Security Vulnerabilities and Countermeasures in the RPL-based Internet of Things

被引:6
|
作者
Yang, Wei [1 ]
Wang, Yuan [1 ]
Lai, Zhixiang [1 ]
Wan, Yadong [2 ]
Cheng, Zhuo [3 ]
机构
[1] Jiangxi Normal Univ, Sch Software, Nanchang, Jiangxi, Peoples R China
[2] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
[3] Jiangxi Normal Univ, Int S&T Cooperat Base Networked Supporting Softwa, Nanchang, Jiangxi, Peoples R China
来源
2018 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC 2018) | 2018年
基金
中国国家自然科学基金;
关键词
Internet of Things; RPL; Security; Finite State Machine; PROTOCOL;
D O I
10.1109/CyberC.2018.00020
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
RPL is a routing protocol for Low-Power and Lossy Networks, which is the routing protocol standardized for the Internet of Things (IoT). However, RPL has many serious vulnerabilities which can be exploited by attackers. In this paper, we adopt an finite state machines(FSM) based vulnerability discovering approach to analyze the security vulnerabilities of RPL, which can successfully discover sinkhole attack, selective forwarding attack and hello flood attack. Then we propose some security countermeasures to defend against the attacks. Finally, we run a thorough set of simulations to assess the impact of the sinkhole attack and the effectiveness of proposed countermeasure. The results show that the attack can significantly damage the RPL and the countermeasure can successfully detect the malicious node.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 50 条
  • [1] Denial-of-Service Attacks and Countermeasures in the RPL-Based Internet of Things
    Ioulianou, Philokypros P.
    Vassilakis, Vassilios G.
    COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 374 - 390
  • [2] Security Attacks and Secure Routing Protocols in RPL-based Internet of Things: Survey
    Kamble, Arvind
    Malemath, Virendra S.
    Patil, Deepika
    2017 INTERNATIONAL CONFERENCE ON EMERGING TRENDS & INNOVATION IN ICT (ICEI), 2017, : 33 - 39
  • [3] Routing Attacks and Mitigation Methods for RPL-Based Internet of Things
    Raoof, Ahmed
    Matrawy, Ashraf
    Lung, Chung-Horng
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1582 - 1606
  • [4] The DAO Induction Attack Against the RPL-based Internet of Things
    Baghani, Ahmad Shabani
    Rahimpour, Sonbol
    Khabbazian, Majid
    2020 28TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2020, : 379 - 383
  • [5] Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses
    Pu, Cong
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) : 4937 - 4949
  • [6] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644
  • [7] Replay attacks in RPL-based Internet of Things: Comparative and empirical study
    Albinali, Hussah
    Azzedin, Farag
    COMPUTER NETWORKS, 2025, 257
  • [8] A Softwarized Intrusion Detection System for the RPL-based Internet of Things networks
    Violettas, George
    Simoglou, George
    Petridou, Sophia
    Mamatas, Lefteris
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 125 : 698 - 714
  • [9] Detection of malicious packet dropping attacks in RPL-based internet of things
    Shin, Sooyeon
    Kim, Kyounghoon
    Kwon, Taekyoung
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2019, 31 (02) : 133 - 141
  • [10] Securing RPL-Based Internet of Things applied for water pipeline monitoring
    Elleuchi, Manel
    Boujeleben, Manel
    Abid, Mohamed
    BenSaleh, Mohammed S.
    2017 25TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2017, : 404 - 410