当前位置: X-MOL 学术Wireless Netw. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Selfishness in secure internet of things networks: 6TiSCH case study
Wireless Networks ( IF 2.1 ) Pub Date : 2021-07-15 , DOI: 10.1007/s11276-021-02711-1
Yassine Boufenneche 1 , Nawel Gharbi 1 , Rafik Zitouni 2 , Laurent George 3
Affiliation  

Performance and communication security in the Internet of Things (IoT) area draw a major concern for both academic and industrial communities. Indeed, an emerging number of IoT protocols are getting involved in the protocol stack, implying that the need for new security measures is also increasing. The Media Access Control (MAC) protocol Time Slot Channel Hopping (TSCH) has recently gained significant popularity thanks to its reliability and robustness. It quickly became the basis of IPv6 over the TSCH mode of IEEE 802.15.4e (6TiSCH), a complete communication stack tailored for Industrial IoT networks. In this paper, we are interested in the lack of cooperation of some network nodes, referred to as selfishness, which often leads to network performance degradation. We introduce this concept in 6TiSCH networks for the first time, and we show how they get immunized. We first define a selfishness framework, and we integrate it into the 6top Protocol (6P). Then, we introduce a fuzzy logic-based technique enabling the detection of selfish nodes, along with an anticipatory countermeasure that tells cooperative nodes how to deal with selfish neighbors. We implement and integrate the proposed algorithms into the 6TiSCH simulator, and we conduct a thorough experimental study. Simulation results show how much the latency, Packet Delivery Ratio (PDR), and throughput are affected and how our proposal can significantly improve them.



中文翻译:

安全物联网网络中的自私:6TiSCH 案例研究

物联网 (IoT) 领域的性能和通信安全引起学术界和工业界的主要关注。事实上,越来越多的物联网协议正在参与协议栈,这意味着对新安全措施的需求也在增加。由于其可靠性和稳健性,媒体访问控制 (MAC) 协议时隙信道跳跃 (TSCH) 最近获得了极大的普及。它很快成为基于 IEEE 802.15.4e (6TiSCH) 的 TSCH 模式的 IPv6 的基础,这是一个为工业物联网网络量身定制的完整通信堆栈。在本文中,我们对一些网络节点缺乏合作感兴趣,称为自私,这往往会导致网络性能下降。我们首次在 6TiSCH 网络中引入这个概念,我们展示了他们如何获得免疫。我们首先定义一个自私框架,并将其集成到 6top 协议(6P)中。然后,我们引入了一种基于模糊逻辑的技术,能够检测自私节点,以及告诉合作节点如何处理自私邻居的预期对策。我们将所提出的算法实施并集成到 6TiSCH 模拟器中,并进行了彻底的实验研究。模拟结果显示了延迟、数据包传输率 (PDR) 和吞吐量受到的影响以及我们的建议如何显着改善它们。以及告诉合作节点如何处理自私邻居的预期对策。我们将所提出的算法实施并集成到 6TiSCH 模拟器中,并进行了彻底的实验研究。模拟结果显示了延迟、数据包传输率 (PDR) 和吞吐量受到的影响以及我们的建议如何显着改善它们。以及告诉合作节点如何处理自私邻居的预期对策。我们将所提出的算法实施并集成到 6TiSCH 模拟器中,并进行了彻底的实验研究。模拟结果显示了延迟、数据包传输率 (PDR) 和吞吐量受到的影响以及我们的建议如何显着改善它们。

更新日期:2021-07-16
down
wechat
bug