Detecting Rules-related Attacks in RPL-based Resource-Constrained Wireless Networks

被引:1
作者
Althubaity, Areej [1 ]
Ammar, Reda [1 ]
Han, Song [1 ]
机构
[1] Univ Connecticut, Storrs, CT 06269 USA
来源
2020 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT 2020) | 2020年
关键词
LLNs; RPL; intrusion detection system (IDS); INTERNET;
D O I
10.1109/ISSPIT51521.2020.9408941
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Routing Protocol for Low Power and Lossy Networks (RPL) was designed to meet the routing requirements of resource-constrained wireless networks to support different topologies as well as various Quality of Services (QoS). In RPL, nodes carefully select the best routes toward the root and avoid routing loops according to their locations in the network. Unfortunately, nodes can be compromised to perform a variety of internal attacks against the RPL rules. To improve the security within the RPL-based networks, in this paper, we extend a centralized Intrusion Detection System (IDS) called ARM, with specification-based intrusion modules added to both the root and the RPL nodes to enhance their ability in detecting a wider range of RPL rules-related attacks. Our extensive simulation results show that the proposed IDS, ARM-Pro, can achieve high accuracy in detecting the RPL rules-related attacks while incurring a moderate overhead on the devices resources.
引用
收藏
页数:8
相关论文
共 22 条
[1]   Security in Internet of Things: issues, challenges, taxonomy, and architecture [J].
Adat, Vipindev ;
Gupta, B. B. .
TELECOMMUNICATION SYSTEMS, 2018, 67 (03) :423-441
[2]  
Althubaity A., 2017, IEEE INT C EMERG, P1
[3]  
Althubaity A., 2020, ICPS
[4]  
[Anonymous], 2011, POWERTRACE NETWORK L
[5]  
Cervantes C, 2015, PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), P606, DOI 10.1109/INM.2015.7140344
[6]  
Guo J., 2012, SENSORCOMM 2012 6 IN, P59
[7]   Survey on RPL enhancements: A focus on topology, security and mobility [J].
Kamgueu, Patrick Olivier ;
Nataf, Emmanuel ;
Ndie, Thomas Djotio .
COMPUTER COMMUNICATIONS, 2018, 120 :10-21
[8]   RPL-Based Routing Protocols in IoT Applications: A Review [J].
Kharrufa, Harith ;
Al-Kashoash, Hayder A. A. ;
Kemp, Andrew H. .
IEEE SENSORS JOURNAL, 2019, 19 (15) :5952-5967
[9]  
Le A, 2013, IEEE SYMP COMP COMMU
[10]   A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology [J].
Le, Anhtuan ;
Loo, Jonathan ;
Chai, Kok Keong ;
Aiash, Mahdi .
INFORMATION, 2016, 7 (02)