Sie sind auf Seite 1von 5

Link reliable and Trust aware RPL routing protocol for Internet of

Things

Asma LAHBIB∗ , Khalifa Toumi∗ , Sameh Elleuch† , Anis Laouiti∗ ,and Steven Martin‡
∗ SAMOVAR, Télécom SudParis, CNRS, Université Paris-Saclay, 9 rue Charles Fourier 91011 Evry, France.
Email: {asma.lahbib, khalifa.toumi, anis.laouiti}@telecom-sudparis.eu
† École nationale des sciences de l’informatique, Campus Universitaire de la Manouba, 2010 Manouba, Tunisie
Email: sameh.elleuch@ensi-uma.tn
‡ LRI, Université Paris-Sud, 15 Rue Georges Clemenceau, 91400 Orsay, France.
Email: steven.martin@lri.fr

Abstract— Internet of Things (IoT) is characterized by challenges posed by these networks (i.e. lossy links, high
heterogeneous devices that interact with each other on Packet Error Rate (PER), link outages, constrained nodes,
a collaborative basis to fulfill a common goal. In this
and scare energy resources, etc.). However, their inherent
scenario, some of the deployed devices are expected to be
constrained in terms of memory usage, power consumption constraints and their exposure to varied risks and security
and processing resources. To address the specific proper- attacks have turned the design of RPL challenging especially
ties and constraints of such networks, a complete stack of since the proposed security specifications in [6] do not address
standardized protocols has been developed, among them all possible attacks that may compromise the RPL network
the Routing Protocol for Low-Power and lossy networks
(RPL). However, this protocol is exposed to a large variety security. In this context, several solutions [8], [9] have been
of attacks from the inside of the network itself. To fill this proposed in an attempt to bring some enhancements to
gap, this paper focuses on the design and the integration of the RPL standard specification and to meet the Quality of
a novel Link reliable and Trust aware model into the RPL Service (QoS) requirements of these networks. However, little
protocol. Our approach aims to ensure Trust among enti-
attention have been paid to the security concept and just some
ties and to provide QoS guarantees during the construction
and the maintenance of the network routing topology. Our works [16], [17], [18] have incorporated the Trust management
model targets both node and link Trust and follows a aspect within the RPL routing procedures.
multidimensional approach to enable an accurate Trust In this direction, this work focuses mainly on the Trust
value computation for IoT entities. To prove the efficiency aspect of RPL. We propose some enhancements in order to
of our proposal, this last has been implemented and tested
successfully within an IoT environment. Therefore, a set ensure Trust among entities and to provide QoS guarantees
of experiments has been made to show the high accuracy during the construction and the maintenance of the routing
level of our system. topology. To deal with the different characteristics of IoT
Index Terms— Trust model, RPL, IoT, Energy efficiency, networks, this paper proposes LT-RPL, a novel Link reliable
QoS, Security.
and Trust aware model for RPL protocol. Such model follows
a multidimensional approach to enable an accurate Trust
I. INTRODUCTION
value computation for IoT entities.
As an emerging technology, the Internet of Things (IoT) is In particular, unlike previous models that usually only con-
expected to offer promising solutions to potentially transform sider experience and reputation parameters to evaluate Trust,
and revolutionize the services provided by various application this model uses security aspects, QoS factors and energy
domains. This paradigm could be defined as the integration of considerations in addition to the reputation parameters which
the physical world with the digital, cyber, and virtual worlds are used by network entities to assess the Trustworthiness
on a global scale. The requirement of remote sensing makes of their neighboring ones. Thereafter, the proposed model
sensor networks and low power personal area networks one has been implemented and integrated into the RPL topology
of the key enabling technologies of IoT [1], [2], [3]. These construction and maintenance phases. Thus a set of evalua-
networks present several challenges, especially in communi- tion results are analyzed and discussed to demonstrate the
cation and networking due to their inherent constraints (i.e. feasibility of LT-RPL.
scare resources, limited capabilities, etc.). For this reason, The remainder of this paper is structured as follows. Section
many IoT standards were proposed, among them the ipv6 2 discusses the related proposals regarding Trust models for
over LOW power wireless Personal Area Networks (6lowPAN) routing protocols. Thereafter, Section 3 provides a brief de-
adaptation layer introduced by the 6LoWPAN IETF group [4] scription of the network model. Section 4 provides an overview
to make IPv6 addressing appropriate for low power wireless of the proposed scheme and the main blocks it relies on, it
networks [4], [5]. Taking into consideration the specification delves then into the integration of the proposed scheme within
of 6LoWPAN, an increasing need for an efficient routing RPL. In Section 5, a set of experimental results validating our
protocol for 6LoWPAN-compliant IoT networks has arisen. approach are shown, and finally in Section 6, the paper ends
To address this gap, the IETF ROLL working group [6], up with some conclusions and an outlook of the envisaged
[7] has proposed a routing protocol, referred to as Routing future work.
Protocol for Low power and lossy networks (RPL).
This protocol was specially designed to overcome the different
978-1-5386-1465-5/17/$31.00 2017
c IEEE
II. Review of existing works tecture and the nature of the nodes to be involved as well.
Afterwards, a representation of the important properties to
In the context of IoT, we found RPL as the main candidate
be considered within the proposed scheme will be given within
for acting as the standard routing protocol for IoT based
the problem statement paragraph.
networks and more specifically for LLN networks [10], [11].
Current works regarding RPL have focused on performance A. Overview on the RPL routing protocol
evaluation [12], [13] and just few ones have addressed its
RPL is an IPv6 routing protocol specifically designed for
security aspects [14], [15]. In fact, this protocol originally
LLNs with very limited resources in terms of energy, computa-
provides support for integrity, confidentiality and authentic-
tion and bandwidth. This protocol mainly targets collection-
ity of messages [10] and it has basically three basic secu-
based networks made up of nodes interconnected according
rity modes namely unsecured, preinstalled and authenticated
to a specific topology called Destination Oriented Directed
modes. However, even RPL is expected to support message
Acyclic Graphs (DODAG), where most popular destination
confidentiality, integrity and authenticity, its security may be
nodes (i.e. sinks) or those providing a default route to the
compromised and it remains exposed to various threats and
Internet (i.e. gateways) act as the roots of the Directed
attacks [15].
Acyclic Graphs (DAGs). Within each DODAG each node is
To secure the communication in an RPL-based network,
assigned a rank representing its position in the graph. Its
authors in [16] made use of the Trusted Platform Module
computation depends on a set of specific routing metrics (e.g.
(TPM) based approach to establish the nodes Trust before
delay, link quality, throughput, etc.). The translation of these
exchanging keying material. However, the Trustworthiness
metrics into ranks is based on an Objective Function (OF)
assessment was considered only for the keys exchange mech-
responsible for rank computation and parent selection. The
anism to verify the identity of the keys suppliers and not for
DODAG construction and maintenance phases are based on
the routing path selection and establishment.
a set of control messages namely DODAG Information Object
In [17], authors have proposed Trusted-RPL in order to
(DIO), DODAG Information Solicitation (DIS), Destination
strengthen the RPL protocol by adding a new Trust metric
Advertisement Object (DAO) and Destination Advertisement
based on the evaluation of the neighboring nodes’ behav-
Object Acknowledgement (DAO-ACK) messages.
iors during the construction and the maintenance of RPL
instances using selfishness, energy, and honesty components. B. System model
However, they had not considered the Trust value along the 1) Network model
path nor proven the defense of the proposed scheme against We consider an IoT network consisting of several groups
the routing attacks that could be launched. made up by a set of smart objects randomly scattered in a
In [18], authors have presented SecTrust, a lightweight SE- circular network. Each object has a Trust Manager which is
Cure Trust-based routing framework for IoT. The Trust an entity in charge of assessing the Trustworthiness degree of
evaluation is based specifically on the successful interactions another object or link according to the proposed model in Sec.
between IoT nodes and its calculation is based on some IV. For the constrained objects (i.e., wireless sensors, RFID
metrics such as the prospect of the positive interactions, the readers, etc.), the Trust manager is assumed to be deployed
nodes’ satisfaction and their energy level as well. However, in another powerful network entity. Furthermore, each group
although the proposed framework was designed to isolate is monitored by a monitoring and analysis tool that captures
common routing attacks, its effectiveness under these threats the 6LowPAN traffic, renders the network state and identifies
has not been proven nor evaluated. the abnormal behaviors related to the RPL routing protocol.
Current literature still lacks a comprehensive study on Trust 2) Adversary model
based secure routing in IoT. In this context several issues need We consider a behavior as malicious if it is characterized
to be seriously considered and more investigated. by a node aiming to modify the topology of the network
First, the Trust integration within the routing functions could and to degrade the performance of the routing protocol. This
affect the performance of the routing protocol as longer paths node after managing to attract the traffic by advertising
could be selected to avoid malicious nodes and thus it could falsified information data, can drop either all, randomly or
cause a more important delay and energy. Hence, we need selectively packets received and supposed to be forwarded.
further research to minimize these effects and to optimize the Respectively a selfish behavior is conducted by a node that
security considerations to be implemented. does not forward packets in order to save its residual energy
Second, more research is required in terms of energy consump- for example. Consequently, a malicious node can simulate the
tion, quality of service consideration, and attacks resiliency following two types of attacks:
issues within the routing protocols. In fact proposed schemes (i) Black-Hole Attack: In this attack, the malicious node
are generally designed to defend a specific class of attacks dumps all the packets supposed to be forwarded. However, it
(those targeting the RPL topology) while Trust management participates devotedly in the route establishment process [15].
could deal with various kind of attacks while meeting both (ii) Gray-Hole Attack: This attack is similar to the black-
the energy and the QoS requirements that could effectively hole attack. However, the malicious node here only discard a
improve the security of such a protocol. specific subpart of the network traffic and forward the other
part at random interval.
III. System model and problem statement
Before elaborating the detailed design of the proposed C. Problem statement
scheme, we will provide first a broad overview of the RPL In what follows, we will identify the properties that should
routing protocol as well as its main features. Then we will be respected in order to establish Trusted routes in IoT
present a brief description of the network model, its archi- networks.
(i) Trust: a route is Trusted if only Trusted nodes can
participate in its establishment, design and maintenance. On
the other side malicious and selfish nodes will be isolated
and excluded from participating in the routing procedures.
This property can be assessed accurately on the basis of the
entities historical interactions and their observation of each
other forwarding behavior.
(ii) Delay awareness: a delay aware route should be
able to provide low end-to-end delays from one source to
a destination through a particular route, thus it can be Fig. 1. Architecture of the proposed model
measured through the offered end-to-end delay.
(iii) Energy Efficiency: a route is energy efficient if it is
made up of nodes that have more energy than any other direct observations and (b) the recommendations given by the
node. Obviously nodes with low battery levels should be neighboring entities.
avoided in the routing process to extend the network lifetime. The Trust structure to be sent to the Trust manager is made
The nodes remaining energy could be so considered within up of the following information: node ID, neighbor ID, RE
the topology construction process to maximize the network percentage, PFR value, ETX value, PRR value, PER value,
lifetime. the transmission delay as well as the entity time.
(iv) Reliability: a route is reliable if it continuously provide 2) Trust composition
available and high quality of the communication links along The Trust Manager compute the Trust level for each entity
the path. This property can be evaluated through the link specifically the Node related Trust (NT) and the Link related
quality estimators, such as the Packet Reception Ratio Trust (LT) as follow:
(PRR), the Packet Error Rate (PER) and the Expected 
0 if (alert generated)
Transmission count (ETX). T (ei −→ ej )t = else
Taking into account these four properties, our model shall w1 ∗ N T (ei −→ ej )t + w2 ∗ LT (ei −→ ej )t
respect several constraints such as the maximization of the
network lifetime, the optimization of the quality of service Where T (ei −→ ej )t denotes the value of Trust the entity ei
and the improvement of the security performance. has for its candidate parent ej at time t and it is limited to
a continuous range from 0 to 1, where 0 denotes complete
IV. Proposed scheme distrust whereas 1 represents absolute Trust. The weight
In this section, we will describe the overall architecture of factors w1 and w2 are assigned to N T (ei −→ ej )t and
LT-RPL. To efficiently compute the Trust values of IoT nodes, LT (ei −→ ej )t respectively where w1 + w2 = 1; 0 ≤ w1 ≤ 1
we first need to clearly understand the main meaning of Trust and 0 ≤ w2 ≤ 1.
as it is considered in LT-RPL. Afterwards, a brief description Each computation is based on a set of properties where
of the different blocks and dimensions will be provided. N T (ei −→ ej )t represents the NT level calculated based
on the Trustor’s direct observation of its one hop neighbors’
A. Trust presentation and definition behavior referred as the direct Trust N T (ei −→ ej )dt and on
Trust here could be defined as a relationship between the other hand, on the third parties’ attributed recommenda-
two entities, a Trustor and a Trustee. The Trustor is the tions called the indirect or the relative Trust N T (ei −→ ej )rt
evaluating entity willing to join the DAG routing structure as follow: N T (ei −→ ej )t = wd ∗ N T (ei −→ ej )dt + wr ∗
or to update its preferred DAG parents to send its data N T (ei −→ ej )rt , wd and wr are the weights assigned to the
packets. On the other side, the Trustee is the evaluated entity direct and the indirect Trust respectively.
which represents the candidate entity that will be chosen as The direct Trust is calculated by considering both node
the preferred parent. This relationship is derived from direct cooperativeness (coop) and node competence (comp). At time
observations and interactions referred as the direct Trust and t, it is defined as:
the recommendations exchanged between neighboring nodes N T (ei −→ ej )dt = N T (ei −→ ej )coop
t ∗ N T (ei −→ ej )comp
t ,
termed as the indirect Trust. We use hereafter the following where N T (ei −→ ej )coop
t reflects the cooperativeness level
notation to specify the Trust relationship between ei and ej at evaluated during the time interval [0..t] and calculated using
a given time t as Trust is time dependent: T rust(ei −→ ej )t . the Packet Forwarding Ratio (PFR), while N T (ei −→ ej )comp t
provides the degree of the entity’s ability to perform its
B. Overview of the proposed model intended tasks within the routing process and it is assessed
The design of LT-RPL consists of several phases namely: based on the Remaining Energy (RE) percentage hence the
Information gathering, Trust composition, Trust database energy dimension of our model.
and Trust application as presented in Fig. 1. It includes as On the other side, the indirect Trust N T (ei −→ ej )rt is
well four main dimensions specifically QoS dimension, Energy set up upon recommendations of other entities within the
awareness dimension, Reputation dimension and Security di- neighborhood which reflects here the reputation dimension. In
mension. order to obtain Trust recommendations, we first need to select
1) Information gathering Trust recommenders with a Trusted communication link, and
The Trust related information are collected regarding the thus get rid of the impact of malicious recommendations. To
entities’ behavior as well as the links’ quality indicators do so each recommendation RTkj about ej given by ek is
and taking into consideration two different sources, (a) the subject to a credibility factor CRk in the interval [0..1], where
Simulation parameter Value
1 represents the highest credibility and 0 the lowest one.
Simulation tool Contiki/Cooja 2.7
When it comes to the link Trust LT (ei −→ ej )t , its evaluation Mote type Tmote Sky
aims mainly to reinforce the routing DAG establishment and Simulation run time 3600 seconds
maintenance processes by considering both the quality (qual) Simulation coverage area 300m x 300m
and the performance (perf) of the different links connecting Interference range 100m
Wireless communication 50m
the participating entities in order to successfully meet the QoS range
requirements, its value is defined as follow: Total number of nodes 10..50
LT (ei −→ ej )t = LT (ei −→ ej )qual t ∗ LT (ei −→ ej )perf
t Number of malicious nodes 3..15
qual
where LT (ei −→ ej )t reflects the belief that the connecting Radio environment DGRM (Directed
Graph Radio Medium)
link is efficient enough to respect the QoS guarantees. It is
measured by ETX and PRR as indicators of the link quality TABLE I
between the entity and its neighbor. While LT (ei −→ ej )perf
t Network related parameters used in simulation analysis
characterize the performance of the link based on the PER
and the transmission delay L.
The combination of these properties will produce an overall
Trust value that can be used efficiently and effectively to more specifically with RPL based on the Minimum Rank with
ensure security improvement for the RPL routing process. Hysteresis Objective Function (MRHOF) which uses hystere-
3) Trust storage sis while selecting the path with the smallest metric value. We
Once the Trust composition process has been completed, have varied the number of network nodes, the percentage of
Trust related evidence will be stored by the Trust manager in malicious ones and we have analyzed the corresponding effect
a Trust record table that contains apart the Trust information respectively on the packet loss ratio, the remaining energy
that each entity has gathered for its candidate neighbors, the percentage and the resiliency to black-hole attacks.
Trust value computed according to the different properties as 1) Remaining energy
it has been already explained. To enforce the security aspect We measure here the RE while varying the number of
of the proposed scheme, a hash algorithm has been employed nodes within a network composed of a single DODAG. Fig.
to encrypt the Trust values when stored and retrieved from 2 illustrates the distribution of the RE between the network
the Trust database or when sent to the evaluating entities. nodes.
4) Trust application: LT-RPL: Link reliable and Trust As seen, the RE distribution in LT-RPL based network is
aware RPL routing protocol
The Trust model previously described has been integrated
into the DODAG construction and maintenance phases of
RPL. For the implementation of LT-RPL, each node sends to
its neighbors the value of its rank which is included by default
in the DIO message, once received the evaluating node ejoin
will check its record table for the most recent Trust values
of its p ≥ 1 candidate parents ecand1 ..ecandp , already sent by
the Trust manager. Afterwards, the rank R(ejoin −→ ecandq )
will be computed according to the Trust based OF and with
respect to each candidate parent ecandq , according to the
formula below: Fig. 2. Remaining energy distribution

R(ejoin −→ ecandq ) = R(ecandq ) − T (ejoin −→ ecandq )t more balanced than the normal RPL insofar as relay nodes are
where R(ecandq ) is the rank value of the candidate parent. chosen function of their RE level during the DAG construction
Afterwards, the node with the minimum rank R(ejoin −→ phase which avoids having the same relay node within the
ecandq ) will be chosen as the preferred parent to reach the routing topology and consequently depleting the power of this
root. Otherwise, it will be rejected and identified as malicious last in a faster way as well. The simulation results here reveal
parent, thus punished and removed from the list of candidate that within LT-RPL, 44% of nodes have a RE above 80%, 14%
entities. above 90% and 64% between 70% and 80%. However, we note
that within RPL-MRHOF, just 5% of nodes have a RE above
V. Simulation and Results 90% and 16% under 70% which could adversely affect the
A. Simulation setup network lifetime over time as 16% of nodes are likely becoming
Our experiments are performed using the InstantContiki to exhaust their batteries in a faster way in comparison with
2.7 platform while integrating the proposed Trust model LT-RPL.
(presented in Section IV) into the RPL routing protocol. 2) Packet loss ratio
The various simulation parameters are listed in Table I. In We measure here the Packet Loss Ratio (PLR) while vary-
the simulation study, we have assumed that the attacking ing the number of legitimate and malicious nodes.
nodes behave as good nodes from inception and begin their Fig. 3 shows the variation of the PLR in the presence of a
malicious activities during time (when activated). number of malicious nodes.
The simulation result in Fig. 3 shows that LT-RPL experi-
B. Performance evaluation results ences a more reduced packet loss than RPL under black-hole
In order to prove the performance of LT-RPL, we have attacks scenarios where malicious nodes advertise themselves
performed several simulations in comparison with RPL and to their neighbor nodes as better parents and routes in a guise
network traffic as well as the network nodes resources. We also
aim at deploying LT-RPL in different application scenarios in
order to prove its adaptability and applicability to different
platforms and environments.
References
[1] Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I.
(2012). Internet of things: Vision, applications and research
challenges. Ad Hoc Networks, 10(7), 1497-1516.
[2] Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013).
Fig. 3. Packet loss ratio comparison between RPL (MRHOF) and Internet of Things (IoT): A vision, architectural elements, and
LT-RPL under black-hole attacks future directions. Future generation computer systems, 29(7),
1645-1660.
[3] Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M.,
& Ayyash, M. (2015). Internet of things: A survey on enabling
to attract these unsuspecting nodes while eventually dropping technologies, protocols, and applications. IEEE Communica-
their packets supposed to be forwarded. In fact, while LT-RPL tions Surveys & Tutorials, 17(4), 2347-2376.
related PLR stayed below 0.4, the standard RPL (MRHOF) [4] Montenegro, G., Kushalnagar, N., Hui, J., & Culler. D. (2007).
Transmission of IPv6 packets over IEEE 802.15. 4 networks.
recorded a staggering one between 0.6 and 0.95.
Internet Eng. Task Force (IETF), Fremont, CA, USA, Internet
To demonstrate the reliability of LT-RPL based network in Proposed Std. RFC 4944.
the presence of malicious nodes (launching black-hole at- [5] Kushalnagar, N., Montenegro, G., & Schumacher, C. (2007).
tacks), we have presented the impact of their presence on IPv6 over Low-Power Wireless Personal Area Networks
the packet loss. The simulation result in Fig. 4 shows well (6LoWPANs): Overview, assumptions, problem statement,
and goals. Internet Eng. Task Force (IETF), Fremont, CA,
USA, RFC4919, vol. 10.
[6] Winter, T. (2012). RPL: IPv6 routing protocol for low-power
and lossy networks.
[7] Routing Over Low Power and Lossy Networks (ROLL), 2004.
Available: https://datatracker.ietf.org/wg/roll/charter/.
[8] Di Marco, P., Fischione, C., Athanasiou, G., Mekikis, P.V.
(2013). MAC-aware routing metrics for low power and lossy
networks. INFOCOM, 2013 Proceedings IEEE, 13-14.
[9] Iova, O., Theoleyre, F., Noel, T. (2015). Using multiparent
routing in RPL to increase the stability and the lifetime of the
network. Ad Hoc Networks 29(0), 45-62.
[10] Winter, T. (2012). RPL: IPv6 routing protocol for low-power
and lossy networks.
Fig. 4. Packet loss ratio evolution of LT-RPL in a 50 nodes network [11] Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., &
size Leung, K. (2013). A survey on the ietf protocol suite for the
internet of things: Standards, challenges, and opportunities.
how LT-RPL detects the malicious behavior of nodes and IEEE Wireless Communications, 20(6), 91-98.
how it reacts to its presence. The network here is composed [12] Tripathi, J., de Oliveira, J. C., & Vasseur, J. P. (2010). A
performance evaluation study of rpl: Routing protocol for low
of 50 nodes where 15 among them start to act maliciously power and lossy networks. Information Sciences and Systems
over a certain time after the network initialization. As shown (CISS) 44th Annual Conference on (pp. 1-6). IEEE.
in Fig. 4, once the malicious nodes begin their malicious [13] Accettura, N., Grieco, L. A., Boggia, G., & Camarda, P.
activities consisting of dropping their neighbors’ packets, the (2011). Performance analysis of the RPL routing protocol. In
Mechatronics (ICM) IEEE International Conference on (pp.
PLR considerably increase in response to the occurring event. 767-772). IEEE.
However the integration of the proposed scheme within RPL [14] Sehgal, A., Mayzaud, A., Badonnel, R., Chrisment, I., &
was shown and proven to be effective in reducing the impact Schonwalder, J. (2014). Addressing DODDAG inconsistency
of such behaviors insofar as the attacking nodes will not be attacks in RPL networks. In Proceedings of Global Informa-
chosen anymore as a next hop nodes during the network tion Infrastructure and Networking Symposium (GIIS’14), 1-8.
[15] Mayzaud, A., Badonnel, R., & Chrisment, I. (2016). A Taxon-
routing topology construction. As a result thereof, the PLR omy of Attacks in RPL-based Internet of Things. International
is reduced and maintained considerably stable over time. Journal of Network Security, 18(3), 459-473.
[16] Seeber, S., Sehgal, A., Stelte, B., Rodosek, G. D., & Schon-
VI. Conclusion walder, J. (2013, October). Towards a trust computing ar-
chitecture for RPL in Cyber Physical Systems. In Network
In this paper, we have proposed a Trust management and Service Management (CNSM), 2013 9th International
scheme for securing the network routing topology construc- Conference on (pp. 134-137). IEEE.
tion and maintenance within the RPL routing protocol. Our [17] Djedjig, N., Tandjaoui, D., & Medjek, F. (2015, July). Trust-
based RPL for the Internet of Things. In Computers and
Trust model was applied to the RPL protocol, evaluated and
Communication (ISCC), 2015 IEEE Symposium on (pp. 962-
compared with ETX based MRHOF objective function. As a 967). IEEE.
general remark, LT-RPL proves to be efficient and effective [18] Airehrour, D., Jairo, G., & Sayan, K.R. (2016). A Lightweight
in detecting and preventing malicious nodes launching black- Trust Design for IoT Routing. Dependable, Autonomic and
hole and gray-hole attacks while suitably providing QoS guar- Secure Computing, 14th Intl Conf on Pervasive Intelligence
and Computing, 2nd Intl Conf on Big Data Intelligence
antees required for energy-efficient routing in constrained IoT and Computing and Cyber Science and Technology Congress
networks. As a future work, It would be interesting to improve (DASC/PiCom/DataCom/CyberSciTech), 2016 IEEE 14th
the performance of our model in case of other types of attack Intl C. IEEE.
scenarios, we may consider the attacks targeting the RPL

Das könnte Ihnen auch gefallen