Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
169 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

iTRPL: An Intelligent and Trusted RPL Protocol based on Multi-Agent Reinforcement Learning (2403.04416v1)

Published 7 Mar 2024 in cs.NI

Abstract: Routing Protocol for Low Power and Lossy Networks (RPL) is the de-facto routing standard in IoT networks. It enables nodes to collaborate and autonomously build ad-hoc networks modeled by tree-like destination-oriented direct acyclic graphs (DODAG). Despite its widespread usage in industry and healthcare domains, RPL is susceptible to insider attacks. Although the state-of-the-art RPL ensures that only authenticated nodes participate in DODAG, such hard security measures are still inadequate to prevent insider threats. This entails a need to integrate soft security mechanisms to support decision-making. This paper proposes iTRPL, an intelligent and behavior-based framework that incorporates trust to segregate honest and malicious nodes within a DODAG. It also leverages multi-agent reinforcement learning (MARL) to make autonomous decisions concerning the DODAG. The framework enables a parent node to compute the trust for its child and decide if the latter can join the DODAG. It tracks the behavior of the child node, updates the trust, computes the rewards (or penalties), and shares with the root. The root aggregates the rewards/penalties of all nodes, computes the overall return, and decides via its $\epsilon$-Greedy MARL module if the DODAG will be retained or modified for the future. A simulation-based performance evaluation demonstrates that iTRPL learns to make optimal decisions with time.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (34)
  1. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550, March 2012.
  2. Survey on rpl enhancements: A focus on topology, security and mobility. Computer Communications, 120:10–21, 2018.
  3. A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches. IEEE Internet of Things Journal, 8(6):4186–4210, 2021.
  4. A systematic literature review on attacks defense mechanisms in rpl-based 6lowpan of internet of things. Internet of Things, page 100741, 2023.
  5. Security of rpl based 6lowpan networks in the internet of things: A review. IEEE Sensors Journal, 20(11):5666–5690, 2020.
  6. Multi-agent reinforcement learning: A selective overview of theories and algorithms. Handbook of reinforcement learning and control, pages 321–384, 2021.
  7. A comprehensive survey on enhancements and limitations of the rpl protocol: A focus on the objective function. Ad Hoc Networks, 96:102001, 2020.
  8. A survey of trust and reputation systems for online service provision. Decision support systems, 43(2):618–644, 2007.
  9. Combining direct trust and indirect trust in multi-agent systems. In IJCAI, pages 311–317, 2020.
  10. Reinforcement learning: An introduction. MIT press, 2018.
  11. Benjamin Gompertz. Xxiv. on the nature of the function expressive of the law of human mortality, and on a new mode of determining the value of life contingencies. in a letter to francis baily, esq. frs &c. Philosophical transactions of the Royal Society of London, (115):513–583, 1825.
  12. Trust management and reputation systems in mobile participatory sensing applications: A survey. Computer Networks, 90:49–73, 2015.
  13. biosmartsense+: A bio-inspired probabilistic data collection framework for priority-based event reporting in iot environments. Pervasive and Mobile Computing, 67:101179, 2020.
  14. Selcsp: A framework to facilitate selection of cloud service providers. IEEE Transactions on Cloud Computing, 3(1):66–79, 2015.
  15. Secure and scalable healthcare data transmission in iot based on optimized routing protocols for mobile computing applications. Wireless Communications and Mobile Computing, 2022:1–12, 2022.
  16. Rpl based emergency routing protocol for smart buildings. IEEE Access, 10:18445–18455, 2022.
  17. Performance evaluation of mobile rpl-based iot networks under version number attack. Computer Communications, 197:12–22, 2023.
  18. A central intrusion detection system for rpl-based industrial internet of things. In 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), pages 1–5. IEEE, 2019.
  19. Decision tree trust (dttrust)-based authentication mechanism to secure rpl routing protocol on internet of battlefield thing (iobt). International Journal of Business Data Communications and Networking (IJBDCN), 17(1):1–23, 2021.
  20. Impact analysis of rank attack on rpl-based 6lowpan networks in internet of things and aftermaths. Arabian Journal for Science and Engineering, 48(2):2489–2505, 2023.
  21. Cong Pu. Sybil attack in rpl-based internet of things: Analysis and defenses. IEEE Internet of Things Journal, 7(6):4937–4949, 2020.
  22. A potential flooding version number attack against rpl based iot networks. Journal of Electrical Engineering, 73(4):267–275, 2022.
  23. A study of rpl attacks and defense mechanisms in the internet of things network. In 2022 International Conference on Computing, Communication, Security and Intelligent Systems (IC3SIS), pages 1–6. IEEE, 2022.
  24. Analysis of wormhole attack on network based on rpl. In Advanced Computational Paradigms and Hybrid Intelligent Computing: Proceedings of ICACCP 2021, pages 607–617. Springer, 2022.
  25. A lightweight scheme for mitigating rpl version number attacks in iot networks. IEEE Access, 10:111115–111133, 2022.
  26. Embof-rpl: Improved rpl for early detection and isolation of rank attack in rpl-based internet of things. Peer-to-Peer Networking and Applications, 15(1):642–665, 2022.
  27. A lightweight trust-based security architecture for rpl in mobile iot networks. In 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), pages 1–6, 2019.
  28. Farag Azzedin. Mitigating denial of service attacks in rpl-based iot environments: Trust-based approach. IEEE Access, 11:129077–129089, 2023.
  29. Physical identification based trust path routing against sybil attacks on rpl in iot networks. IEEE Wireless Communications Letters, 11(5):1102–1106, 2022.
  30. Ml-lgbm: A machine learning model based on light gradient boosting machine for the detection of version number attacks in rpl-based networks. IEEE Access, 9:83654–83665, 2021.
  31. Ml-rpl: Machine learning-based routing protocol for wireless smart grid networks. IEEE Access, 2023.
  32. Congestion-aware routing in dynamic iot networks: A reinforcement learning approach. In 2021 IEEE Global Communications Conference (GLOBECOM), pages 1–6. IEEE, 2021.
  33. Kishore Golla and S Pallamsetty. An efficient secure cryptography scheme for new ml-based rpl routing protocol in mobile iot environment. International Journal of Network Security & Its Applications, 2022.
  34. Intelligent learning automata-based objective function in rpl for iot. Sustainable Cities and Society, 59:102234, 2020.

Summary

We haven't generated a summary for this paper yet.