Secure routing protocol over mobile Internet of Things wireless sensor networks
MetadataShow full item record
A wireless Internet of Things (IoT) network is used for military operations due to its low cost and ease of deployment; however, one of the primary challenges with IoT networks is their lack of cohesive security and privacy protocols. For this thesis research, we successfully designed and developed a lightweight trust-based security algorithm to support routing in a mobile IoT wireless sensor network. The standard routing protocol for IoT, known as routing protocol for low power and lossy networks (RPL), was modified to include common security techniques, including a nonce identity, timestamp, and network whitelist, to ensure appropriate node authentication and to protect against Denial-of-Service- and Sybil-based identity attacks. In addition, our algorithm allows RPL to select a routing path over a mobile IoT wireless network based on a computed node trust value and average received signal-strength indicator (RSSI) value across network members. We conducted simulations using the Cooja network simulator to validate the algorithm against stipulated threat models. In addition, Wireshark was used for further packet analysis and inspection. We also analyzed the performance of the network when the trust algorithm is executed. The performance metrics studied include control overhead, packet delivery rate, and network latency.
RightsCopyright is reserved by the copyright owner.
Showing items related by title, author, creator and subject.
Zhan, J.; Maltz, D.; Zhang, H.; Greenberg, A.; Hjalmtysson, G.; Rexford, J.; Xie, Geoffrey (2005-03);The primary purpose of a network is to provide reachability between applications running on end hosts. In this paper, we describe how to compute the reachability a network provides from a snapshot of the configuration state ...
Teo, Cheng Kiat Amos (Monterey California. Naval Postgraduate School, 2005-12);The ability to sense and monitor a variety of environmental conditions using un-tethered sensors offers a significant change over traditional sensing systems that need to be strategically positioned and have topologies ...
Thulasiraman, Preetha; Wang, Yizhong (IEEE, 2018);Military communities have come to rely heavily on commercial off the shelf (COTS) standards and technologies for Internet of Things (IoT) operations. One of the major obstacles to military use of COTS IoT devices is the ...