Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks

被引:42
|
作者
Ahmed, Firoz [1 ]
Ko, Young-Bae [1 ]
机构
[1] Ajou Univ, Dept Comp Engn, Suwon, South Korea
关键词
RPL; black hole attack; security; suspicious; verification; mitigation; RPL;
D O I
10.1002/sec.1684
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Routing Protocol for Low Power and Lossy Networks (RPL) has been standardized by the Internet Engineering Task Force to efficiently manage the functions of the network layer when providing Internet connectivity for wireless sensor networks. RPL has been designed for constrained devices and networks. Owing to their constrained nature, RPL-based networks can be exposed to a wide variety of security attacks. One of the most serious attacks in RPL is a black hole attack, where a malicious node silently drops all the packets that it is supposed to forward. This paper proposes a mitigation technique against black hole attack with low packet loss and high reliability. The proposed technique consists of a local decision and a global verification process. First, each node observes the communication behavior of its neighboring nodes by overhearing packets transmitted by its neighbors and attempts to identify suspicious nodes based on their behavior. In the second process, if a node identifies a suspicious node, then it verifies whether the suspicious node is a black hole. We demonstrate that the proposed approach increases packet delivery rate significantly and detects black hole attack effectively. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:5143 / 5154
页数:12
相关论文
共 50 条
  • [1] Investigating Routing Protocol Attacks on Low Power and Lossy IoT Networks
    Kiran U.
    Maurya P.
    Sharma H.
    SN Computer Science, 5 (4)
  • [2] Routing Protocol for Low Power Lossy Networks
    Amrita, Mercy C.
    Renold, Pravin A.
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 1457 - 1461
  • [3] Enhancing Routing Protocol for Low Power and Lossy Networks
    Hatem, John Abied
    Safa, Haidar
    El-Hajj, Wassim
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 753 - 758
  • [4] Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL)
    Wadhaj, Isam
    Ghaleb, Baraq
    Thomson, Craig
    Al-Dubai, Ahmed
    Buchanan, William J.
    IEEE ACCESS, 2020, 8 : 43665 - 43675
  • [5] Transient Multipath routing protocol for low power and lossy networks
    Lodhi, M. Ali
    Rehman, Abdul
    Khan, Meer M.
    Asfand-e-yar, Muhammad
    Hussain, Faisal Bashir
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (04): : 2002 - 2019
  • [6] Managing Internet Protocol Routing for Low Power Lossy Networks
    Pope, James
    Simon, Robert
    2010 IEEE GLOBECOM WORKSHOPS, 2010, : 642 - 647
  • [7] Mobility Support for the Routing Protocol in Low Power and Lossy Networks
    Lamaazi, Hanane
    Benamar, Nabil
    Imaduddin, Muhammad I.
    Habbal, Adib
    Jara, Antonio J.
    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016), 2016, : 809 - 814
  • [8] Survey on Routing Protocol for Low-Power and Lossy Networks
    Gadde, Deepak
    Chaudhari, M. S.
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2015, : 614 - 618
  • [9] Congestion Aware Routing Protocol for Low Power and Lossy Networks
    Chahal, Abheyjeet Singh
    Gupta, Deepti
    Kaur, Ravreet
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2018, 11 (10): : 51 - 63
  • [10] Performance Assessment of the Routing Protocol for Low Power and Lossy Networks
    Lamaazi, Hanane
    Benamar, Nabil
    Imaduddin, Muhammad Iqbal
    Jara, Antonio J.
    2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2015, : 187 - 194