Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Selfishness in secure internet of things networks: 6TiSCH case study

Published: 01 August 2021 Publication History

Abstract

Performance and communication security in the Internet of Things (IoT) area draw a major concern for both academic and industrial communities. Indeed, an emerging number of IoT protocols are getting involved in the protocol stack, implying that the need for new security measures is also increasing. The Media Access Control (MAC) protocol Time Slot Channel Hopping (TSCH) has recently gained significant popularity thanks to its reliability and robustness. It quickly became the basis of IPv6 over the TSCH mode of IEEE 802.15.4e (6TiSCH), a complete communication stack tailored for Industrial IoT networks. In this paper, we are interested in the lack of cooperation of some network nodes, referred to as selfishness, which often leads to network performance degradation. We introduce this concept in 6TiSCH networks for the first time, and we show how they get immunized. We first define a selfishness framework, and we integrate it into the 6top Protocol (6P). Then, we introduce a fuzzy logic-based technique enabling the detection of selfish nodes, along with an anticipatory countermeasure that tells cooperative nodes how to deal with selfish neighbors. We implement and integrate the proposed algorithms into the 6TiSCH simulator, and we conduct a thorough experimental study. Simulation results show how much the latency, Packet Delivery Ratio (PDR), and throughput are affected and how our proposal can significantly improve them.

References

[1]
IEEE Standard for low-rate wireless networks, April 2016. IEEE Std 802.15.4-2015 (Revision of IEEE Std 802.15.4-2011).
[2]
Municio E, Daneels G, Vučnić M, Latré S, Famaey J, Tanaka Yasuyuki, et al. Simulating 6tisch networks Transactions on Emerging Telecommunications Technologies 2019 30 3 e3494
[3]
Cena G, Demartini CG, Vakili MG, Scanzio S, Valenzano A, and Zunino C Evaluating and modeling IEEE 802154 TSCH resilience against Wi-Fi interference in new-generation highly-dependable wireless sensor networks Ad Hoc Networks 2020 106 102199
[4]
Vallati C, Brienza S, Anastasi G, and Das SK Improving network formation in 6tisch networks IEEE Transactions on Mobile Computing 2019 18 1 98-110
[5]
Mohamadi M and Senouci MR Demigha O, Djamaa B, and Amamra A Scheduling algorithms for IEEE 802.15.4 TSCH networks: A survey Advances in Computing Systems and Applications 2019 Springer 4-13
[6]
Haxhibeqiri J, Karaağaç A, Moerman I, and Hoebeke J Seamless roaming and guaranteed communication using a synchronized single-hop multi-gateway 802.15.4e TSCH network Ad Hoc Networks 2019 86 1-14
[7]
Daneels G, Spinnewyn B, Latré S, and Famaey J Resf: Recurrent low-latency scheduling in IEEE 802.15.4e TSCH networks Ad Hoc Networks 2018 69 100-114
[8]
Duquennoy, S., Al Nahas, B., Landsiedel, O., & Watteyne, T. (2015). Orchestra: Robust mesh networks through autonomously scheduled TSCH. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, SenSys ’15, page 337–350, New York, NY, USA, 2015. Association for Computing Machinery.
[9]
Jin Y, Raza U, Aijaz A, Sooriyabandara M, and Gormus S Content centric cross-layer scheduling for industrial IoT applications using 6TiSCH IEEE Access 2017 6 234-244
[10]
Kharb Seema and Singhrova A A survey on network formation and scheduling algorithms for time slotted channel hopping in industrial networks Journal of Network and Computer Applications 2019 126 59-87
[11]
Wang, Q., Vilajosana, X., & Watteyne, T. (2018). 6TiSCH Operation sublayer (6top) Protocol (6P). RFC 8480, November
[12]
Yadav, H., & Pati, H. K. (2018). A survey on selfish node detection in manet. In 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN) (pp. 217–221). IEEE.
[13]
Nobahary S, Garakani HG, Khademzadeh A, and Rahmani AM Selfish node detection based on hierarchical game theory in IoT EURASIP Journal on Wireless Communications and Networking 2019 2019 1 1-19
[14]
Luo J, Liu X, and Fan M A trust model based on fuzzy recommendation for mobile ad-hoc networks Computer Networks 2009 53 14 2396-2407
[15]
Raza A, Al-Karaki JN, and Abbas H Analyzing packet forwarding schemes for selfish behavior in MANETs Information Technology: New Generations 2016 Springer 227-236
[16]
Jedari B, Xia F, Chen H, Das SK, Tolba A, and Zafer A A social-based watchdog system to detect selfish nodes in opportunistic mobile networks Future Generation Computer Systems 2019 92 777-788
[17]
Hasani H and Babaie S Selfish node detection in ad hoc networks based on fuzzy logic Neural Computing and Applications 2019 31 10 6079-6090
[18]
Das, S. K., Saha, B. J., & Chatterjee, P. S. (2014). Selfish node detection and its behavior in WSN. In Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT) (pp. 1–6). IEEE.
[19]
Priya MD, Suganya T, Malar ACJ, Dhivyaprabha E, Prasad PK, and Vardhan LV An efficient scheduling algorithm for sensor-based IoT networks Inventive communication and computational technologies 2020 Springer 1323-1331
[20]
Refaei, M. T., Srivastava, V., DaSilva, L., & Eltoweissy, M. (2005). A reputation-based mechanism for isolating selfish nodes in ad hoc networks. In The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (pp. 3-11). IEEE.
[21]
Komathy K and Narayanasamy P Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network Computer Communications 2007 30 18 3721-3735
[22]
Hernandez-Orallo E, Serrat MD, Cano J, Calafate CT, and Manzoni P Improving selfish node detection in manets using a collaborative watchdog IEEE Communications Letters 2012 16 5 642-645
[23]
Xiao XueFeng, Li Y, Kui X, and Vasilakos AV Assessing the influence of selfishness on the system performance of gossip based vehicular networks Wireless Networks 2014 20 7 1795-1805
[24]
Theerthagiri Prasannavenkatesan Fucem: Futuristic cooperation evaluation model using Markov process for evaluating node reliability and link stability in mobile ad hoc network Wireless Networks 2020 26 4173-4188
[25]
Ullah, Z., Khan, M. S., Ahmed, I., Javaid, N., & Khan, M. I. (2016). Fuzzy-based trust model for detection of selfish nodes in manets. In 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA) (pp. 965–972). IEEE.
[26]
Singh Kuldeep and Verma AK A fuzzy-based trust model for flying ad hoc networks (FANETs) International Journal of Communication Systems 2018 31 6 e3517
[27]
Lei T, Wang S, Li J, You I, and Yang Fangchun Detecting and preventing selfish behaviour in mobile ad hoc network The Journal of Supercomputing 2016 72 8 3156-3168
[28]
Kumar Sunil and Dutta K Trust based intrusion detection technique to detect selfish nodes in mobile ad hoc networks Wireless Personal Communications 2018 101 4 2029-2052
[29]
Patel P and Jhaveri R A honeypot scheme to detect selfish vehicles in vehicular ad-hoc network Computing and Network Sustainability 2017 Singapore Springer 389-401
[30]
Afghah, F., Shamsoshoara, A., Njilla, L., & Kamhoua, C. (2018). A reputation-based stackelberg game model to enhance secrecy rate in spectrum leasing to selfish iot devices. In IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp 312–317). IEEE.
[31]
Cuka M, Elmazi D, Ikeda M, Matsuo K, Barolli L, and Takizawa M Barolli L, Takizawa M, Xhafa F, and Enokido T Selection of IoT devices in opportunistic networks: A fuzzy-based approach considering IoT device’s selfish behaviour Advanced information networking and applications 2020 Springer 251-264
[32]
Xu, L., Lin, Z., & Ye, A. (2006). Analysis and countermeasure of selfish node problem in mobile ad hoc network. In 2006 10th International Conference on Computer Supported Cooperative Work in Design. (pp. 1–4). IEEE.
[33]
Seredynski, M., Bouvry, P., & Klopotek, M. A. (2007). Preventing selfish behavior in ad hoc networks. In 2007 IEEE Congress on Evolutionary Computation (pp. 3554–3560). IEEE.
[34]
Tang, J., Cheng, Y., Hao, Y., & Zhou, C. (2010). Real-time detection of selfish behavior in IEEE 802.11 wireless networks. In 2010 IEEE 72nd Vehicular Technology Conference-Fall (pp. 1–5). IEEE.
[35]
Yan M, Xiao L, Du L, and Huang L On selfish behavior in wireless sensor networks: A game theoretic case study 2011 Third International Conference on Measuring Technology and Mechatronics Automation 2011 2 752-756
[36]
Benazir, S.A.M., & Umarani, V. (2016). Detection of selfish & malicious behavior using dtn-chord monitoring in mobile networks. In 2016 International Conference on Information Communication and Embedded Systems (ICICES) (pp. 1–5). IEEE.
[37]
Ghonge, M. M., Jawandhiya, P. M., & Thakare, V. M. (2017). Selfish attack detection in mobile ad hoc networks. In 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) (pp. 1–4). IEEE.
[38]
Abirami K. Rama and Sumithra MG Preventing the impact of selfish behavior under manet using neighbor credit value based aodv routing algorithm Sādhanā 2018 43 4 60
[39]
Jhaveri Rutvij H and Patel NM Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks International Journal of Communication Systems 2017 30 7 e3148
[40]
Jhaveri RH, Patel NM, Zhong Yubin, and Sangaiah AK Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial iot IEEE Access 2018 6 20085-20103
[41]
Vilajosana X, Watteyne T, Chang T, Vučinić M, Duquennoy S, and Thubert P Ietf 6tisch: A tutorial IEEE Communications Surveys Tutorials 2020 22 1 595-615
[42]
IPv6 over the TSCH mode of IEEE 802.15.4e (6tisch). https://datatracker.ietf.org/wg/6tisch/charter/. Accessed: 2019-06-23.
[43]
Chang, T., Vučinić, M., Vilajosana, X., Duquennoy, S., & Dujovne, D. (2020). 6TiSCH Minimal scheduling function (MSF). Internet-Draft draft-ietf-6tisch-msf-12, Internet Engineering Task Force, March. Work in Progress.
[44]
Almusaylim ZA, Alhumam A, and Jhanjhi NZ Proposing a secure RPL based internet of things routing protocol: A review Ad Hoc Networks 2020 101 102096
[45]
Palattella MR, Watteyne T, Wang Q, Muraoka K, Accettura N, Dujovne D, et al. On-the-fly bandwidth reservation for 6tisch wireless industrial networks IEEE Sensors Journal 2016 16 2 550-560
[46]
Kayacan E and Khanesar MA Kayacan E and Khanesar MA Fundamentals of type-1 fuzzy logic theory Fuzzy neural networks for real time control applications: Concepts, modeling and algorithms for fast learning 2016 Butterworth-Heinemann 13-24
[47]
Bai, Y., & Wang, D. (2006). Fundamentals of fuzzy logic contro–fuzzy sets, fuzzy rules and defuzzifications. In Advanced fuzzy logic technologies in industrial applications. Springer. (pp. 17-36)
[48]
Wang M, Zhu T, Zhang T, Zhang J, Yu S, and Zhou W Security and privacy in 6G networks: New areas and new challenges Digital Communications and Networks 2020 6 3 281-291
[49]
Porambag, P., Gür, G., Osorio, D. P. M., Liyanage, M., & Ylianttila, M. (2021). 6g security challenges and potential solutions. Preprint at https://www.researchgate.net/publication/350824205_6G_Security_Challenges_and_Potential_Solutions#fullTextFileContent

Index Terms

  1. Selfishness in secure internet of things networks: 6TiSCH case study
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Please enable JavaScript to view thecomments powered by Disqus.

            Information & Contributors

            Information

            Published In

            cover image Wireless Networks
            Wireless Networks  Volume 27, Issue 6
            Aug 2021
            627 pages

            Publisher

            Springer-Verlag

            Berlin, Heidelberg

            Publication History

            Published: 01 August 2021
            Accepted: 28 June 2021

            Author Tags

            1. Internet of Things
            2. 6TiSCH
            3. Security
            4. Performance Analysis
            5. Selfish Behavior
            6. Fuzzy Logic

            Qualifiers

            • Research-article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • 0
              Total Citations
            • 0
              Total Downloads
            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 20 Nov 2024

            Other Metrics

            Citations

            View Options

            View options

            Login options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media