Research breakthrough possible @S-Logix pro@slogix.in

Office Address

  • 2nd Floor, #7a, High School Road, Secretariat Colony Ambattur, Chennai-600053 (Landmark: SRM School) Tamil Nadu, India
  • pro@slogix.in
  • +91- 81240 01111

Social List

A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches - 2020

A Comprehensive Review On Secure Routing In Internet Of Things: Mitigation Methods And Trust-Based Approaches

Research Area:  Internet of Things

Abstract:

Internet of Things (IoT) is a network of “things,” connected via Internet, to collect and exchange data. These “things” can be sensors, actuators, smartphones, wearables, computers, or any object that is interconnected to provide specific services. Similarly, wireless sensor network (WSN), as a part of IoT, forwards the gathered data after sensing any event. The scalability and heterogeneity of IoT offer limited protection and is prone to diverse attacks, including WSN-inherited attacks. Moreover, IPv6 routing protocol for low power and lossy networks (RPL), a de facto routing protocol for IoT networks, also suffers from certain vulnerabilities based on its features and functionalities. Researchers have proposed various mitigation mechanisms for secure networks and routing in IoT. Recently, trust-based approaches have gained tremendous interest from the research community to embed security in IoT networks and routing protocols. In the existing literature, several trust models have been introduced according to the security needs of the IoT system, such as SecTrust, DCTM-IoT, CTRUST, etc. In this research, security issues and requirements of IoT networks and RPL routing protocol are studied with respect to various attacks, such as Blackhole, Spoofing, Rank, etc. Additionally, various mitigation methods and significance of trust models in IoT for secure routing are analyzed. Further, trust metrics in IoT environments, including the open issues and research challenges, as well as the implication of trust as a security paradigm in IoT networks and routing protocols are discussed.

Keywords:  

Author(s) Name:  Syeda M. Muzammal; Raja Kumar Murugesan; N. Z. Jhanjhi

Journal name:  IEEE Internet of Things Journal

Conferrence name:  

Publisher name:  IEEE

DOI:  10.1109/JIOT.2020.3031162

Volume Information:  Volume: 8, Issue: 6, Page(s): 4186 - 4210