• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

多移动代理信任框架,用于减轻内部攻击并增强 RPL 安全性。

Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security.

机构信息

Department of Cyber Security, National University of Computer and Emerging Sciences, Islamabad 44000, Pakistan.

Department of Computer Science, Shaheed Zulfikar Ali Bhutto Institute of Science and Technology, Islamabad 44000, Pakistan.

出版信息

Sensors (Basel). 2022 Jun 16;22(12):4539. doi: 10.3390/s22124539.

DOI:10.3390/s22124539
PMID:35746321
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9227483/
Abstract

Recently, the Internet of Things (IoT) has emerged as an important way to connect diverse physical devices to the internet. The IoT paves the way for a slew of new cutting-edge applications. Despite the prospective benefits and many security solutions offered in the literature, the security of IoT networks remains a critical concern, considering the massive amount of data generated and transmitted. The resource-constrained, mobile, and heterogeneous nature of the IoT makes it increasingly challenging to preserve security in routing protocols, such as the routing protocol for low-power and lossy networks (RPL). RPL does not offer good protection against routing attacks, such as rank, Sybil, and sinkhole attacks. Therefore, to augment the security of RPL, this article proposes the energy-efficient multi-mobile agent-based trust framework for RPL (MMTM-RPL). The goal of MMTM-RPL is to mitigate internal attacks in IoT-based wireless sensor networks using fog layer capabilities. MMTM-RPL mitigates rank, Sybil, and sinkhole attacks while minimizing energy and message overheads by 25-30% due to the use of mobile agents and dynamic itineraries. MMTM-RPL enhances the security of RPL and improves network lifetime (by 25-30% or more) and the detection rate (by 10% or more) compared to state-of-the-art approaches, namely, DCTM-RPL, RBAM-IoT, RPL-MRC, and DSH-RPL.

摘要

最近,物联网(IoT)已成为将各种物理设备连接到互联网的重要方式。物联网为许多新的尖端应用铺平了道路。尽管文献中提供了预期的好处和许多安全解决方案,但考虑到生成和传输的大量数据,物联网网络的安全性仍然是一个关键问题。物联网的资源受限、移动和异构性质使得在路由协议(如低功耗和有损网络的路由协议(RPL))中保持安全性变得越来越具有挑战性。RPL 不能很好地防止路由攻击,例如等级、Sybil 和黑洞攻击。因此,为了增强 RPL 的安全性,本文提出了基于能量有效的多移动代理的 RPL 信任框架(MMTM-RPL)。MMTM-RPL 的目标是利用雾层功能减轻基于物联网的无线传感器网络中的内部攻击。MMTM-RPL 通过使用移动代理和动态行程来减轻等级、Sybil 和黑洞攻击,同时将能量和消息开销最小化 25-30%。与最先进的方法相比,MMTM-RPL 增强了 RPL 的安全性,提高了网络寿命(提高 25-30%或更多)和检测率(提高 10%或更多),这些方法包括 DCTM-RPL、RBAM-IoT、RPL-MRC 和 DSH-RPL。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/01ff0ce710af/sensors-22-04539-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/66da3258bcd0/sensors-22-04539-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/45e4323f02cd/sensors-22-04539-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/9cd02c04d03b/sensors-22-04539-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/0e204dc19ee5/sensors-22-04539-g004a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/dc7369eb2c2a/sensors-22-04539-g005a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/1a96dd83dacc/sensors-22-04539-g006a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/e60f20eb27cc/sensors-22-04539-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/3722d4af4d0a/sensors-22-04539-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/c35c6c56c9d8/sensors-22-04539-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/01ff0ce710af/sensors-22-04539-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/66da3258bcd0/sensors-22-04539-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/45e4323f02cd/sensors-22-04539-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/9cd02c04d03b/sensors-22-04539-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/0e204dc19ee5/sensors-22-04539-g004a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/dc7369eb2c2a/sensors-22-04539-g005a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/1a96dd83dacc/sensors-22-04539-g006a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/e60f20eb27cc/sensors-22-04539-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/3722d4af4d0a/sensors-22-04539-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/c35c6c56c9d8/sensors-22-04539-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/215c/9227483/01ff0ce710af/sensors-22-04539-g010.jpg

相似文献

1
Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security.多移动代理信任框架,用于减轻内部攻击并增强 RPL 安全性。
Sensors (Basel). 2022 Jun 16;22(12):4539. doi: 10.3390/s22124539.
2
THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack.THC-RPL:一种基于 RPL 的物联网网络中的轻量级信任启用路由,用于防范 Sybil 攻击。
PLoS One. 2022 Jul 28;17(7):e0271277. doi: 10.1371/journal.pone.0271277. eCollection 2022.
3
A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things.一种基于信任的物联网中抵御RPL攻击的安全路由模型
Sensors (Basel). 2022 Sep 17;22(18):7052. doi: 10.3390/s22187052.
4
Trust and Mobility-Based Protocol for Secure Routing in Internet of Things.基于信任和移动性的物联网安全路由协议
Sensors (Basel). 2022 Aug 18;22(16):6215. doi: 10.3390/s22166215.
5
RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things.RPLAD3:基于无线传感器网络的物联网中黑洞、灰洞和选择性转发攻击的异常检测
PeerJ Comput Sci. 2023 Mar 27;9:e1309. doi: 10.7717/peerj-cs.1309. eCollection 2023.
6
Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning.基于机器学习的物联网 RPL 中等级和虫洞攻击检测模型。
Sensors (Basel). 2022 Sep 7;22(18):6765. doi: 10.3390/s22186765.
7
Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP.物联网中 RPL 等级和版本号攻击的检测与缓解:SRPL-RP。
Sensors (Basel). 2020 Oct 22;20(21):5997. doi: 10.3390/s20215997.
8
UOS_IOTSH_2024: A Comprehensive network traffic dataset for sinkhole attacks in diverse RPL IoT networks.UOS_IOTSH_2024:用于不同RPL物联网网络中陷门攻击的综合网络流量数据集。
Data Brief. 2024 Jun 22;55:110650. doi: 10.1016/j.dib.2024.110650. eCollection 2024 Aug.
9
Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID.基于机器学习算法的工业物联网异构网络的定制入侵检测,称为 FTL-CID。
Sensors (Basel). 2022 Dec 28;23(1):321. doi: 10.3390/s23010321.
10
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN).一种用于检测和缓解女巫攻击检测(SAN)的高效、安全且具备能源弹性的基于信任的系统。
PeerJ Comput Sci. 2024 Aug 9;10:e2231. doi: 10.7717/peerj-cs.2231. eCollection 2024.

引用本文的文献

1
A Multi-Class Intrusion Detection System for DDoS Attacks in IoT Networks Using Deep Learning and Transformers.一种使用深度学习和Transformer的物联网网络中针对DDoS攻击的多类入侵检测系统。
Sensors (Basel). 2025 Aug 6;25(15):4845. doi: 10.3390/s25154845.
2
RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things.RPLAD3:基于无线传感器网络的物联网中黑洞、灰洞和选择性转发攻击的异常检测
PeerJ Comput Sci. 2023 Mar 27;9:e1309. doi: 10.7717/peerj-cs.1309. eCollection 2023.
3
BFT-IoMT: A Blockchain-Based Trust Mechanism to Mitigate Sybil Attack Using Fuzzy Logic in the Internet of Medical Things.

本文引用的文献

1
A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things.一种基于区块链的多移动代码驱动信任机制,用于检测物联网中的内部攻击。
Sensors (Basel). 2020 Dec 22;21(1):23. doi: 10.3390/s21010023.
2
Performance Analysis of IoT-Based Health and Environment WSN Deployment.基于物联网的健康与环境无线传感器网络部署的性能分析。
Sensors (Basel). 2020 Oct 20;20(20):5923. doi: 10.3390/s20205923.
3
CT-RPL: Cluster Tree Based Routing Protocol to Maximize the Lifetime of Internet of Things.CT-RPL:基于簇树的路由协议,用于最大化物联网的寿命
BFT-IoMT:一种基于区块链的信任机制,利用模糊逻辑在医疗物联网中缓解 Sybil 攻击。
Sensors (Basel). 2023 Apr 25;23(9):4265. doi: 10.3390/s23094265.
Sensors (Basel). 2020 Oct 16;20(20):5858. doi: 10.3390/s20205858.
4
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.雾计算环境下物联网应用中大数据的安全性:一项调查。
Sensors (Basel). 2019 Apr 14;19(8):1788. doi: 10.3390/s19081788.