Detection of rank attack in routing protocol for Low Power and Lossy Networks

被引:47
作者
Shafique, Usman [1 ]
Khan, Abid [2 ]
Rehman, Abdur [1 ]
Bashir, Faisal [1 ]
Alam, Masoom [2 ]
机构
[1] Bahria Univ, Islamabad, Pakistan
[2] COMSATS Inst Informat Technol, Comp Sci Dept, Islamabad, Pakistan
关键词
Internet of things; IPV6; RPL; Sink based intrusion detection; INTERNET;
D O I
10.1007/s12243-018-0645-4
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet Engineering Task Force (IETF) has recommended the use of routing protocol for Low Power and Lossy Network (RPL) for Internet Protocol version 6 (IPv6) enabled Internet of Things. However, RPL is vulnerable to internal and external attacks in a network. A malicious node in a rank attack, which is consumed by its child nodes, advertises false rank information. This consequently causes the selection of a malicious node as preferred parent for routing information to the sink node. Given the widespread application of RPL protocol in smart homes, smart cities, and the smart world, it is imperative to address this problem. In this paper, a novel Sink-based intrusion detection system (SBIDS) for the detection of rank attack in RPL is presented. SBIDS has less computational overhead as all detection processes take place at the sink node, which saves network resources. Through a comprehensive simulation analysis, it is shown that the proposed SBIDS provides high detection rate.
引用
收藏
页码:429 / 438
页数:10
相关论文
共 30 条
[11]  
Heiner P, 2013, ARXIV13120984
[12]  
Kamble A, 2017, EM TRENDS INN ICT IC
[13]   Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network [J].
Kenji, Iuchi ;
Matsunaga, Takumi ;
Toyoda, Kentaroh ;
Sasase, Iwao .
IEICE COMMUNICATIONS EXPRESS, 2015, 4 (11) :340-345
[14]  
Landsmann Martin, 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), P73, DOI 10.1109/INFCOMW.2013.6970745
[15]  
Le Anhtuan, 2013, 2013 IEEE Symposium on Computers and Communications (ISCC), P000789, DOI 10.1109/ISCC.2013.6755045
[16]  
Le A., 2011, WIR DAYS WD 2011, P4
[17]  
Lee KC, 2012, CONS COMM NETW C CCN
[18]   Low false alarm attackers detection in RPL by considering timing inconstancy between the rank measurements [J].
Matsunaga, Takumi ;
Toyoda, Kentaroh ;
Sasase, Iwao .
IEICE COMMUNICATIONS EXPRESS, 2015, 4 (02) :44-49
[19]  
Mayzaud A., 2016, A Taxonomy of Attacks in RPL-based Internet of Things, V18, P459
[20]  
Pongle Pavan, 2015, PERV COMP ICPC 2015