{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:13:53Z","timestamp":1775067233554,"version":"3.50.1"},"reference-count":56,"publisher":"MDPI AG","issue":"18","license":[{"start":{"date-parts":[[2022,9,17]],"date-time":"2022-09-17T00:00:00Z","timestamp":1663372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100007446","name":"King Khalid University","doi-asserted-by":"publisher","award":["RGP.2\/111\/43"],"award-info":[{"award-number":["RGP.2\/111\/43"]}],"id":[{"id":"10.13039\/501100007446","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with the increase in the number of IoT applications and devices globally. To address routing attacks in RPL-based IoT, several security solutions have been proposed in literature, such as machine learning techniques, intrusion detection systems, and trust-based approaches. Studies show that trust-based security for IoT is feasible due to its simple integration and resource-constrained nature of smart devices. Existing trust-based solutions have insufficient consideration of nodes\u2019 mobility and are not evaluated for dynamic scenarios to satisfy the requirements of smart applications. This research work addresses the Rank and Blackhole attacks in RPL considering the static as well as mobile nodes in IoT. The proposed Security, Mobility, and Trust-based model (SMTrust) relies on carefully chosen trust factors and metrics, including mobility-based metrics. The evaluation of the proposed model through simulation experiments shows that SMTrust performs better than the existing trust-based methods for securing RPL. The improvisation in terms of topology stability is 46%, reduction in packet loss rate is 45%, and 35% increase in throughput, with only 2.3% increase in average power consumption.<\/jats:p>","DOI":"10.3390\/s22187052","type":"journal-article","created":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T04:49:22Z","timestamp":1663562962000},"page":"7052","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":48,"title":["A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2960-1814","authenticated-orcid":false,"given":"Syeda Mariam","family":"Muzammal","sequence":"first","affiliation":[{"name":"University Institute of Information Technology, PMAS Arid Agriculture University, Rawalpindi 46000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9500-1361","authenticated-orcid":false,"given":"Raja Kumar","family":"Murugesan","sequence":"additional","affiliation":[{"name":"School of Computer Science, SCE, Taylor\u2019s University Lakeside Campus, Subang Jaya 47500, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8116-4733","authenticated-orcid":false,"given":"Noor Zaman","family":"Jhanjhi","sequence":"additional","affiliation":[{"name":"School of Computer Science, SCE, Taylor\u2019s University Lakeside Campus, Subang Jaya 47500, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6339-2257","authenticated-orcid":false,"given":"Mamoona","family":"Humayun","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Computer and Information Sciences, Jouf University, Sakaka 72388, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5526-3623","authenticated-orcid":false,"given":"Ashraf Osman","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"Faculty of Computing and Informatics, University Malaysia Sabah, Kota Kinabalu 88400, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7474-9100","authenticated-orcid":false,"given":"Abdelzahir","family":"Abdelmaboud","sequence":"additional","affiliation":[{"name":"Department of Information Systems, King Khalid University, Muhayel Aseer 61913, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2022,9,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"60539","DOI":"10.1109\/ACCESS.2020.2983117","article-title":"Lightweight authenticated-encryption scheme for internet of things based on publish-subscribe communication","volume":"8","author":"Diro","year":"2020","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"20722","DOI":"10.1109\/ACCESS.2018.2826225","article-title":"Counter measuring conceivable security threats on smart healthcare devices","volume":"6","author":"Muzammal","year":"2018","journal-title":"IEEE Access"},{"key":"ref_3","unstructured":"CISCO (2018, December 16). Cisco\u2019s Talos Intelligence Group Blog: New VPNFilter Malware Targets at Least 500K Networking Devices Worldwide. Available online: https:\/\/blog.talosintelligence.com\/2018\/05\/VPNFilter.html."},{"key":"ref_4","unstructured":"Statista (2020, May 26). Number of Connected Devices Worldwide 2030 | Statista. Statista Research Department. Available online: https:\/\/www.statista.com\/statistics\/802690\/worldwide-connected-devices-by-access-technology\/."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Muzammal, S.M.S.M., and Shah, M.A.M.A. (2016, January 7\u20138). ScreenStealer: Addressing screenshot attacks on android devices. Proceedings of the 2016 22nd International Conference on Automation and Computing, ICAC 2016: Tackling the New Challenges in Automation and Computing, Colchester, UK.","DOI":"10.1109\/IConAC.2016.7604942"},{"key":"ref_6","unstructured":"Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J.P., and Alexander, R. (2012). RFC 6550-RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks, Internet Engineering Task Force."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"102096","DOI":"10.1016\/j.adhoc.2020.102096","article-title":"Proposing a secure RPL based internet of things routing protocol: A review","volume":"101","author":"Almusaylim","year":"2020","journal-title":"Ad Hoc Netw."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3494524","article-title":"Assessment of routing attacks and mitigation techniques with RPL control messages: A survey","volume":"55","author":"Bang","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2735","DOI":"10.1007\/s11277-022-09487-3","article-title":"An integrated exploration on internet of things and wireless sensor networks","volume":"124","author":"Sharma","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1007\/s12243-018-0645-4","article-title":"Detection of rank attack in routing protocol for low power and lossy networks","volume":"73","author":"Shafique","year":"2018","journal-title":"Ann. Telecommun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"7497","DOI":"10.1109\/JIOT.2020.3040775","article-title":"Robust, secure and adaptive trust-oriented service selection in IoT-based smart buildings","volume":"8","author":"Altaf","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1607","DOI":"10.1007\/s11277-019-06347-5","article-title":"Jensen\u2013Shannon divergence based independent component analysis to detect and prevent black hole attacks in healthcare WSN","volume":"107","author":"Sunder","year":"2019","journal-title":"Wirel. Pers. Commun."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"15249","DOI":"10.1109\/JIOT.2020.3047642","article-title":"A detection framework against CPMA attack based on trust evaluation and machine learning in IoT network","volume":"8","author":"Liu","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1016\/j.future.2018.03.021","article-title":"SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things","volume":"93","author":"Airehrour","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_15","first-page":"102467","article-title":"Trust-aware and cooperative routing protocol for IoT security","volume":"52","author":"Djedjig","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"3555","DOI":"10.1007\/s11227-018-2700-3","article-title":"Dynamic and comprehensive trust model for IoT and its integration into RPL","volume":"75","author":"Hashemi","year":"2019","journal-title":"J. Supercomput."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/TSUSC.2018.2839623","article-title":"Machine learning based trust computational model for IoT services","volume":"4","author":"Jayasinghe","year":"2019","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"102409","DOI":"10.1016\/j.jnca.2019.102409","article-title":"Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges","volume":"145","author":"Ahmed","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Sagar, S., Mahmood, A., Kumar, J., and Sheng, Q.Z. (2020, January 7\u201311). A Time-aware similarity-based trust computational model for social Internet of Things. Proceedings of the 2020 IEEE Global Communications Conference GLOBECOM, Taipei, Taiwan.","DOI":"10.1109\/GLOBECOM42002.2020.9322540"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"4186","DOI":"10.1109\/JIOT.2020.3031162","article-title":"A comprehensive review on secure routing in Internet of Things: Mitigation methods and trust-based approaches","volume":"8","author":"Muzammal","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Muzammal, S.M., Murugesan, R.K., Jhanjhi, N.Z., and Jung, L.T. (2020, January 8\u20139). SMTrust: Proposing trust-based secure routing protocol for RPL attacks for IoT applications. Proceedings of the 2020 International Conference on Computational Intelligence (ICCI), Bandar Seri Iskandar, Malaysia.","DOI":"10.1109\/ICCI51257.2020.9247818"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Li, S., and Xu, L.D. (2017). Security in enabling technologies. Securing the Internet of Things, Syngress.","DOI":"10.1016\/B978-0-12-804458-2.00006-8"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1582","DOI":"10.1109\/COMST.2018.2885894","article-title":"Routing attacks and mitigation methods for RPL-based Internet of Things","volume":"21","author":"Raoof","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"183678","DOI":"10.1109\/ACCESS.2020.3029191","article-title":"Rpl attack detection and prevention in the Internet of Things networks using a gru based deep learning","volume":"8","author":"Cakir","year":"2020","journal-title":"IEEE Access"},{"key":"ref_25","unstructured":"Bao, Z., Shi, W., He, D., and Chood, K.-K.R. (2018). IoTChain: A three-tier blockchain-based IoT security architecture. arXiv."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-319-70578-1_7","article-title":"AntibIoTic: Protecting IoT devices against DDoS attacks","volume":"717","author":"Dragoni","year":"2018","journal-title":"Adv. Intell. Syst. Comput."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/MCOM.2017.1600993","article-title":"Traffic-aware patching for cyber security in mobile IoT","volume":"55","author":"Cheng","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Mcdermott, C.D., Petrovski, A.V., and Shabestari, F.M. (2018, January 8\u201313). Botnet detection in the Internet of Things using deep learning approaches. Proceedings of the 2018 International Joint Conference on Neural Networks (IJCNN), Rio de Janeiro, Brazil.","DOI":"10.1109\/IJCNN.2018.8489489"},{"key":"ref_29","first-page":"41","article-title":"A Trust-based defence scheme for mitigating blackhole and selective forwarding attacks in the RPL routing protocol","volume":"6","author":"Airehrour","year":"2018","journal-title":"Aust. J. Telecommun. Digit. Econ."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"108413","DOI":"10.1016\/j.comnet.2021.108413","article-title":"A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest\u2013RFTRUST","volume":"198","author":"Prathapchandran","year":"2021","journal-title":"Comput. Netw."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1080\/19393555.2021.1887413","article-title":"PCC-RPL: An efficient trust-based security extension for RPL","volume":"31","author":"Pishdar","year":"2022","journal-title":"Inf. Secur. J. A Glob. Perspect."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Rakesh, B. (2021). Novel authentication and secure trust based RPL routing in mobile sink supported Internet of Things. Cyber-Phys. Syst., 1\u201334.","DOI":"10.1080\/23335777.2021.1933194"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Guo, G. (2021, January 27\u201330). A Lightweight countermeasure to DIS attack in RPL routing protocol. Proceedings of the 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC51732.2021.9376041"},{"key":"ref_34","first-page":"1","article-title":"A secure routing protocol for low power and lossy networks based 6LoWPAN networks to mitigate DIS flooding attacks","volume":"2021","author":"Abhinaya","year":"2021","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"101525","DOI":"10.1016\/j.pmcj.2021.101525","article-title":"A lightweight distributed detection algorithm for DDAO Attack on RPL routing protocol in Internet of Things","volume":"80","author":"Sheibani","year":"2022","journal-title":"Pervasive Mob. Comput."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"642","DOI":"10.1007\/s12083-021-01275-3","article-title":"EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based Internet of Things","volume":"15","author":"Bang","year":"2022","journal-title":"Peer-Peer Netw. Appl."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/978-981-16-1866-6_36","article-title":"Trust-based and optimized RPL routing in social Internet of Things network","volume":"Volume 68","author":"Selvaraj","year":"2022","journal-title":"Lecture Notes on Data Engineering and Communications Technologies"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1303","DOI":"10.1007\/s10586-021-03528-5","article-title":"Mitigating the worst parent attack in RPL based Internet of Things","volume":"25","author":"Sahay","year":"2022","journal-title":"Clust. Comput."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"e5007","DOI":"10.1002\/dac.5007","article-title":"A reputation-based RPL protocol to detect selective forwarding attack in Internet of Things","volume":"35","author":"Patel","year":"2022","journal-title":"Int. J. Commun. Syst."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Djedjig, N., Tandjaoui, D., Medjek, F., and Romdhani, I. (2017, January 4\u20136). New trust metric for the RPL routing protocol. Proceedings of the 2017 8th International Conference on Information and Communication Systems, ICICS 2017, Irbid, Jordan.","DOI":"10.1109\/IACS.2017.7921993"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"5432","DOI":"10.1109\/JIOT.2019.2902022","article-title":"CTRUST: A dynamic trust model for collaborative applications in the Internet of Things","volume":"6","author":"Adewuyi","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1166\/jmihi.2020.2851","article-title":"A novel security and energy efficient data aggregation for medical Internet of Things using trust","volume":"10","author":"Nandhini","year":"2020","journal-title":"J. Med. Imaging Health Inform."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.jnca.2019.02.024","article-title":"Trust models of Internet of Smart Things: A survey, open issues, and future directions","volume":"137","author":"Altaf","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1581","DOI":"10.1007\/s11277-018-5778-2","article-title":"A dummy packet-based hybrid security framework for mitigating routing misbehavior in multi-hop wireless networks","volume":"101","author":"Sakthivel","year":"2018","journal-title":"Wirel. Pers. Commun."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Mehta, R., and Parmar, M.M. (2018, January 6\u20138). Trust based mechanism for securing IoT routing protocol RPL against wormhole grayhole attacks. Proceedings of the 2018 3rd International Conference for Convergence in Technology, I2CT 2018, Pune, India.","DOI":"10.1109\/I2CT.2018.8529426"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Gadde, D., and Chaudhari, M.S. (2018). Reliable data delivery on the basis of trust evaluation in WSN. Information and Communication Technology for Sustainable Development, Springer.","DOI":"10.1007\/978-981-10-3920-1_6"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"2227","DOI":"10.1007\/s11276-016-1284-1","article-title":"Refined trust energy-Ad Hoc on demand distance vector (ReTE-AODV) routing algorithm for secured routing in MANET","volume":"23","author":"Kannan","year":"2017","journal-title":"Wirel. Networks"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Thulasiraman, P., and Wang, Y. (2019, January 11\u201314). A lightweight trust-based security architecture for RPL in mobile IoT networks. Proceedings of the 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC.2019.8651846"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1729","DOI":"10.1007\/s11277-019-06809-w","article-title":"Towards a light weight routing security in IoT using non-cooperative game models and Dempster\u2013Shaffer theory","volume":"110","author":"Kiran","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Dai, C., and Gong, W. (2010, January 22\u201323). Model of services trust threshold assess based on fuzzy theory. Proceedings of the 2010 2nd International Conference on E-Business and Information System Security, EBISS 2010, Wuhan, China.","DOI":"10.1109\/EBISS.2010.5473596"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/TII.2013.2258930","article-title":"A survey of networking challenges and routing protocols in smart grids","volume":"10","author":"Sabbah","year":"2014","journal-title":"IEEE Trans. Ind. Informatics"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Le, A., Loo, J., Chai, K., and Aiash, M. (2016). A specification-based IDS for detecting attacks on RPL-based network topology. Information, 7.","DOI":"10.3390\/info7020025"},{"key":"ref_53","unstructured":"ENISA (2020, July 02). Cyber Security and Resilience for Smart Hospitals\u2014ENISA, Available online: https:\/\/www.enisa.europa.eu\/publications\/cyber-security-and-resilience-for-smart-hospitals."},{"key":"ref_54","unstructured":"(2020, November 20). BonnMotion. Available online: http:\/\/sys.cs.uos.de\/bonnmotion\/download.shtml."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Gnawali, O., and Levis, P. (2012). RFC 6719-The Minimum Rank with Hysteresis Objective Function, Internet Engineering Task Force.","DOI":"10.17487\/rfc6719"},{"key":"ref_56","unstructured":"Jiang, J., and Liu, Y. (2022). Secure IoT routing: Selective forwarding attacks and trust-based defenses in RPL network. arXiv."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/18\/7052\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:33:40Z","timestamp":1760142820000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/18\/7052"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,17]]},"references-count":56,"journal-issue":{"issue":"18","published-online":{"date-parts":[[2022,9]]}},"alternative-id":["s22187052"],"URL":"https:\/\/doi.org\/10.3390\/s22187052","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,17]]}}}