File:Secure routing protocol over mobile Internet of Things wireless sensor networks (IA secureroutingpro1094558273).pdf

From Wikimedia Commons, the free media repository
Jump to navigation Jump to search
Go to page
next page →
next page →
next page →

Original file(1,275 × 1,650 pixels, file size: 3.25 MB, MIME type: application/pdf, 140 pages)

Captions

Captions

Add a one-line explanation of what this file represents

Summary[edit]

Secure routing protocol over mobile Internet of Things wireless sensor networks   (Wikidata search (Cirrus search) Wikidata query (SPARQL)  Create new Wikidata item based on this file)
Author
Wang, Yizhong
image of artwork listed in title parameter on this page
Title
Secure routing protocol over mobile Internet of Things wireless sensor networks
Publisher
Monterey, California: Naval Postgraduate School
Description

A wireless Internet of Things (IoT) network is used for military operations due to its low cost and ease of deployment; however, one of the primary challenges with IoT networks is their lack of cohesive security and privacy protocols. For this thesis research, we successfully designed and developed a lightweight trust-based security algorithm to support routing in a mobile IoT wireless sensor network. The standard routing protocol for IoT, known as routing protocol for low power and lossy networks (RPL), was modified to include common security techniques, including a nonce identity, timestamp, and network whitelist, to ensure appropriate node authentication and to protect against Denial-of-Service- and Sybil-based identity attacks. In addition, our algorithm allows RPL to select a routing path over a mobile IoT wireless network based on a computed node trust value and average received signal-strength indicator (RSSI) value across network members. We conducted simulations using the Cooja network simulator to validate the algorithm against stipulated threat models. In addition, Wireshark was used for further packet analysis and inspection. We also analyzed the performance of the network when the trust algorithm is executed. The performance metrics studied include control overhead, packet delivery rate, and network latency.


Subjects: RPL; IoT; Internet of Things; wireless sensor network; mobility; security attack; Sybil; Denial-of-Service; Replay
Language English
Publication date March 2018
Current location
IA Collections: navalpostgraduateschoollibrary; fedlink
Accession number
secureroutingpro1094558273
Source
Internet Archive identifier: secureroutingpro1094558273
https://archive.org/download/secureroutingpro1094558273/secureroutingpro1094558273.pdf
Permission
(Reusing this file)
Copyright is reserved by the copyright owner.

Licensing[edit]

Public domain
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code. Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current13:40, 24 July 2020Thumbnail for version as of 13:40, 24 July 20201,275 × 1,650, 140 pages (3.25 MB) (talk | contribs)FEDLINK - United States Federal Collection secureroutingpro1094558273 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #27213)

Metadata