A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem

11/21/2020
by   Mina Zaminkar, et al.
0

Internet of Things (IoT) provides the possibility for milliards of devices throughout the world to communicate with each other, and data is collected autonomously. The big data generated by the devices should be managed securely. Due to security challenges, like malicious nodes, many approaches cannot respond to these concerns. In this paper, a robust hybrid method, including encryption, is used as an efficient approach for resolving the RPL protocol concerns so that the devices are connected securely. Therefore, the proposed DSH-RPL method for securing the RPL protocol comprises the four following phases: The first phase creates a reliable RPL. The second phase detects the sinkhole attack. The third phase quarantines the detected malicious node, and the fourth phase transmits data through encryption. The simulation results show that the DSH-RPL reduces the false-positive rate more than 18.2 reduces the false-negative rate more than 16.1 the packet delivery rate more than 19.68 detection rate more than 26

READ FULL TEXT
research
02/19/2021

Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem

The Internet of Things (IoT) ecosystem allows communication between bill...
research
03/31/2021

A Lightweight and Scalable Physical Layer Attack Detection Mechanism for the Internet of Things (IoT) Using Hybrid Security Schema

The Internet of Things, also known as the IoT, refers to the billions of...
research
05/17/2020

SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism

Through the Internet of Things (IoT) the internet scope is established b...
research
11/03/2020

Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles

Unmanned aerial vehicles (UAVs) can be deployed to monitor very large ar...
research
09/17/2019

Machine Learning based IoT Edge Node Security Attack and Countermeasures

Advances in technology have enabled tremendous progress in the developme...
research
11/19/2019

A Game-Theoretic Approach for Enhancing Security and Data Trustworthiness in IoT Applications

Wireless sensor networks (WSNs)-based internet of things (IoT) are among...

Please sign up or login with your details

Forgot password? Click here to reset