2021
DOI: 10.36548/jitdw.2021.2.001
|View full text |Cite
|
Sign up to set email alerts
|

Metric Routing Protocol for Detecting Untrustworthy Nodes for Packet Transmission

Abstract: IoT objects that have a resource constrained nature resulting in a number of attacks in the routing protocol for lossy networks and low-power networks. RPL is very vulnerable to selfish behaviours and internal attacks though they are built with encryption protection to secure messages. To address this vulnerability, in this paper, we propose a novel trustworthiness methodology based on metric for incorporating trust evaluation, enhancing the robustness of security mechanism. Simulation results indicate that t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…Information on states and transitions were used in Extended Finite State Machine. Similarly, to detect wormhole attacks, sinkhole and hello-flood, a compression header analyser based IDS is proposed by authors in [11]. Here correlation-based features, greedy stepwise and Best first search algorithm are used for features selection and detection.…”
Section: Related Workmentioning
confidence: 99%
“…Information on states and transitions were used in Extended Finite State Machine. Similarly, to detect wormhole attacks, sinkhole and hello-flood, a compression header analyser based IDS is proposed by authors in [11]. Here correlation-based features, greedy stepwise and Best first search algorithm are used for features selection and detection.…”
Section: Related Workmentioning
confidence: 99%