IDEAS home Printed from https://ideas.repec.org/a/plo/pone00/0271277.html
   My bibliography  Save this article

THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack

Author

Listed:
  • Danyal Arshad
  • Muhammad Asim
  • Noshina Tariq
  • Thar Baker
  • Hissam Tawfik
  • Dhiya Al-Jumeily OBE

Abstract

The Internet of Things (IoT) and its relevant advances have attracted significant scholarly, governmental, and industrial attention in recent years. Since the IoT specifications are quite different from what the Internet can deliver today, many groundbreaking techniques, such as Mobile Ad hoc Networks (MANETs) and Wireless Sensor Networks (WSN), have gradually been integrated into IoT. The Routing Protocol for Low power and Lossy network (RPL) is the de-facto IoT routing protocol in such networks. Unfortunately, it is susceptible to numerous internal attacks. Many techniques, such as cryptography, Intrusion Detection System (IDS), and authorization have been used to counter this. The large computational overhead of these techniques limits their direct application to IoT nodes, especially due to their low power and lossy nature. Therefore, this paper proposes a Trust-based Hybrid Cooperative RPL protocol (THC-RPL) to detect malicious Sybil nodes in an RPL-based IoT network. The proposed technique is compared and evaluated with state-of-the-art and is found to outperform them. It detects more attacks while maintaining the packet loss ratio in the range of 15-25%. The average energy consumption of the nodes also remains in the ratio of 60-80 mj. There is approximately 40% more energy conservation at node level with an overall 50% increase in network lifetime. THC-RPL has 10% less message exchange and 0% storage costs.

Suggested Citation

  • Danyal Arshad & Muhammad Asim & Noshina Tariq & Thar Baker & Hissam Tawfik & Dhiya Al-Jumeily OBE, 2022. "THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack," PLOS ONE, Public Library of Science, vol. 17(7), pages 1-33, July.
  • Handle: RePEc:plo:pone00:0271277
    DOI: 10.1371/journal.pone.0271277
    as

    Download full text from publisher

    File URL: https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0271277
    Download Restriction: no

    File URL: https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0271277&type=printable
    Download Restriction: no

    File URL: https://libkey.io/10.1371/journal.pone.0271277?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Chetan M. Bulla & Mahantesh N. Birje, 2021. "A Multi-Agent-Based Data Collection and Aggregation Model for Fog-Enabled Cloud Monitoring," International Journal of Cloud Applications and Computing (IJCAC), IGI Global, vol. 11(1), pages 73-92, January.
    2. Vipindev Adat & B. B. Gupta, 2018. "Security in Internet of Things: issues, challenges, taxonomy, and architecture," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 67(3), pages 423-441, March.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kumar Prateek & Nitish Kumar Ojha & Fahiem Altaf & Soumyadev Maity, 2023. "Quantum secured 6G technology-based applications in Internet of Everything," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 82(2), pages 315-344, February.
    2. Jun-Feng Tian & Hao-Ning Wang, 2020. "An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios," International Journal of Distributed Sensor Networks, , vol. 16(5), pages 15501477209, May.
    3. Eric Forcael & Isabella Ferrari & Alexander Opazo-Vega & Jesús Alberto Pulido-Arcas, 2020. "Construction 4.0: A Literature Review," Sustainability, MDPI, vol. 12(22), pages 1-28, November.
    4. Abhishek Verma & Virender Ranga, 2020. "CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 75(1), pages 43-61, September.
    5. Ahmed Salim & Ahmed Ismail & Walid Osamy & Ahmed M. Khedr, 2021. "Compressive sensing based secure data aggregation scheme for IoT based WSN applications," PLOS ONE, Public Library of Science, vol. 16(12), pages 1-27, December.
    6. Haghnegahdar, Lida & Chen, Yu & Wang, Yong, 2022. "Enhancing dynamic energy network management using a multiagent cloud-fog structure," Renewable and Sustainable Energy Reviews, Elsevier, vol. 162(C).
    7. Jianmao Xiao & Xinyi Liu & Jia Zeng & Yuanlong Cao & Zhiyong Feng, 2022. "Recommendation of Healthcare Services Based on an Embedded User Profile Model," International Journal on Semantic Web and Information Systems (IJSWIS), IGI Global, vol. 18(1), pages 1-21, January.
    8. Silviu-Gabriel Szentesi & Lavinia Denisia Cuc & Ramona Lile & Paul Nichita Cuc, 2021. "Internet of Things (IoT), Challenges and Perspectives in Romania: A Qualitative Research," The AMFITEATRU ECONOMIC journal, Academy of Economic Studies - Bucharest, Romania, vol. 23(57), pages 448-448.
    9. Marco Arazzi & Serena Nicolazzo & Antonino Nocera, 2025. "A Fully Privacy-Preserving Solution for Anomaly Detection in IoT using Federated Learning and Homomorphic Encryption," Information Systems Frontiers, Springer, vol. 27(1), pages 367-390, February.
    10. Nadir, Ibrahim & Mahmood, Haroon & Asadullah, Ghalib, 2022. "A taxonomy of IoT firmware security and principal firmware analysis techniques," International Journal of Critical Infrastructure Protection, Elsevier, vol. 38(C).
    11. Isha Batra & Sahil Verma & Arun Malik & Kavita & Uttam Ghosh & Joel J. P. C. Rodrigues & Gia Nhu Nguyen & A. S. M. Sanwar Hosen & Vinayagam Mariappan, 2020. "Hybrid Logical Security Framework for Privacy Preservation in the Green Internet of Things," Sustainability, MDPI, vol. 12(14), pages 1-16, July.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:plo:pone00:0271277. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: plosone (email available below). General contact details of provider: https://journals.plos.org/plosone/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.