Security Vulnerabilities and Countermeasures in the RPL-based Internet of Things

被引:6
|
作者
Yang, Wei [1 ]
Wang, Yuan [1 ]
Lai, Zhixiang [1 ]
Wan, Yadong [2 ]
Cheng, Zhuo [3 ]
机构
[1] Jiangxi Normal Univ, Sch Software, Nanchang, Jiangxi, Peoples R China
[2] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
[3] Jiangxi Normal Univ, Int S&T Cooperat Base Networked Supporting Softwa, Nanchang, Jiangxi, Peoples R China
来源
2018 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC 2018) | 2018年
基金
中国国家自然科学基金;
关键词
Internet of Things; RPL; Security; Finite State Machine; PROTOCOL;
D O I
10.1109/CyberC.2018.00020
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
RPL is a routing protocol for Low-Power and Lossy Networks, which is the routing protocol standardized for the Internet of Things (IoT). However, RPL has many serious vulnerabilities which can be exploited by attackers. In this paper, we adopt an finite state machines(FSM) based vulnerability discovering approach to analyze the security vulnerabilities of RPL, which can successfully discover sinkhole attack, selective forwarding attack and hello flood attack. Then we propose some security countermeasures to defend against the attacks. Finally, we run a thorough set of simulations to assess the impact of the sinkhole attack and the effectiveness of proposed countermeasure. The results show that the attack can significantly damage the RPL and the countermeasure can successfully detect the malicious node.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 50 条
  • [41] Trust-Based and Optimized RPL Routing in Social Internet of Things Network
    Selvaraj, S.
    Thangarajan, R.
    Saravanan, M.
    MOBILE COMPUTING AND SUSTAINABLE INFORMATICS, 2022, 68 : 513 - 529
  • [42] Security of internet of things based on cryptographic algorithms: a survey
    Mousavi, Seyyed Keyvan
    Ghaffari, Ali
    Besharat, Sina
    Afshari, Hamed
    WIRELESS NETWORKS, 2021, 27 (02) : 1515 - 1555
  • [43] Analysis of Security Vulnerabilities and Countermeasures
    Son, Hyun-Min
    Joo, Nak-Keun
    Choi, Hyun-Taek
    Lee, Hyun-Cheol
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 200 - 206
  • [44] The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things
    Verma, Abhishek
    Ranga, Virender
    COMPUTING, 2021, 103 (07) : 1479 - 1500
  • [45] Security Vulnerabilities and Countermeasures in MPSoCs
    Sant'Ana, Anderson Camargo
    Medina, Henrique
    Moraes, Fernando Gehm
    IEEE DESIGN & TEST, 2021, 38 (04) : 70 - 77
  • [46] A survey on the Internet of Things security State-of-art, architecture, issues and countermeasures
    Yousuf, Omerah
    Mir, Roohie Naaz
    INFORMATION AND COMPUTER SECURITY, 2019, 27 (02) : 292 - 323
  • [47] A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things
    Al-Amiedy, Taief Alaa
    Anbar, Mohammed
    Belaton, Bahari
    Kabla, Arkan Hammoodi Hasan
    Hasbullah, Iznan H.
    Alashhab, Ziyad R.
    SENSORS, 2022, 22 (09)
  • [48] A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures
    Swessi, Dorsaf
    Idoudi, Hanen
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (02) : 1557 - 1592
  • [49] Security Requirements and Countermeasures for Secure Home Network in Internet of Things
    Moon, Seo Yeon
    Singh, Saurabh
    Park, Jong Hyuk
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 396 - 400
  • [50] Modern security threats in the Internet of Things (IoT): Attacks and Countermeasures
    Rajendran, Gowthamaraj
    Nivash, Ragul R. S.
    Parthy, Purushotham Parthiban
    Balamurugan, S.
    2019 IEEE 53RD INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST 2019), 2019,