Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Secure opportunistic routing in 2-hop IEEE 802.15.4 networks with SMOR
Uppsala University, Sweden.
RISE Research Institutes of Sweden, Digital Systems, Data Science. Uppsala University, Sweden.ORCID iD: 0000-0002-2586-8573
2024 (English)In: Computer Communications, ISSN 0140-3664, E-ISSN 1873-703X, Vol. 217, p. 57-69Article in journal (Refereed) Published
Abstract [en]

The IEEE 802.15.4 radio standard features the possibility for IEEE 802.15.4 nodes to run on batteries for several years. This is made possible by duty-cycling medium access control (MAC) protocols, which allow IEEE 802.15.4 nodes to leave their radios in energy-saving sleep modes most of the time. Yet, duty-cycling MAC protocols usually incur long routing delays since it may take a while until a particular forwarder becomes available for forwarding a packet. Opportunistic routing alleviates this problem by opportunistically using a currently available forwarder, rather than waiting for a particular forwarder. Among all opportunistic routing schemes, so-called dynamic switch-based forwarding (DSF) schemes are most promising from a security and practical perspective, but some security and reliability issues with them persist. In this paper, we propose secure multipath opportunistic routing (SMOR), a DSF scheme that improves on current DSF schemes in three regards. First, SMOR builds on a denial-of-sleep-resilient MAC layer. Current DSF schemes, by comparison, rest on MAC protocols that put the limited energy reserves of battery-powered IEEE 802.15.4 nodes at risk. Second, SMOR operates in a distributed fashion and efficiently supports point-to-point traffic. All current DSF schemes, by contrast, suffer from a single point of failure and focus on convergecast traffic. Third, SMOR duplicates packets on purpose and routes them along disjoint paths. This makes SMOR tolerant of compromises of single IEEE 802.15.4 nodes, whereas current DSF schemes lack intrusion tolerance. We integrated SMOR into the network stack of the Contiki-NG operating system and benchmarked SMOR against the Routing Protocol for Low-Power and Lossy Networks (RPL) with the Cooja network simulator. Indeed, SMOR turns out to improve on RPL’s delays by between 33.51% and 39.84%, depending on the exact configurations and network dynamics. Furthermore, SMOR achieves between 0.16% and 2.03% higher mean packet delivery ratios (PDRs), thereby attaining mean PDRs of 99.999% in all simulated scenarios. Beyond that, SMOR has only a fraction of RPL’s memory requirements. SMOR’s intrusion tolerance, on the other hand, increases the mean energy consumption per IEEE 802.15.4 node by between 1.55% and 2.74% compared to RPL in our simulations. SMOR specifically targets IEEE 802.15.4 networks with a network diameter of 2, such as body area networks. © 2024 The Authors

Place, publisher, year, edition, pages
Elsevier B.V. , 2024. Vol. 217, p. 57-69
Keywords [en]
Energy conservation; Fault tolerance; IEEE Standards; Low power electronics; Medium access control; Network security; Power management (telecommunication); Routing protocols; Current dynamics; Duty-cycling; IEEE 802.15.4 networks; Ieee 802.15.4/zigbee; Intrusion tolerance; Medium access control protocols; Multipath; Opportunistic routing; Packet delivery ratio; Secure routing; Internet of things
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:ri:diva-72822DOI: 10.1016/j.comcom.2024.01.024Scopus ID: 2-s2.0-85185186272OAI: oai:DiVA.org:ri-72822DiVA, id: diva2:1857820
Note

This work was supported by the Swedish Foundation for Strategic Research [grant number 2017-045989 ].

Available from: 2024-05-14 Created: 2024-05-14 Last updated: 2024-05-14Bibliographically approved

Open Access in DiVA

fulltext(1287 kB)42 downloads
File information
File name FULLTEXT01.pdfFile size 1287 kBChecksum SHA-512
389de9f3b8ab67305a17fff66ed49248d8f9ab2d3bc791c20e6052db534e9a4ee1718b53594a775e39bd44d02ad138afdbcb3ef0f2017022ed86d5c68b6fec3b
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Voigt, Thiemo

Search in DiVA

By author/editor
Voigt, Thiemo
By organisation
Data Science
In the same journal
Computer Communications
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 42 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 66 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf