Abstract

The intricate features and autonomous configuration of Routing Protocol for Low-power and Lossy Networks (RPL) make it challenging to provide a key management solution and deploy it on constrained resources sensing systems. So far, various types of attacks, such as rank attacks, have been identified on this protocol, so it is necessary to take appropriate countermeasures to mitigate and isolate their effects. This paper proposes the Moth-Flame Optimization-based secure scheme for RPL (MFO-RPL) to optimize the routing process and rank attack detection in RPL. MFO-RPL uses the petal algorithm to select the next-hop nodes and form the optimal path between the source and root in the graph. Then, rank attacks in RPL are detected using the Moth-Flame algorithm to prevent malicious nodes from being selected as the preferred parent. Simulation findings under different scenarios revealed that MFO-RPL has fewer lost packets, rank switching, convergence time, and attacks than comparative schemes.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call