Secure routing protocol over mobile Internet of Things wireless sensor networks

Download
Author
Wang, Yizhong
Date
2018-03Advisor
Thulasiraman, Preetha
Second Reader
Tummala, Murali
Metadata
Show full item recordAbstract
A wireless Internet of Things (IoT) network is used for military operations due to its low cost and ease of deployment; however, one of the primary challenges with IoT networks is their lack of cohesive security and privacy protocols. For this thesis research, we successfully designed and developed a lightweight trust-based security algorithm to support routing in a mobile IoT wireless sensor network. The standard routing protocol for IoT, known as routing protocol for low power and lossy networks (RPL), was modified to include common security techniques, including a nonce identity, timestamp, and network whitelist, to ensure appropriate node authentication and to protect against Denial-of-Service- and Sybil-based identity attacks. In addition, our algorithm allows RPL to select a routing path over a mobile IoT wireless network based on a computed node trust value and average received signal-strength indicator (RSSI) value across network members. We conducted simulations using the Cooja network simulator to validate the algorithm against stipulated threat models. In addition, Wireshark was used for further packet analysis and inspection. We also analyzed the performance of the network when the trust algorithm is executed. The performance metrics studied include control overhead, packet delivery rate, and network latency.
Rights
Copyright is reserved by the copyright owner.Collections
Related items
Showing items related by title, author, creator and subject.
-
On Static Reachability Analysis of IP Networks
Zhan, J.; Maltz, D.; Zhang, H.; Greenberg, A.; Hjalmtysson, G.; Rexford, J.; Xie, Geoffrey (2005-03);The primary purpose of a network is to provide reachability between applications running on end hosts. In this paper, we describe how to compute the reachability a network provides from a snapshot of the configuration state ... -
Performance evaluation of a routing protocol in wireless sensor network
Teo, Cheng Kiat Amos (Monterey California. Naval Postgraduate School, 2005-12);The ability to sense and monitor a variety of environmental conditions using un-tethered sensors offers a significant change over traditional sensing systems that need to be strategically positioned and have topologies ... -
A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks
Thulasiraman, Preetha; Wang, Yizhong (IEEE, 2018);Military communities have come to rely heavily on commercial off the shelf (COTS) standards and technologies for Internet of Things (IoT) operations. One of the major obstacles to military use of COTS IoT devices is the ...