Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks

被引:42
|
作者
Ahmed, Firoz [1 ]
Ko, Young-Bae [1 ]
机构
[1] Ajou Univ, Dept Comp Engn, Suwon, South Korea
关键词
RPL; black hole attack; security; suspicious; verification; mitigation; RPL;
D O I
10.1002/sec.1684
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Routing Protocol for Low Power and Lossy Networks (RPL) has been standardized by the Internet Engineering Task Force to efficiently manage the functions of the network layer when providing Internet connectivity for wireless sensor networks. RPL has been designed for constrained devices and networks. Owing to their constrained nature, RPL-based networks can be exposed to a wide variety of security attacks. One of the most serious attacks in RPL is a black hole attack, where a malicious node silently drops all the packets that it is supposed to forward. This paper proposes a mitigation technique against black hole attack with low packet loss and high reliability. The proposed technique consists of a local decision and a global verification process. First, each node observes the communication behavior of its neighboring nodes by overhearing packets transmitted by its neighbors and attempts to identify suspicious nodes based on their behavior. In the second process, if a node identifies a suspicious node, then it verifies whether the suspicious node is a black hole. We demonstrate that the proposed approach increases packet delivery rate significantly and detects black hole attack effectively. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:5143 / 5154
页数:12
相关论文
共 50 条
  • [31] Performance Analysis of Routing Protocol for Low Power and Lossy Networks (RPL) in Large Scale Networks
    Liu, Xiyuan
    Sheng, Zhengguo
    Yin, Changchuan
    Ali, Falah
    Roggen, Daniel
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06): : 2172 - 2185
  • [32] Mitigating the Effects of Black hole Attacks on AODV Routing Protocol in Mobile Ad Hoc Networks
    Jain, Ashish Kumar
    Tokekar, Vrinda
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [33] Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks
    Mayzaud, Anthea
    Sehgal, Anuj
    Badonnel, Remi
    Chrisment, Isabelle
    Schoenwaelder, Juergen
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2015, 25 (05) : 320 - 339
  • [34] Minimum cost load balanced multipath routing protocol for low power and lossy networks
    Moghadam, Meisam Nesary
    Taheri, Hassan
    Karrari, Mehdi
    WIRELESS NETWORKS, 2014, 20 (08) : 2469 - 2479
  • [35] Minimum cost load balanced multipath routing protocol for low power and lossy networks
    Meisam Nesary Moghadam
    Hassan Taheri
    Mehdi Karrari
    Wireless Networks, 2014, 20 : 2469 - 2479
  • [36] Collection Tree Extension of Reactive Routing Protocol for Low-Power and Lossy Networks
    Yi, Jiazi
    Clausen, Thomas
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [37] Extending the RPL Routing Protocol to Agricultural Low Power and Lossy Networks (A-LLNs)
    Chen, Yi-bo
    Chanet, Jean-Pierre
    Hou, Kun-Mean
    Shi, Hong-Ling
    INTERNATIONAL JOURNAL OF AGRICULTURAL AND ENVIRONMENTAL INFORMATION SYSTEMS, 2013, 4 (04) : 25 - 47
  • [38] Performance Evaluation of Mobility-Aware Routing Protocol for Low power and Lossy Networks
    Zaatouri, Ibtissem
    Sailhan, Francoise
    Rovedakis, Stephane
    Guiloufi, Awatef
    Alyaoui, Nouha
    Kachouri, Abdennaceur
    2019 16TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2019, : 636 - 641
  • [39] The Routing Protocol for low power and lossy networks (RPL) under Attack: Simulation and Analysis
    Hkiri, Amal
    Karmani, Mouna
    Machhout, Mohsen
    PROCEEDINGS OF THE 2022 5TH INTERNATIONAL CONFERENCE ON ADVANCED SYSTEMS AND EMERGENT TECHNOLOGIES IC_ASET'2022), 2022, : 143 - 148
  • [40] Analysis of Routing Protocol for Low Power and Lossy Networks (RPL) Using Cooja Simulator
    Jadhao, Ashish R.
    Solapure, Sharwari S.
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 2364 - 2368