Skip to main content

Research Repository

Advanced Search

Trust-aware and Cooperative Routing Protocol for IoT Security

Djedjig, Nabil; Tandjaoui, Djamel; Medjek, Faiza; Romdhani, Imed


Nabil Djedjig

Djamel Tandjaoui

Faiza Medjek


The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to internal attackers and selfish behaviours. To address the lack of robust security mechanisms in RPL, we designed a new Metric-based RPL Trustworthiness Scheme (MRTS) that introduces trust evaluation for secure routing topology construction. Extensive simulations show that MRTS is efficient and performant with respect to packet delivery ratio, energy consumption, and nodes’ rank changes. In addition, a mathematical modelling analysis shows that MRTS meets the requirements of consistency, optimality, and loop-freeness, and that the proposed trustbased routing metric has the isotonicity and monotonicity properties required for a routing protocol. By using game theory concepts, we formally describe MRTS as a strategy for the iterated Prisoner’s Dilemma and demonstrate its cooperation enforcement characteristic. Both mathematical analysis and evolutionary simulation results show clearly that MRTS, as a strategy is an effective approach in promoting the stability and the evolution of the Internet of Things network.


Djedjig, N., Tandjaoui, D., Medjek, F., & Romdhani, I. (2020). Trust-aware and Cooperative Routing Protocol for IoT Security. Journal of Information Security and Applications, 52, Article 102467.

Journal Article Type Article
Acceptance Date Feb 14, 2020
Online Publication Date Feb 28, 2020
Publication Date 2020-06
Deposit Date Feb 14, 2020
Publicly Available Date Mar 1, 2021
Publisher Elsevier
Peer Reviewed Peer Reviewed
Volume 52
Article Number 102467
Keywords RPL, Secure routing, Internet of things, Trust management, Game theory, Cooperation enforcement
Public URL


You might also like

Downloadable Citations

Whoops, looks like something went wrong.