4.7 Article

Provenance-enabled packet path tracing in the RPL-based internet of things

期刊

COMPUTER NETWORKS
卷 173, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.comnet.2020.107189

关键词

Data trustworthiness; IPv6; IoT; LLN; Lossless provenance; RPL; Sensor networks; 6LoWPAN

资金

  1. Institute for Information & communications Technology Promotion (IITP) - Korea government (MSIT) [2015-0-00557]
  2. MSIT (Ministry of Science and ICT), Korea, under the Grand Information Technology Research Center support program [IITP-2020-2015-0-00742]

向作者/读者索取更多资源

The interconnection of resource-constrained and globally accessible things with unreliable Internet make them vulnerable to attacks such as, but not limited to, data forging, false data injection, and packet drop. Such attacks may affect mission-critical applications that rely on sensor data for decision-making processes, hence, necessitates high assurance of trustworthy data. For the data trustworthiness, provenance is considered to be an effective mechanism that tracks both data acquisition and data transmission. However, provenance management for IoT networks is faced with several challenges such as low energy, bandwidth consumption, and efficient storage. In this paper, we propose a bi-fold Provenance-enabled Packed Path Tracing (PPPT) approach to identify packet drop (either maliciously or due to network disruptions) and detect faulty or misbehaving nodes in the Routing protocol for low-Power and Lossy networks (RPL). Firstly, ordered system-level provenance information encapsulates the data generating nodes and the forwarding nodes in the data packet. Secondly, to closely monitor the dropped packets, a node-level provenance in the form of the packet sequence number is enclosed as a routing entry in the routing table of each participating node. Lossless in nature, both approaches conserve provenance size satisfying processing and storage requirements of IoT devices. The experimental results show that the provenance size remains constant (i.e., 2 bytes) in the proposed scheme, irrespective of the number of hops or number of sent packets. Therefore, it does not affect factors such as memory usage (additional RAM and ROM usage: 504 and 3874 bytes respectively), energy consumption, and processing efficiency for provenance generation time in comparison to RPL-only approach. Furthermore, our proposed provenance-enabled RPL (PPPT) outperforms the RPL-only approach from the perspective of added security such as data trustworthiness and features such as identification of malicious nodes and other disruptions in the network.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据