Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks

被引:42
|
作者
Ahmed, Firoz [1 ]
Ko, Young-Bae [1 ]
机构
[1] Ajou Univ, Dept Comp Engn, Suwon, South Korea
关键词
RPL; black hole attack; security; suspicious; verification; mitigation; RPL;
D O I
10.1002/sec.1684
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Routing Protocol for Low Power and Lossy Networks (RPL) has been standardized by the Internet Engineering Task Force to efficiently manage the functions of the network layer when providing Internet connectivity for wireless sensor networks. RPL has been designed for constrained devices and networks. Owing to their constrained nature, RPL-based networks can be exposed to a wide variety of security attacks. One of the most serious attacks in RPL is a black hole attack, where a malicious node silently drops all the packets that it is supposed to forward. This paper proposes a mitigation technique against black hole attack with low packet loss and high reliability. The proposed technique consists of a local decision and a global verification process. First, each node observes the communication behavior of its neighboring nodes by overhearing packets transmitted by its neighbors and attempts to identify suspicious nodes based on their behavior. In the second process, if a node identifies a suspicious node, then it verifies whether the suspicious node is a black hole. We demonstrate that the proposed approach increases packet delivery rate significantly and detects black hole attack effectively. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:5143 / 5154
页数:12
相关论文
共 50 条
  • [21] Evaluation of Routing Protocol for Low Power and Lossy Networks: LOADng and RPL
    Yi, Jiazi
    Clausen, Thomas
    Igarashi, Yuichi
    2013 IEEE CONFERENCE ON WIRELESS SENSOR (ICWISE), 2013, : 19 - 24
  • [22] A secure routing protocol for low power and lossy networks based 6LoWPAN networks to mitigate DIS flooding attacks
    Abhinaya, E. V.
    Sudhakar, B.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
  • [23] Efficient routing protocol for IoT networks based on fog computing and routing protocol of low-power lossy networks
    Verma, Ankit
    Deswal, Suman
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2023, 16 (03) : 176 - 184
  • [24] Link Quality Aware Routing Protocol for Low-power and Lossy Networks
    Wang, Sheng-Shih
    Liu, Hsing-Tsai
    Chen, Yen-Da
    2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 2588 - 2593
  • [25] Routing protocol for Low-Power and Lossy Networks for heterogeneous traffic network
    Musaddiq, Arslan
    Zikria, Yousaf Bin
    Zulqarnain
    Kim, Sung Won
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [26] Stability Metric Based Routing Protocol for Low-Power and Lossy Networks
    Yang, Xin
    Guo, Jianlin
    Orlik, Philip
    Parsons, Kieran
    Ishibashi, Koichi
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 3688 - 3693
  • [27] An Optimization of the Object Function for Routing Protocol of Low-Power and Lossy Networks
    Xiao, Wei
    Jiang, Nan
    Liu, Jianfei
    Shi, Hongzhou
    2014 2ND INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2014, : 515 - 519
  • [28] Routing Protocol Security for Low-Power and Lossy Networks in the Internet of Things
    Patel, Akshet
    Shanmugapriya, D.
    Srivastava, Gautam
    Lin, Jerry Chun-Wei
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2021, 13147 LNCS : 133 - 145
  • [29] Routing protocol for Low-Power and Lossy Networks for heterogeneous traffic network
    Arslan Musaddiq
    Yousaf Bin Zikria
    Sung Won Zulqarnain
    EURASIP Journal on Wireless Communications and Networking, 2020
  • [30] svBLOCK: mitigating black hole attack in low-power and lossy networks
    Luangoudom, Sonxay
    Tran, Duc
    Nguyen, Tuyen
    Tran, Hai Anh
    Nguyen, Giang
    Ha, Quoc Trung
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2020, 32 (02) : 77 - 86