Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks

被引:42
作者
Ahmed, Firoz [1 ]
Ko, Young-Bae [1 ]
机构
[1] Ajou Univ, Dept Comp Engn, Suwon, South Korea
关键词
RPL; black hole attack; security; suspicious; verification; mitigation; RPL;
D O I
10.1002/sec.1684
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Routing Protocol for Low Power and Lossy Networks (RPL) has been standardized by the Internet Engineering Task Force to efficiently manage the functions of the network layer when providing Internet connectivity for wireless sensor networks. RPL has been designed for constrained devices and networks. Owing to their constrained nature, RPL-based networks can be exposed to a wide variety of security attacks. One of the most serious attacks in RPL is a black hole attack, where a malicious node silently drops all the packets that it is supposed to forward. This paper proposes a mitigation technique against black hole attack with low packet loss and high reliability. The proposed technique consists of a local decision and a global verification process. First, each node observes the communication behavior of its neighboring nodes by overhearing packets transmitted by its neighbors and attempts to identify suspicious nodes based on their behavior. In the second process, if a node identifies a suspicious node, then it verifies whether the suspicious node is a black hole. We demonstrate that the proposed approach increases packet delivery rate significantly and detects black hole attack effectively. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:5143 / 5154
页数:12
相关论文
共 21 条
  • [1] Alexander R. K., 2015, SECURITY THREAT ANAL
  • [2] The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks
    Anhtuan Le
    Loo, Jonathan
    Lasebae, Aboubaker
    Vinel, Alexey
    Chen, Yue
    Chai, Michael
    [J]. IEEE SENSORS JOURNAL, 2013, 13 (10) : 3685 - 3692
  • [3] [Anonymous], INT S AUT DEC SYST A
  • [4] [Anonymous], 2011, T201113 SICS DEP COM
  • [5] Chugh K., 2012, SEC INT C EM SEC IN, P157
  • [6] Routing security in wireless ad hoc networks
    Deng, HM
    Li, W
    Agrawal, DP
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 70 - 75
  • [7] Dunkels A, 2004, CONF LOCAL COMPUT NE, P455
  • [8] Dvir A., 2011, 2011 IEEE 8th International Conference on Mobile Ad-Hoc and Sensor Systems, P709, DOI 10.1109/MASS.2011.76
  • [9] Gao H, 2014, DETECTION DEFENSE TE, P601
  • [10] Robust routing in wireless ad hoc networks
    Lee, SJ
    Han, BY
    Shin, M
    [J]. 2002 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, PROCEEDINGS OF THE WORKSHOPS, 2002, : 73 - 78