Rakesh 2021
Rakesh 2021
To cite this article: Bandarupalli Rakesh & Parveen Sultana H (2021): Novel Authentication and
Secure Trust based RPL Routing in Mobile sink supported Internet of Things, Cyber-Physical
Systems, DOI: 10.1080/23335777.2021.1933194
Article views: 12
I. Introduction
Internet of Things (IoTs) have accomplished noticeable attention among the
researchers and industrialist due to its numerous application such as smart
home, military, healthcare and so on [1]. IoT technology permits smart devices
to perceive and control the environment effectually. The routing is one of the
major research areas in the IoT owing to the constraint nature of the IoT device
where the optimal parent node is selected to route the packet to the root node
[2]. RPL is one of the best standard protocols to route the data in the IoT network
[3]. Since, it is intentionally designed for resource-constrained devices to handle
the IoT device resources effectively. In RPL-based routing, destination oriented
directed acyclic graph (DODAG) is constructed to minimise the resource con
sumption in IoT devices [4]. Here, the objective function (OF) is estimated to
select the best parent node to route the packet to the root node.
On the other hand, RPL tempts to face numerous attacks during data trans
mission [5]. Hence, the security in RPL routing has become an integral part of the
IoT network to achieve secure data transmission. In order to resist the malicious
IoT node participation in data transmission, authentication is introduced in the
IoT network [6]. The authors in [7] have authenticated the IoT node using the
location-based service scheme. Here, the keys provided during the registration
process are verified for the authentication process. The two phase-based
authentication protocol is utilised to secure the RPL routing in the IoT network
[8].
There have been many works concentrated on trust evaluation-based secure
routing in RPL-based IoT network [9]. In general, there are two types in the trust
evaluation to select the effective path for data transmissions such as direct trust
and indirect or recommended trust. Here, the direct trust is estimated for the
neighbour nodes which are in direct communication. The recommended trust is
estimated for the neighbour nodes which are not in direct communication. The
authors in [10] have contributed trust-based authentication scheme for secure
data transmission in IoT. Authors in [11] have introduced the new trust metric-
based path selection in RPL routing in IoT. Here, the trust evaluation is per
formed based on the direct and indirect trust of the parent nodes. The rank
attack is one of the significant attacks in the RPL-based IoT network [12]. In this,
the malicious node transmits false rank to its neighbour node that tends packet
losses and high delay during the data transmission. The trust-based approach is
introduced in [13] to detect the rank and Sybil attacks in the IoT.
To reduce the frequent death of the IoT nodes and to enhance the network
lifetime, the mobile sink-based data gathering approach is evolved [12,13, 14].
The mobile sink follows the fixed or dynamic path to gather the data from the
nodes present in the network. This way of gathering the data from the IoT nodes
reduces the energy consumption and also increases the network lifetime. In
[15], a circular path-based mobile sink movement is introduced where the
mobile sink gathers data from the head nodes present in the network. Here,
the mobile sink movement is performed based on a fixed path.
Till now, the works that are concentrated on the security in RPL-based IoT
network is discussed. Generally, RPL protocol in IoT faces many attacks such as
CYBER-PHYSICAL SYSTEMS 3
rank attack, Sybil attack, blackhole attack, man in the middle attack. From this
analysis, it is well known that still, security provisioning in RPL has many issues.
They are discussed as follows:
Strong credentials are not taken during the IoT node authentication. Thus
tends to malicious node participation in the data transmission.
Most of the works have detected the rank attack with the aid of the neigh
bour node list that doesn’t result in high detection results. It is because of a lack
of significant parameter consideration such as rank variance, DIO transmission
count and so on.
In literature, most of the works are not focused on context-based information
(number of child count, packet drop count) during the trust evaluation that
tends to packet losses during the data transmission.
Most of the works don’t give attention to the network construction in order
to reduce the energy consumption of the IoT node.
In this work, the issues that were encountered in the preceding works were
eradicated as listed above. To achieve this, SecRPL-MS contributes the following
processes:
The network is divided into equal size grids based on the overall commu
nication range and node coverage. Here, each grid is managed by one grid head
(GH) node. After selecting the GH, DODAG construction process will be initi
alised. All the nodes register their ID, Grid ID, location and PUF with the security
entity that executes Quartile-based unique number (U.NO) generation for which
it considers ID and registration time.
The SecRPL-MS method increases the security level by performing authenti
cation process using GH and mobile sink nodes. Before that GM and GH
credentials are registered into the security entity. During registration Pseudo
ID (P.ID) is generated by using blake2b algorithm and Random Number (R.No) is
generated by Edwards curve algorithm. After completion of registration,
authentication will be initialised. GM node authentication is done by consider
ing strong credentials such as G.ID, PUF and their location. And GH node is
authenticated using mobile sink node. Thus evades the malicious node partici
pation during the data transmission.
SecRPL-MS selects the optimal route between the source and destination for
secure data transmission. It is achieved through the sail fish optimisation algo
rithm by considering the direct trust, recommended trust, hop count and
energy. The data transmitted is secured by using the encryption process by
adopting the prince algorithm.
The proposed work selects the optimal moving point for the mobile sink
using the QINN algorithm which considers energy, buffer size, previous moving
4 R. BANDARUPALLI AND P. S. H
direction, time and distance. Thus avoiding data transmission delay and packet
losses in the IoT network.
The structure of this paper is concise as follows: Section II explains related works
that are related to security in the RPL-based IoT network along with their
limitations. Section III describes the problems that exist in previous works in
detail. Section IV illustrates our proposed SecRPL-MS method with our proposed
algorithms. Section V discusses the experimental results of our proposed work
with a detail comparison. Finally, section VI concludes our contribution and also
gives some comments on our future directions.
problems since hop count and energy-related parameters are not considered.
Nikravan et al. [23] have offered the rank attack detection in the RPL-based IoT
network. Here, the rank attack is mitigated with the aid of the onsign algorithm.
Using this algorithm, rank transmitted by each node undergoes the signing
operation by verifying the signed rank achieved from the nodes in the network.
This paper detects the rank attack node in the network. However, the rank
attacker node changes its rank to lower position which couldn’t be prevented
using the signing operation.
The secure routing is ensured in RPL network via effective mechanism
which is offered by Zaminkar et al. [24]. In this, the behaviour of the node is
analysed using the effective mechanism to detect the attack in the network.
Here, the malicious node is identified using the rank verification process.
Herein, the rank of the node is estimated by verifying the rank and parent
rank in the network. Here, the route is not selected by considering the energy-
related metrics. Thus tends to reduce the network lifetime of the RPL-based
IoT network.
The mobile sink-based data gathering is pointed out by thyagarajan et al. [25]
in IoT network. In this, the opportunistic-based routing is applied in the IoT
network. The mobile sink adopts the quasi mobility pattern to gather data from
the IoT nodes in the network. Here, the mobile sink moves in the four corners of
the network area. After gathering the data from the four corners, mobile sink
moves the centre point of the network area. However, mobile sink moving path
is mostly based on the outlier of the network that tends to increase the data
transmission delay for the inner IoT node. Thus leads to more packet losses in
the network.
Al-Janabi et al. [26] have introduced the mobile sink-based data gathering in
the IoT network. In this, the optimal path for the mobile sink is determined using
the genetic algorithm. The genetic algorithm selects the best next moving point
to gather the data from the IoT devices in the network. Here, the distance is
computed to select the next best moving point in the IoT network. The main
purpose of mobile sink is to reduce the energy consumption of the IoT node in
the network. However, this paper doesn’t rely on energy-related parameters to
select the next moving point. Thus tends to reduce the network lifetime of the
IoT network.
The network comprises of static IoT nodes and the mobile sink node. The main
aim is to reduce the energy consumption of the IoT nodes by deploying mobile
sink in the network. The novelty in the utilisation of the mobile sink is gathering
data from the four GH nodes in the network. The novelty of authentication is to
utilise strong credentials such as PUF, location and more. In addition, the
context-based information is employed during the trust estimation-based
secure routing in the RPL-based IoT network. The processes involved in the
SecRPL-MS are depicted in Figure 2 which is described as follows:
CYBER-PHYSICAL SYSTEMS 9
At first, the nodes in the network register their credentials in the security
entity. After registering their credentials, the security entity provides U.No to
each registered node. Using the given U.No each GM node authenticates
themselves in the GH node. In this work, the GH node in the mobile sink node
is authenticated. For this purpose, the security entity provides P.ID and R.No to
each GH node. After completing the proper authentication process only, each
node in the network could transmit their data to the GH node or mobile sink
node. In this work, the rank attack is mitigated by using the trust estimation-
based path selection. Along with rank attack mitigation, Sybil, Man-In-The-
Middle and blackhole attacks are mitigated. It is achieved by proposing the sail
fish optimisation algorithm. Besides, reducing the path length of the mobile sink
node is also concentrated. Hence, QINN-based next moving point detection
process is proposed.
algorithms such as MD5, SHA 1, SHA 2 and SHA 3. It also has less number of
rounds during the hash computation process. Hence, it doesn’t introduce any
delay during the registration process. Further, it is highly suitable for the
resource constraint environment like IoT network. Here, the hash is performed
using two different functions such as mixing and compression functions. The
generated hash functions are utilised to generate the hash values for both PUF
value and GMC. The generated hash values for both credentials are represented
as follows:
PUF and GMC ! Blake2b ! hðPUF Þ and hðGMC Þ (3)
For the generated hash values, security entity performs XOR function. It is
signified as follows:
Security Entity ! XOR ! hðPUF Þ � hðGMC Þ (4)
The generated XOR value is given as P.ID to the registered GH node.
R.No Generation: R.No generation is performed by security entity using the
edwards curve algorithms. The proposed Edwards curve is one of the curves in
the elliptic curve family. The Edwards curve over the finite field ‘f’ is defined as
follows:
x 2 þ y2 ¼ 1 þ dx 2 y2 (5)
For some scalar d∈f, where f value resides between 0 and 1. From the above
curve equation, R.No is generated for each GH node in the network.
These generated P.ID and R.No is given to registered GH node. Using these
credentials, GH node authenticates them in the mobile sink node.
Here, the confidence level value (Cl) resides between {0.5–1}. It is provided by
considering the below condition,
If (U.No&& ID = = Legitimate), Then Cl ¼ 1
If (U.No || ID = = Legitimate), Then
Cl ¼ 0:5 (6)
Based on the above condition, confidence level is provided to each authentication
process. If the confidence level is above the threshold (Cl>0.5) then the access is
granted for the data transmission. If the confidence level is below the threshold (Cl
≤0.5), then the second-level credentials are requested for the authentication.
For the second-level authentication process, GH node requests the second
level authentication factors to the GM node. After receiving the second-level
authentication factors, GM node transmits the location and initial registration
time credentials to the GH node. The GH node verifies the received credentials
with the authentication credentials. If the received credentials are similar to the
authentication credentials, then it provides access to transmit the data or else it
aborts the transmission. Finally, GH node transmits the malicious node informa
tion to the mobile sink in order to broadcast the malicious node information to
the all nodes in the network.
(2) GH node authentication Process: In this work, GH node is authenticated
by using the mobile sink. After gathering data from the GM nodes, GH node
transmits those data to the mobile sink. Before data transmission, GH node must
complete authentication process with the mobile sink node.
For GH node authentication process, it transmits P.ID and R.No credentials to
the mobile sink node. Here, the R.No is added with the count value. Where, the
count value represents the count of the data communication performed with
the mobile sink.
GH node ! P:IDR:No þ C ! Mobile Sink (7)
The credentials provided to the mobile sink are verified with the authentication
credentials. It verifies both P.ID and addition of R.No. and count value. The mobile
sink knows the count value of the GH node transmission. Hence, it could verify the
R.No. with the count value. If the given credentials are legitimate, then it provides
access to transmit the data gathered from its GM nodes or else it aborts the data
transmission. And, it transmits the presence of malicious node in the network.
This section describes secure routing for data transmission. For that objective
function (OF) is defined in RPL and the main intention of the objective function
is to select the optimal parent path between source and root node. In each grid,
GM node is source node and GH node is root node. GH is selected based on energy
consumption, centrality and trust value. Centrality is one of the significant metrics
14 R. BANDARUPALLI AND P. S. H
to elect optimal head. In this work the network is represented as undirected graph,
G = (V, E), where V represent set of nodes and E represent set of edges. Centrality is
defined as the number of neighbour nodes which is calculated as follows,
X
Ci ¼ Nij (8)
j
Definition 1: Packet Drop Count –: It is used to reduce the packet drop during
the routing. It is measured by counting the number of packets that are dropped
by the parent node. It is formulated as follows:
NumberofpacketsDropped
Pdc ¼ (9)
NumberofReceived
CYBER-PHYSICAL SYSTEMS 15
Definition 2: Rank Variance: It is one of the vital metric to detect the rank
attacker node the network. It defines the rank variance from its parent node. It is
expressed in mathematical form as follows:
Rv ¼ Rp Rc (10)
Here, the Rp signifies the rank of the parent and Rc signifies the rank of the
child node.
(3) Hop Count (Hc): It is used to count the number of hops between the
source and root node. This metric is vital to reduce the delay during the routing
in the RPL-based IoT network. This leads to avoid the packet losses during the
data transmission.
(4) Energy (E): This metric is used to reduce the energy consumption of the
parent node path between source and destination. This tends to increase the
network lifetime of the RPL-based IoT network by reducing the frequent death
of the IoT nodes.
With the aid of the aforesaid metrics, sail fish optimisation algorithm esti
mates the fitness function (f(x)) to select the optimal parent path. In addition to
fitness function estimation, sail fish also estimates its position and attack power
16 R. BANDARUPALLI AND P. S. H
to select the best path. For this purpose, following objective function is
formulated:
Minimise ! Pl &D
Subject to:
n
X Dti Rti Ei
f ð xÞ ¼ (13)
i¼0
Hci
Here, Pl represents the packet loss and D represents the delay during the
routing in the network. The path which has high f(x) is selected as the optimal
path to transmit the sensed data to the GH node. In this, the rank attack during
the data transmission is mitigated by measuring the direct and recommended
trust between the source and root node. Here, the direct trust is estimated using
highly effective metrics such as DIO transmission count, rank variance, child
node count and packet drop count. These metrics provide best result in the rank
attack mitigation during the routing.
After selecting the optimal path for the routing, source node encrypts the
sensed data using the prince algorithm. This proposed prince algorithm is
lightweight block cipher-based encryption algorithm [33]. To the best of our
knowledge we are first in utilising prince algorithm in securing the RPL-based
IoT network. Hence, it is highly suitable for the resource constraint environment
like IoT. This is the reason behind selecting the prince block cipher algorithm for
data encryption process. Furthermore, it also has low latency during the encryp
tion and decryption with strong key generation process.
The proposed prince is a 64-bit block cipher method with the 128-bit key. In
this algorithm, key is splitted into two different parts of 64 bits size each. It is
expressed as follows:
k ¼ k0 k k1 (14)
The above splitted keys are further extended to 192 bit keys for mapping
purpose. It is formulated as follows:
The sensed data (ðdÞ) from the IoT node are encrypted using these keys
generated in the prince algorithm. For the given plain data (ðdÞ), cipher text
(C) is generated which is expressed as follows:
C ¼ E 0 ðd � k0 Þ � k1 (16)
Here, the E 0 represents the blocks cipher, k0 and k1 are generated keys for the
encryption. d Represents the sensed plain data from the IoT device. Using these
prince algorithm procedures, the data transmitted over RPL-based IoT network
is secured.
CYBER-PHYSICAL SYSTEMS 17
Here, N mp;x2 ; N mp;y2 represents the x,y position of the next moving point and
Cmp;x1 ; Cmp;y1 denotes the x,y position of the current moving point.
(3) Previous Moving Direction and Time (Pd;t ): This metric is used to avoid the
frequent moving of mobile sink to the points that are visited within the short
amount of time. This reduces the unwanted moving and also reduces the path
length of the moving point.
18 R. BANDARUPALLI AND P. S. H
Here, Rij represents the quantum rotation gate and ;ij denotes the quantum
weight. It is represented as follows:
In this, αi and βi are state probability that represents 0 and 1. The output layer
provides best moving point by utilising the below equation:
!
Xn
yjl ¼ s wjl hj (21)
j¼0
Here, the s represents the sigmoid function and wjl represents the weight link
between jth neuron in hidden layer and lth neuron in output layer. The weight is
estimated using the below formula,
n
X Ej Pd;tj
wj ¼ (22)
j¼0
Bs;j Dj
Using this equation, weight is estimated for each GH nodes nearest to the
moving point. By utilising the weight estimated in hidden layer, output layer
predicts the one best moving point for the mobile sink. From the selected
moving point, mobile sink gathers data from the nearest four GH nodes. By
gathering data from four GH nodes at a time, the delay and path length is
reduced and also enhance the network lifetime by reducing the energy con
sumption of the GH node.
The proposed concepts are experimented using the NS3.26 simulator. The
utilised NS3.26 simulator exhibits better performance for any kind of the net
work topology. In this paper, star topology is used for network simulation.
Hence, this simulator is selected for SecRPL-MS work.
This simulation network comprises of 1000*1000 m area. It consists of para
meters of packet, blake2b and prince algorithms used in this work. Table 1
illustrates the simulation parameters used in SecRPL-MS method.
Figure 5a depicts the simulation environment of the SecRPL-MS work. Our
simulation environment area is 1000*1000 m of grid network in which DODAG is
constructed using the nodes within the grid. Here, each grid comprises one grid
head node to gather data from the grid member node. In this, we deploy one
security entity, one mobile sink and 100 IoT nodes. In this simulation environ
ment, 20% of attacker nodes are deployed in the network. The data transmission
in the network is achieved using the RPL routing protocol. Figure 5b represents
the overall process of the proposed SecRPL-MS method.
Np;s
Pdr ¼ (23)
Tp
(2) Delay
It is used to measure the delay incurred during the routing in RPL-based IoT
network. It is defined as the time consumed to reach the source packets to
destination root node in the network. It is measured using the below equation:
n
X
D¼ Pr;t Pt;t (24)
i¼0
Here, Pt;t denotes the packet transmission time and Pr;t denotes the packet
received time.
CYBER-PHYSICAL SYSTEMS 21
Security Entity
1000
N1 N14 N20
N7
N11
N2 N15 N16 N21 N24
N5 N8
N10 N22
N4 N13 N18 N19 N23
N6 N9 Malicious N25
N3 N17
750 N12 Mobile Sink Node
N26 Movement N38 N45
N32 GH node
N30 N35
N39 N42 N46 N49
N27 N33 N41 N48
N34 N44
N29 N47 GM
N28 N31 N36 N37 N40 N43 node N50
500
N51 N58 N64 N70
N72 N71
N52 N54 N61 N65 N68
N59 N73 N76
N53 N60 N69
N57 N67 N75
N56 N63 N66 N74
N55 N62
250
N90 Mobile N97
N77
N83 N100
N80 N91 N94 SinkN96
N78 N84 N86 N93 N99
N79 N85 N89
N95
N81 N92 N98
N82 N87 N88
node present in the routing path. Hence, this work evades the malicious node
participation in the RPL-based IoT network. Besides, the mobile sink-based data
gathering is utilised in the network. Hence, GH node doesn’t need to wait long
time to transmit its data to the mobile sink node that avoids the packet drops.
This is the reason behind increase in packet delivery ratio when compared to
other existing methods. On the other hand, existing methods such as PCMS and
SecTrust achieved less packet delivery ratio. It is due to their inefficiency in
secure path selection. Here, SecTrust doesn’t provide focus on significant para
meters such as rank variance, DIO packet transmission count and so on during
the path selection. As compared to proposed and SecTrust, PCMS achieved less
Figure 6. (a) Comparison of packet delivery ratio. (b) Packet delivery ratio vs. #of malicious
nodes.
24 R. BANDARUPALLI AND P. S. H
packet delivery ratio. The reason behind this is the absence of trust evaluation
during the packet transmission. On the whole, SecRPL-MS method increases
maximum of 24% and 22% of packet delivery ratio with respect to number of
nodes and number of malicious nodes respectively, when compared to existing
methods.
Figure 7. (a) Comparison of delay. (b) Delay vs. #of malicious nodes.
Figure 8. (a) Comparison of energy consumption. (b) Energy consumption vs. # of malicious
node.
consumption of the IoT nodes in the network. Furthermore, the routing path is
also selected based on the energy parameter. Hence, the energy consumption
incurred during the data transmission is reduced. These advantages are the
reason behind less energy consumption of the proposed work. By contrast,
CYBER-PHYSICAL SYSTEMS 27
PCMS method utilised static circular path to gather data from the IoT nodes. This
increases the energy consumption due to the delay incurred during the data
gathering process for low energy nodes. Meanwhile, SecTrust doesn’t utilise
mobile sink to gather data from the IoT nodes in the network. Hence, this
method achieved high energy consumption when compared to the proposed
and PCMS methods. Therefore, this proposed work reduces energy consump
tion to a maximum of 50 mJ when compared to other existing methods.
Similarly, Figure 8b represents the comparison of proposed and existing system
energy consumption with respect to number of malicious nodes. The result
shows that the proposed method consumes 60 mJ lesser energy when com
pared to existing methods.
unique for each IoT device. Therefore, this work evades the Sybil attacker
participation in the RPL-based IoT network.
(3)Blackhole Attack: This network is highly secured against the black hole
attack in the RPL-based IoT network. The behaviour of black hole attacker node
is to drop the packets silently that are transmitted through it. In this work, the
packet drop count is considered as one of the metrics in path selection. Besides,
the number of DIO packet transmitted count is considered to select the route.
These two metrics are highly vital to mitigate the black hole attacker node
participation in the network. Since, this work doesn’t select the node which has
high DIO packet transmission count and packet drop count in data transmission.
As a result, this work avoids the black hole attack node participation in the RPL-
based IoT network.
(4) Man In The Middle Attack: This network resists against the Man In The
Middle attack. The behaviour of Man in the Middle attack is to be in between the
two nodes during the data transmission in order to forge the data transmitted.
After forging the data, it further imputes malicious information into it. This
attack is mitigated in the work through encrypting the data during the data
transmission. It is achieved by employing the prince encryption algorithm to
encrypt the data to be transmitted. The keys generated using the prince algo
rithm is highly confidential which couldn’t be identified by the malicious node.
Hence, the data transmitted between source and destination is highly secured
which couldn’t be forged by the attacker node. Therefore, this work avoids the
Man in the Middle Attack during the data transmission in RPL-based IoT
network.
SecTrust for 100 nodes. The energy consumption of the IoT nodes is reduced
though our mobile sink-based data gathering procedures. In addition this energy
consumption is also considered as one of the metrics during the path selection.
Hence, the energy consumption is also reduced during the data transmission. And
finally, the malicious attack detection accuracy is measured where the maximum of
98% for 20 attacker nodes is achieved. It is 23% higher than PCMS and 18% higher
than the SecTrust methods. It is because of the proposed effective authentication
of GH and GM node. Besides, secure data transmission is performed through
encryption and secure path selection processes. The Table 2 summarises the
numerical results of proposed and existing methods.
VI. Conclusion
So far, there have been many works that focused their contribution in securing
the RPL-based IoT network. This paper also aims to secure the routing in the IoT,
four sequential processes have been proposed to secure the network from the
attackers such as rank attack. Primarily, the registration process is executed
where all the nodes in the network register their credentials in security entity.
For the registered GM node, security entity transmits the U.No and for GH node
security entity transmits the P.ID and R.No. The optimal path between source
and root node is selected using the sail fish algorithm. In order to avoid rank
attacker participation in the routing, direct and recommended trust information
is utilised. Data is gathered from the GH node using the mobile sink in order to
increase the network lifetime. For mobile sink, best next moving point is
selected using the QINN algorithm. Finally, SecRPL-MS method is compared
with the existing methods. From comparison, it is proved that this work exhibits
better performance compared to other existing works such as PCMS and
SecTrust. And this SecRPL-Ms method solves the existing issues of high energy
consumption, delay and packet losses. In future work, it is intended to propose
the trust-based secure routing mechanism by verifying the recommended trust
received from the neighbour nodes. Further, it is intended to mitigate other
security attacks such as DDoS and DoS in the RPL-based IoT network.
References
[1] Hwang R-H, Peng M-C, Cheng-Yu W. A novel RPL-based multicast routing mechanism
for wireless sensor network. Int J Ad Hoc Ubiquitous Comput. 2019;33(2):122–131.
32
Kgt (ms)
Methods D 512 1024 Acc Mobile sink
Reference proposed Contribution Pdr (%) (ms) Ec (mJ) B B (%) Consideration cownsides
[27] PCMS Mobile sink-based data gathering and 70.1 134.8 44.5 65.2 90.1 70.5 Yes ● Consumes more resources because of huge processing
securityin data transmission algorithm.
● Ineffective authentication due to lack of strong
credentials
[28] SecTrust Trust-based secure routing 77.8 52.1 60.6 – – 76.25 No ● High energy consumption due to circular path-based sink
movement
● Misidentification of malicious nodes due to absence of
context-based information in trst estimation
Proposed SecRPL- Authentication and trust-based 97.1 17.8 29.6 31.2 37.75 96.9 Yes Nil
MS secure routing
CYBER-PHYSICAL SYSTEMS 33
[2] Preeth SKSL, Dhanalakshmi, Shakeel, P. M R An intelligent approach for energy efficient
trajectory design for mobile sink based IoT supported wireless sensor networks. Peer-to
-Peer networking and applications. ; 2019. p. 1–12.
[3] Jawaligi SS, Biradar GS. QoS oriented and delay tolerant WSN routing protocol for data
gathering in IoT ecosystem. Int J Internet Technol Secur Trans. 2018;8(3):469.
[4] Shin S, Kim K, Kwon T. Detection of malicious packet dropping attacks in RPL-based
internet of things. Int J Ad Hoc Ubiquitous Comput. 2019;31(2):133.
[5] Raoof A, Matrawy A, Lung C. Enhancing routing security in IoT: performance evaluation
of RPL secure mode under attacks. ArXiv, Cornel University, Newyork; 2020. abs/
2004.07815.
[6] Wang K-H, Chen C-M, Fang W, et al. On the security of a new ultra-lightweight
authentication protocol in IoT environment for RFID tags. J Supercomputing. 2018;74
(1):65–70.
[7] Yugha R, Chithra S (2019). Attribute based trust evaluation for secure RPL protocol in
IoT environment. 2019 International Conference on Vision Towards Emerging Trends in
Communication and Networking (ViTECoN), Inida, 1–7.
[8] Razali MF, Rusli ME, Jamil N, et al. TPAL: a protocol for node authentication in IoT.
J Comput Sci. 2018;14(10):1401–1411.
[9] Hashemi SY, Shams Aliee F. Dynamic and comprehensive trust model for IoT and its
integration into RPL. J Supercomputing. 2018;75(7):1–30.
[10] Mabodi K, Yusefi M, Zandiyan S, et al. Multi-level trust-based intelligence schema for
securing of internet of things (IoT) against security threats using cryptographic
authentication. J Supercomputing. 2020;76:7081-7106
[11] Djedjig N, Tandjaoui D, Medjek F, et al. Trust-aware and cooperative routing protocol
for IoT security. J Inf Secur Appl. 2020;52:1–17.
[12] Fatima-tuz-zahra, Jhanjhi N, Brohi SN, et al. (2019). Proposing a rank and wormhole
attack detection framework using machine learning. 2019 13th International
Conference on Mathematics, Actuarial Science, Computer Science and Statistics
(MACS), Pakistan
[13] Tandon A, Srivastava P (2019). Trust-based enhanced secure routing against rank and
sybil attacks in IoT. 2019 Twelfth International Conference on Contemporary
Computing (IC3), India.
[14] Wang J, Gao Y, Yin X, et al. An enhanced PEGASIS algorithm with mobile sink support
for wireless sensor networks. Wireless Commun Mobile Comput. 2018;2018
(9472075):1–9472075:9.
[15] Lamaazi H, Benamar N, Jara AJ. RPL-based networks in static and mobile environment:
a performance assessment analysis. J King Saud Univ Comput Inf Sci. 2018;30
(3):320–333.
[16] Zhang T, Zhang T, Ji X, et al. (2019). Cuckoo-RPL: cuckoo filter based RPL for defending
AMI network from blackhole attacks. 2019 Chinese Control Conference (CCC), China.
[17] Dammak M, Boudia ORM, Messous MA, et al. (2019). Token-based lightweight authen
tication to secure IoT networks. 2019 16th IEEE Annual Consumer Communications &
Networking Conference (CCNC), USA.
[18] Zhou Y, Liu T, Tang F, et al. An unlinkable authentication scheme for distributed IoT
application. In: IEEE Access
[19] Melki R, Noura HN, Chehab A. Lightweight multi-factor mutual authentication protocol
for IoT devices. Int J Inf Secur. 2020;19:679-694.
[20] Shafique U, Khan A, Rehman A, et al. Detection of rank attack in routing protocol for
Low Power and Lossy Networks. In: Annals of telecommunications, Springer
Professional, Germany. 2018;Vol. 73(7-8):429–438.
34 R. BANDARUPALLI AND P. S. H
[21] Hashemi SY, Shams Aliee F. Fuzzy, dynamic and trust based routing protocol for IoT.
J Netw Syst Manage. 2020;28(4):1248–1278.
[22] Mehta R, Parmar MM (2018). Trust based mechanism for Securing IoT Routing Protocol
RPL against Wormhole &Grayhole Attacks. 2018 3rd International Conference for
Convergence in Technology, India (I2CT).
[23] Nikravan M, Movaghar A, Hosseinzadeh M. A lightweight defense approach to mitigate
version number and rank attacks in low-power and lossy networks. Wireless Pers
Commun. 2018;99(2):1035–1059.
[24] Zaminkar M, Fotohi R. SoS-RPL: securing Internet of Things against sinkhole attack
using RPL protocol-based node rating and ranking mechanism. Wireless Pers Commun.
2020;114(2):1287–1312.
[25] Thyagarajan J, Kulanthaivelu S. A joint hybrid corona based opportunistic routing
design with quasi mobile sink for IoT based wireless sensor network. J Ambient Intell
Humaniz Comput.2021;12:991-1009.
[26] Al-Janabi TA, Al-Raweshidy HS. A centralised routing protocol with a scheduled mobile
sink-based AI for large scale I-IoT. IEEE Sens J. 2018;18(24):10248-10261.
[27] Renold AP, Athi BG. Energy efficient secure data collection with path-constrained
mobile sink in duty-cycled unattended wireless sensor network. Pervasive Mob
Comput. 2019;55: 1–12.
[28] Airehrour D, Gutierrez JA, Ray SK. SecTrust -RPL: a secure trust-aware RPL routing
protocol for Internet of Things. Future Gener Comput Syst. 2018;93:860-876.
[29] Thiruchelvi A, Karthikeyan N. A novel pair based sink relocation and route adjustment
in mobile sink WSN integrated IoT. IET J. 2020; 14(3):365-37.
[30] Kiran V, Rani S, Singh P. Towards a light weight routing security in IoT using
non-cooperative game models and dempster-Shaffer theory. Wireless Pers Commun.
2019;110(4):1729–1749.
[31] Tian H, Qian Z, Wang X, et al. QoI-aware DODAG construction in RPL-based event
detection wireless sensor networks. J Sens. 2017;2017:1–9.
[32] Shadravan S, Naji HR, Bardsiri VK. The sailfish optimizer: a novel nature-inspired
metaheuristic algorithm for solving constrained engineering optimization problems.
Eng Appl Artif Intell. 2019;80:20–34.
[33] Borghoff J, Canteaut A, Güneysu T, et al. PRINCE – a low-latency block cipher for
pervasive computing applications. In: Lecture notes in computer science, Springer
Nature, Switzerland. 2012. p. 208–225.
[34] Jeswal SK, Chakraverty S. Recent developments and applications in quantum neural
network: a review. Arch Comput Methods Eng. 2018;26:793-807.