A Distributed and Cooperative Verification Mechanism to Defend against DODAG Version Number Attack in RPL

被引:19
作者
Ahmed, Firoz [1 ]
Ko, Young-Bae [1 ]
机构
[1] Ajou Univ, Dept Comp Engn, Suwon, South Korea
来源
PECCS: PROCEEDINGS OF THE 6TH INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND EMBEDDED COMPUTING AND COMMUNICATION SYSTEMS | 2016年
关键词
RPL; DODAG Version Number Attack; Security; Distributed; Cooperative;
D O I
10.5220/0005930000550062
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To design a routing protocol for Low-power and Lossy Networks (LLNs), the IETF developed RPL (Routing Protocol for Low-power and lossy network) which is novel, standard and light weight routing protocol standardized for constrained environment and does not have the functionality like of traditional routing protocols. Providing security in RPL is still challenging as the devices are connected to the vulnerable Internet, limited resources, and the communication links are lossy. Therefore, an attacker can easily exploit the functionalities of RPL protocol. RPL exposed to a variety of attacks. One of the most inconsistency topological attacks is DODAG version number attack. In this paper, we proposed a distributed and cooperative verification mechanism to securely defend against the DODAG version number attack with low control overhead and high reliability. Simulation results show that the proposed approach defends DODAG version number attack reliably and reduces control overhead significantly.
引用
收藏
页码:55 / 62
页数:8
相关论文
共 18 条
[1]   The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks [J].
Anhtuan Le ;
Loo, Jonathan ;
Lasebae, Aboubaker ;
Vinel, Alexey ;
Chen, Yue ;
Chai, Michael .
IEEE SENSORS JOURNAL, 2013, 13 (10) :3685-3692
[2]  
[Anonymous], 2012, 2012 20 IEEE INT C N
[3]  
[Anonymous], P 1 C S NETW SYST DE
[4]  
[Anonymous], 2011, T201113 SICS DEP COM
[5]  
Chugh K., 2012, SEC INT C EM SEC IN, P157
[6]  
Dunkels A, 2004, CONF LOCAL COMPUT NE, P455
[7]  
Dvir A., 2011, 2011 IEEE 8th International Conference on Mobile Ad-Hoc and Sensor Systems, P709, DOI 10.1109/MASS.2011.76
[8]  
Kushalnagar N., 2007, RFC 4919: IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals, P1
[9]  
Le A, 2011, IFIP WIREL DAY
[10]   Low false alarm attackers detection in RPL by considering timing inconstancy between the rank measurements [J].
Matsunaga, Takumi ;
Toyoda, Kentaroh ;
Sasase, Iwao .
IEICE COMMUNICATIONS EXPRESS, 2015, 4 (02) :44-49