Metric Routing Protocol for Detecting Untrustworthy Nodes for Packet Transmission
PDF

Keywords

Cooperation enforcement
Game Theory
Trust Management
Internet of Things
Secure Routing
RPL

How to Cite

Metric Routing Protocol for Detecting Untrustworthy Nodes for Packet Transmission. (2021). Journal of Information Technology and Digital World, 3(2), 67-76. https://doi.org/10.36548/jitdw.2021.2.001

Abstract

IoT objects that have a resource constrained nature resulting in a number of attacks in the routing protocol for lossy networks and low-power networks. RPL is very vulnerable to selfish behaviours and internal attacks though they are built with encryption protection to secure messages. To address this vulnerability, in this paper, we propose a novel trustworthiness methodology based on metric for incorporating trust evaluation, enhancing the robustness of security mechanism. Simulation results indicate that the proposed work is efficient in terms of throughput, nodes' rank changes, energy consumption and packet delivery ratio. Moreover, using mathematical modelling, it has been observed that this methodology meets the demands of loop-freeness, optimality and consistency. This shows that this metic has both monotonicity and isotonicity requirements to enable the routing protocol. Incorporating the concepts of game theory, we can use this technique as a strategy to iterate Prisoner's Dilemma. Both evolutionary simulation and mathematical analysis indicate that the proposed metric-based routing protocol is an efficient technique in promoting evolution and stability of the IoT network.

PDF

References

Machado, K., Rosário, D., Cerqueira, E., Loureiro, A. A., Neto, A., & De Souza, J. N. (2013). A routing protocol based on energy and link quality for internet of things applications. sensors, 13(2), 1942-1964.

Behera, T. M., Mohapatra, S. K., Samal, U. C., Khan, M. S., Daneshmand, M., & Gandomi, A. H. (2019). I-SEP: An improved routing protocol for heterogeneous WSN for IoT-based environmental monitoring. IEEE Internet of Things Journal, 7(1), 710-717.

Chze, P. L. R., & Leong, K. S. (2014, March). A secure multi-hop routing for IoT communication. In 2014 IEEE World forum on internet of things (WF-iot) (pp. 428-432). IEEE.

Vaiyapuri, T., Parvathy, V. S., Manikandan, V., Krishnaraj, N., Gupta, D., & Shankar, K. (2021). A Novel Hybrid Optimization for Cluster‐Based Routing Protocol in Information-Centric Wireless Sensor Networks for IoT Based Mobile Edge Computing. Wireless Personal Communications, 1-24.

Zhu, M., Chang, L., Wang, N., & You, I. (2020). A smart collaborative routing protocol for delay sensitive applications in industrial IoT. IEEE Access, 8, 20413-20427.

Kavitha, V. (2021). Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment. Peer-to-Peer Networking and Applications, 14(2), 821-836.

Senthilkumar, M., Kavitha, V. R., Kumar, M. S., Raj, P. A. C., & Shirley, D. R. A. (2021, March). Routing in a Wireless Sensor Network using a Hybrid Algorithm to Improve the Lifetime of the Nodes. In IOP Conference Series: Materials Science and Engineering (Vol. 1084, No. 1, p. 012051). IOP Publishing.

Serhani, A., Naja, N., & Jamali, A. (2020). AQ-Routing: mobility-, stability-aware adaptive routing protocol for data routing in MANET–IoT systems. Cluster Computing, 23(1), 13-27.

Sankar, S., Srinivasan, P., Luhach, A. K., Somula, R., & Chilamkurti, N. (2020). Energy-aware grid-based data aggregation scheme in routing protocol for agricultural internet of things. Sustainable Computing: Informatics and Systems, 28, 100422.

Hameed, A. R., ul Islam, S., Raza, M., & Khattak, H. A. (2020). Towards energy and performance aware geographic routing for IoT enabled sensor networks. Computers & Electrical Engineering, 85, 106643.

Sugave, S., & Jagdale, B. (2020). Monarch-EWA: Monarch-Earthworm-Based Secure Routing Protocol in IoT. The Computer Journal, 63(6), 817-831.

Bhalaji, N. (2020). A Novel Hybrid Routing Algorithm with Two Fish Approach in Wireless Sensor Networks. Journal of trends in Computer Science and Smart technology (TCSST), 2(03), 134-140.

Shakya, S., & Pulchowk, L. N. (2020). The Robust Routing Protocol with Authentication for Wireless Adhoc Networks. Journal of ISMAC, 2(02), 83-95.

Shakya, S., & Pulchowk, L. N. (2020). The Robust Routing Protocol with Authentication for Wireless Adhoc Networks. Journal of ISMAC, 2(02), 83-95.