Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks

被引:42
|
作者
Ahmed, Firoz [1 ]
Ko, Young-Bae [1 ]
机构
[1] Ajou Univ, Dept Comp Engn, Suwon, South Korea
关键词
RPL; black hole attack; security; suspicious; verification; mitigation; RPL;
D O I
10.1002/sec.1684
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Routing Protocol for Low Power and Lossy Networks (RPL) has been standardized by the Internet Engineering Task Force to efficiently manage the functions of the network layer when providing Internet connectivity for wireless sensor networks. RPL has been designed for constrained devices and networks. Owing to their constrained nature, RPL-based networks can be exposed to a wide variety of security attacks. One of the most serious attacks in RPL is a black hole attack, where a malicious node silently drops all the packets that it is supposed to forward. This paper proposes a mitigation technique against black hole attack with low packet loss and high reliability. The proposed technique consists of a local decision and a global verification process. First, each node observes the communication behavior of its neighboring nodes by overhearing packets transmitted by its neighbors and attempts to identify suspicious nodes based on their behavior. In the second process, if a node identifies a suspicious node, then it verifies whether the suspicious node is a black hole. We demonstrate that the proposed approach increases packet delivery rate significantly and detects black hole attack effectively. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:5143 / 5154
页数:12
相关论文
共 50 条
  • [41] Improving Routing Protocol for Low-Power and Lossy Networks over IoT Enviroment
    Darabkh, Khalid A.
    Al-Akhras, Muna
    Khalifeh, Ala'
    2021 30TH WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC 2021), 2021, : 31 - 35
  • [42] Lightweight Authentication and Encryption mechanism in Routing Protocol for Low Power and Lossy Networks (RPL)
    Gawde, Aruna
    Shah, Akshay
    Sakariya, Nishit
    Poojary, Dishith
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 226 - 229
  • [43] Reliable Data Delivery With the IETF Routing Protocol for Low-Power and Lossy Networks
    Ancillotti, Emilio
    Bruno, Raffaele
    Conti, Marco
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (03) : 1864 - 1877
  • [44] Performance Analysis of Routing Protocol for Low Power and Lossy Networks (RPL) for IoT Environment
    Manvi, Subodh
    Shobha, K. R.
    Vastrad, Soumya
    DISTRIBUTED COMPUTING AND INTELLIGENT TECHNOLOGY, ICDCIT 2023, 2023, 13776 : 341 - 348
  • [45] On the multi-hop performance of receiver based MAC protocol in routing protocol for low-power and lossy networks-based low power and lossy wireless sensor networks
    Akhavan, Mohammad Reza
    Aijaz, Adnan
    Choobkar, Sabrieh
    Aghvami, Abdol-Hamid
    IET WIRELESS SENSOR SYSTEMS, 2015, 5 (01) : 42 - 49
  • [46] A Secure Routing Protocol to Combat Byzantine and Black Hole Attacks for MANETs
    Padmanabhan, Jayashree
    Subramaniam, Tamil Selvan Raman
    Prakasam, Kumaresh
    Ponpandiyan, Vigneswaran
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 541 - 548
  • [47] Load Balanced Routing for Low Power and Lossy Networks
    Liu, Xinxin
    Guo, Jianlin
    Bhatti, Ghulam
    Orlik, Philip
    Parsons, Kieran
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 2238 - 2243
  • [48] QoS Routing RPL for Low Power and Lossy Networks
    Mohamed, Belghachi
    Mohamed, Feham
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [49] Harmonizing MAC and Routing in Low Power and Lossy Networks
    Di Marco, Piergiuseppe
    Fischione, Carlo
    Athanasiou, George
    Mekikis, Prodromos-Vasileios
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 231 - 236
  • [50] Trust Based DSR Routing Protocol for Mitigating Cooperative Black Hole Attacks in Ad Hoc Networks
    Mohanapriya, M.
    Krishnamurthi, Ilango
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2014, 39 (03) : 1825 - 1833