mobile nodes.
Phishine Site Attack
Data breaches
The proposed solution considers the mobility metrics for
Access Attack Advanced Persistent Attack trust computation to make the approach suitable for mobile
Data and Information Stealing IoT environments. In addition, the evaluation is done for
L/O j JJU O o A tta c K Flooding Attacks (target server)
static as well as mobile nodes in the network. Furthermore,
ro the results are compared with the default RPL objective
Weak Configuration
function, MRHOF.
Data Transit Attack Sybil Attacks
Hello Hood Attacks
III. M a t e r ia l s a n d Met h o d s f or Pr o po sed So l u t io n
Routine Attacks Greyhole
K Fig. 3 depicts the process flow and preliminary model of
Selective Forwarding
proposed trust-based solution for routing security in IoT. The
Sinkhole selected trust metrics include the success rate, energy level,
Network Intrusion
“ Wormhole historical observations, and recommended trust. In addition,
Blackhole we introduce mobility-based metrics for trust evaluation,
Man-in-the-Middle which include mobility of node, as well as the location and
Packet Sniffers
— Traffic Analysis Attacks I Port Scanning
link stability. The selected trust-based metrics have been
carefully chosen to make the solution adaptable to a mobile
IoT environment, including the mobile sink and sender nodes
RFID Signal Spoofing
Alteration & Spoofing in the network. The trust index is rated based on fuzzy
Rank Attack
judgment, and only the reliable nodes are selected for
Replay Attack routing, based on the trust threshold. The trust index is then
Rank Hash Chain Forgery' forwarded to the parent selection algorithm in the objective
function of the routing protocol, along with the rank and
ETX values.
Fig. 2. Attacks in IoT Network Layer

Authorized licensed use limited to: Carleton University. Downloaded on June 04,2021 at 20:48:41 UTC from IEEE Xplore. Restrictions apply.
The packet dropping attack is detected via the calculated
trust index of the nodes as well as the success rate of the IV. Re s u l t s and D i s c u s s io n
nodes in the network. The trust calculation has been ContikiOS/Cooja simulator has been used for the
simplified for less power consumption. A malicious list is simulation experiments. A topology of 30 nodes has been
maintained for the untrusted nodes in the network. These generated with one sink node, twenty-six sender nodes, and
suspicious nodes are not forwarded for routing traffic in the three attacker nodes in the network. For the mobile scenarios,
topology and thus are isolated from the network. In this way, a ratio of 1:3 has been kept for mobile to static nodes. The
only the trustworthy nodes take part in the routing decisions proposed solution is evaluated for three different scenarios,
and data forwarding. Further details of the proposed model including static nodes, mobile sender nodes, and mobile sink
can be found in our previous work [31]. In the next section, node in the network. In addition, the network performance
we present the results analysis of the proposed solution. has been evaluated in terms of throughput, packet loss rate,
average power consumption, and topology stability.
For the proposed solution, as indicated by Fig. 4,
throughput shows an increase of 2.18 kbps, 2.47 kbps, and
2.22 kbps than MRHOF, under static, mobile senders, and
mobile sink scenarios, respectively. Similarly, the packet loss
rate of the proposed oF is much less as compared to
MRHOF, that is, 16%, 17.9%, and 26.6%. Whereas MRHOF
exhibits a packet loss rate of more than 75% for all three
scenarios, as observed from Fig. 5.
The topology stability in the network is determined by
the frequency of node rank changes. The graphical
representation in Fig. 6 indicates that in MRHOF, nodes
frequently change their parents under the attack scenario.
Whereas with the proposed OF, the frequency of nodes rank
and parent change has reduced significantly. The average
Fig. 4. Comparison of Average Throughput (kbps)
power consumption of the proposed solution under packet

Packet Loss Rate

o
Static Mobile Senders Mobile Sink

MRHOF Proposed OF

Fig. 6. Comparison of Frequency of Nodes Rank Change (Topology


Fig. 5. Comparison of Packet Loss Rate (%) Stability)

Authorized licensed use limited to: Carleton University. Downloaded on June 04,2021 at 20:48:41 UTC from IEEE Xplore. Restrictions apply.
dropping attacks is 1.19 mW, 1.39 mW, and 1.55 mW, with Re f e r en c es
a difference of 0.04, 0.05, and 0.05, for static, mobile
senders, and mobile sink scenarios, respectively, as [1] L. Horwitz, “ lnternet of Things (loT) - The future of loT
compared to MRHOF (Fig. 7). The small difference in power miniguide: The burgeoning loT market continues - Cisco,” Cisco,
consumption is due to the trust computations in proposed 2019. [Online]. Available:
OF, and frequent parent selection and rank computations in https://www.cisco.com/c/en/us/solutions/internet-of-
MRHOF. Moreover, MRHOF does not possess a protection things/future-of-iot.html. [Accessed: 25-May-2020].
mechanism and uses only the ETX metric for parent [2] Statista, “Number of connected devices worldwide 2030 |
Statista,” Statista Research Department, 22-Jan-2021. [Online].
selection. Available: https://www.statista.com/statistics/802690/worldwide-
The graphical analysis for comparison of results indicates connected-devices-by-access-technology/. [Accessed: 27-Jan-
2021].
that the proposed solution significantly outperforms
[3] Josh Fruhlinger, “ The Mirai botnet explained: How loT devices
MRHOF. It is evident that the proposed solution's almost brought down the internet | CSO Online,” CSO, 2018.
performance is better in mobile scenarios, thus indicating the [Online]. Available:
importance of mobility metrics for a trust-based security https://www.csoonline.com/article/3258748/securi1y/the-mirai-
solution in loT. botnet-explained-how-teen-scammers-and-cctv-cameras-almost-
brought-down-the-internet.html. [Accessed: 01-Dec-2018].
[4] A. J. Ferrante, “ Battening Down for the Rising Tide of loT
Risks,” ISSA J., vol. 15, no. 8, pp. 20-24, 2017.
[5] ClSCO, “ Cisco’s Talos lntelligence Group Blog: New VPNFilter
malware targets at least 500K networking devices worldwide,”
CISCO, 2018. [Online]. Available:
https://blog.talosintelligence.com/2018/05/VPNFilter.html.
[Accessed: 16-Dec-2018].
[6] C. Osborne, “ Over a dozen vulnerabilities uncovered in BMW
vehicles | ZDNet,” Zero Day, 2018. [Online]. Available:
https://www.zdnet.com/article/over-a-dozen-vulnerabilities-
uncovered-in-bmw-vehicles/. [Accessed: 17-Apr-2019].
[7] Fatima-Tuz-Zahra, N. Z. Jhanjhi, S. N. Brohi, and N. A. Malik,
“ Proposing a Rank and Wormhole Attack Detection Framework
using Machine Learning,” in MACS 2019 - 13th International
Conference on Mathematics, Actuarial Science, Computer
Science and Statistics, Proceedings, 2019.
[8] S. J. Hussain, M. lrfan, N. Z. Jhanjhi, K. Hussain, and M.
Fig. 7. Comparison of Average Power Consumption (mW)
Humayun, “ Performance Enhancement in Wireless Body Area
Networks with Secure Communication,” Wirel. Pers. Commun.,
vol. 116, no. 1, pp. 1-22, Jan. 2021.
V. Co n c l u s io n a n d Fu t ur e Wo r k [9] A. J. C. Sunder and A. Shanmugam, “ Jensen-Shannon
Divergence Based lndependent Component Analysis to Detect
loT is flourishing in various application scenarios, thus and Prevent Black Hole Attacks in Healthcare WSN,” Wirel.
facilitating human lives from mundane tasks to the industrial, Pers. Commun., vol. 107, no. 4, pp. 1607-1623, Aug. 2019.
agricultural, and transportation sectors. The security and [10] H. Mrabet, S. Belguith, A. Alhomoud, and A. Jemai, “ A Survey
privacy concerns are hindering the rapid growth of loT of loT Security Based on a Layered Architecture of Sensing and
paradigm. Thus, it is imperative to address the security Data Analysis,” Sensors, vol. 20, no. 13, p. 3625, Jun. 2020.
attacks, threats, and risks, for loT’s widescale adoption. loT [11] M. El-hajj et al., “ A Survey of lnternet of Things (loT)
network layer is the backbone of communication and Authentication Schemes,” Sensors, vol. 19, no. 5, p. 1141, Mar.
connectivity of smart objects in loT systems. Routing in 2019.
most loT applications is carried out by RPL routing protocol. [12] M. Anirudh, S. A. Thileeban, and D. J. Nallathambi, “Use of
honeypots for mitigating DoS attacks targeted on loT networks,”
RPL is prone to several attacks. The packet dropping attacks in 2017 International Conference on Computer, Communication
are severely disruptive, obstructing the successful delivery of and Signal Processing (ICCCSP), 2017, pp. 1-4.
information and disturbing the network topology. ln this [13] D. Evangelista, F. Mezghani, M. Nogueira, and A. Santos,
research work, packet dropping attack is addressed by “ Evaluation of Sybil attack detection approaches in the lnternet
proposing a trust-based secure routing protocol. Trust of Things content dissemination,” in 2016 Wireless Days (WD),
metrics, including the mobility metrics, are selected. The 2016, pp. 1-6.
trust evaluation mechanism is embedded in RPL as part of [14] SeungJae Na, DongYeop Hwang, WoonSeob Shin, and Ki-
the objective function for trustworthy parent selection. The Hyung Kim, “ Scenario and countermeasure for replay attack
using join request messages in LoRaWAN,” in 2017
results indicate that our proposed solution performs better International Conference on Information Networking (ICOIN),
than the default RPL objective function MRHOF. 2017, pp. 718-720.
[15] L. A. Tawalbeh and T. F. Somani, “ More secure lnternet of
ln the future work for this research, we plan to evaluate the
Things using robust encryption algorithms against side channel
proposed trust model for other RPL attacks, including attacks,” in 2016 IEEE/ACS 13th International Conference o f
colluding attacks. The performance evaluation w ill also be Computer Systems andApplications (AICCSA), 2016, pp. 1-6.
extended to other parameters, such as end-to-end delays. [16] D. Airehrour, J. Gutierrez, and S. K. Ray, “ A Lightweight Trust
Design for loT Routing,” in 2016 IEEE 14th Intl Conf on
Ac k n o w l e d g me n t Dependable, Autonomic and Secure Computing, 14th Intl Conf
on Pervasive Intelligence and Computing, 2nd Intl Conf on Big
This research work is supported by Taylor’s University, Data Intelligence and Computing and Cyber Science and
Malaysia, through its Taylor’s PhD Scholarship Programme. Technology Congress(DASC/PiCom/DataCom/CyberSciTech),
2016, pp. 552-557.
[17] O. Bello, S. Zeadally, and M. Badra, “Network layer inter­

Authorized licensed use limited to: Carleton University. Downloaded on June 04,2021 at 20:48:41 UTC from IEEE Xplore. Restrictions apply.
operation of Device-to-Device communication technologies in Computing, Communication and Automation, ICACCA 2018,
Internet of Things (loT),” Ad Hoc Networks, vol. 57, pp. 52-62, 2018.
Mar. 2017. [25] X. Guo, H. Lin, Z. Li, and M. Peng, “ Deep-Reinforcement­
[18] T. Winter et al., “RFC 6550 - RPL: IPv 6 Routing Protocol for Learning-Based QoS-Aware Secure Routing for SDN-loT,” IEEE
Low-Power and Lossy Networks,” Mar. 2012. Internet Things J., vol. 7, no. 7, pp. 6242-6251, Dec. 2019.
[19] S. M. Muzammal, M. A. Shah, S. J. Zhang, and H. J. Yang, [26] G. Ramezan and C. Leung, “ A Blockchain-Based Contractual
“ Conceivable security risks and authentication techniques for Routing Protocol for the lnternet of Things Using Smart
smart devices: A comparative evaluation of security practices,” Contracts,” Wirel. Commun. Mob. Comput., vol. 2018, pp. 1-14,
Int. J. Autom. Comput., vol. 13, no. 4, pp. 350-363, Aug. 2016. Nov. 2018.
[20] Z. A. Almusaylim, A. Alhumam, and N. Z. Jhanjhi, “ Proposing a [27] S. M. Muzammal et al., “ Counter measuring conceivable security
Secure RPL based lnternet of Things Routing Protocol: A threats on smart healthcare devices,” IEEE Access, vol. 6, pp.
Review,” Ad Hoc Networks, vol. 101, p. 102096, Apr. 2020. 20722-20733, Apr. 2018.
[21] S. M. Muzammal, R. K. Murugesan, and N. Z. Jhanjhi, “ A [28] D. Airehrour, J. Gutierrez, and S. K. Ray, “ SecTrust-RPL: A
Comprehensive Review on Secure Routing in lnternet of Things: secure trust-aware RPL routing protocol for lnternet of Things,”
Mitigation Methods and Trust-based Approaches,” IEEE Internet Futur. Gener. Comput. Syst., 2018.
Things J., pp. 1-1, Oct. 2020. [29] N. Djedjig, D. Tandjaoui, F. Medjek, and l. Romdhani, “ Trust­
[22] D. B.D. and F. Al-Turjman, “ A hybrid secure routing and aware and cooperative routing protocol for loT security,” J. Inf.
monitoring mechanism in loT-based wireless sensor networks,” Secur. Appl., vol. 52, p. 102467, Jun. 2020.
Ad Hoc Networks, vol. 97, p. 102022, Feb. 2020. [30] S. Y. Hashemi and F. Shams Aliee, “ Dynamic and
[23] T. ul Hassan, M. Asim, T. Baker, J. Hassan, and N. Tariq, comprehensive trust model for loT and its integration into RPL,”
“ CTrust-RPL: A control layer-based trust mechanism for J. Supercomput., vol. 75, no. 7, pp. 3555-3584, Jul. 2019.
supporting secure routing in routing protocol for low power and [31] S. M. Muzammal, R. K. Murugesan, N. Z. Jhanjhi, and L. T.
lossy networks-based lnternet of Things applications,” Trans. Jung, “ SMTrust: Proposing Trust-Based Secure Routing Protocol
Emerg. Telecommun. Technol., p. e4224, Jan. 2021. for RPL Attacks for loT Applications,” in 2020 International
[24] S. M. Muzammal and R. K. Murugesan, “ A Study on Leveraging Conference on Computational Intelligence (ICCI), 2020, pp.
Blockchain Technology for loT Security Enhancement,” in 305-310.
Proceedings - 2018 4th International Conference on Advances in

Authorized licensed use limited to: Carleton University. Downloaded on June 04,2021 at 20:48:41 UTC from IEEE Xplore. Restrictions apply.

You might also like