A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case

被引:0
作者
A. O. Bang
Udai Pratap Rao
机构
[1] Sardar Vallabhbhai National Institute of Technology Surat,Department of Computer Engineering
来源
The Journal of Supercomputing | 2021年 / 77卷
关键词
RPL; IoT; Sybil attack; Routing protocol; Smart-home;
D O I
暂无
中图分类号
学科分类号
摘要
Internet of things (IoT) is renowned for being a massive revolution led by business leaders and researchers. Routing protocol for low-power and lossy network (RPL) is a standardized protocol that serves the routing need of the IPv6-based low-power and lossy networks, which are the significant enablers of the IoT technology. Despite its many outstanding features, RPL offers very low protection against different routing attacks. In this respect, we mainly emphasize on the sybil attack. Specifically, we focus on three different types of sybil attack on a realistic smart home network topology. Considering the involvement of resource-constraint devices, we propose and evaluate a novel decentralized countermeasure against these attacks. The proposed countermeasure is based on a hybrid approach that involves the use of the geographical location of the nodes and a trust value-based parent selection procedure. Along with this, we use specially configured monitoring nodes that are responsible for the detection of the malicious attacker node(s). Further, we use RPL’s multi-instance property to integrate the proposed decentralized architecture into the exiting RPL protocol. We implement the proposed countermeasure in Cooja, the Contiki operating system-based network simulator. The results obtained through our experiments validate the practicality of the proposed countermeasure.
引用
收藏
页码:13703 / 13738
页数:35
相关论文
共 83 条
[1]  
Watteyne T(2010)From MANET to IETF roll standardization: a paradigm shift in WSN routing protocols IEEE Commun Surv Tutor 13 688-707
[2]  
Molinaro A(2013)Manet: history, challenges and applications Int J Appl Innov Eng Manag (IJAIEM) 2 249-251
[3]  
Richichi MG(2016)Secure routing for internet of things: a survey J Netw Comput Appl 66 198-213
[4]  
Dohler M(2018)Routing attacks and mitigation methods for RPL-based internet of things IEEE Commun Surv Tutor 21 1582-1606
[5]  
Bang AO(2019)RPL-based routing protocols in IoT applications: a review IEEE Sens J 19 5952-5967
[6]  
Ramteke PL(2018)Addressing the DAO insider attack in RPL’s internet of things networks IEEE Commun Lett 23 68-71
[7]  
Airehrour D(2017)BRPL: backpressure RPL for high-throughput and mobile IoTs IEEE Trans Mobile Comput 17 29-43
[8]  
Gutierrez J(2014)Sybil attacks and their defenses in the internet of things IEEE Internet Things J 1 372-383
[9]  
Ray SK(2017)Major requirements for building smart homes in smart cities based on internet of things technologies Future Gener Comput Syst 76 358-369
[10]  
Raoof A(2013)A routing protocol based on energy and link quality for internet of things applications Sensors 13 1942-1964