Font Size: a A A

Research On Trust-based IoT Security Routing Protocol

Posted on:2021-05-05Degree:MasterType:Thesis
Country:ChinaCandidate:C X LiFull Text:PDF
GTID:2428330614465828Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Due to the limited resources of the Io T device and the unreliability of the transmission link,the IETF ROLL working group proposed a lightweight RPL routing protocol that enables the Io T to adapt to fast and frequent network topology changes.However,because RPL routing protocols did not consider network security issues when it was first designed,the RPL routing protocol is facing many security threats.With the massive growth of heterogeneous devices,Internet of Things face much more dangers.Since using RPL protocol is vulnerable to be attacked by malicious nodes,it is necessary to conduct a more detailed investigation of security threats and solutions to the security issues.This thesis mainly completed the following tasks:(1)Firstly,the research works on the security threats of RPL protocol and current solutions to these security problems has been done.(2)Secondly,Contiki operating system is used to implement RPL routing protocol,and we use Cooja simulation tools to perform simulations on RPL routing protocol to get the performance evaluations of RPL routing protocols such as Trickle mechanism,local repair and global repair ability.(3)Then,in order to defend the Rank attacks in RPL routing protocol,a new trust-based secure RPL routing protocol(Sec-RPL)is proposed in this thesis.By introducing the concept of node trust and combining the node's proprietary Rank attribute in the RPL routing protocol.Sec-RPL protocol can defend the network against Rank attacks.And at the same time,in order to increase the network life,we make an improvement to the Sec-RPL protocol and obtain SRI protocol.In the SRI protocol,in order to achieve balanced energy consumption of the network,the nodes whose remaining energy is lower than the threshold is removed from the candidate of the parent nodes to achieve a balanced energy consumption of the network and increase the network life cycle.(4)Finally,through simulation experiments of the SRI,Sec-RPL,OF0-RPL,the superiority of SRI in detection success ratio,false alarm ratio,and network life cycle are verified.
Keywords/Search Tags:Internet of Things, RPL routing protocol, Rank attack, trust, Contiki operating system
PDF Full Text Request
Related items