A Ultimate Approach of Mitigating Attacks in RPL Based Low Power Lossy
Networks
release_sjcktragm5ef5dtdwh7dtx3qm4
by
Jaspreet Kaur
2019
Abstract
The Routing Protocol for Low-Power and Lossy Networks (RPL) is the existing
routing protocol for Internet of Things (IoT). RPL is a proactive,lightweight,
Distance Vector protocol which offers security against various forms of routing
attacks. Still, there are various attacks(as rank, version attacks and many
more ) which is possible in this network due to problem of unauthenticated or
unencrypted control frames, centralized root controller, compromised or
unauthenticated devices and many more ways. There are various solutions present
in the literature but every solution has its pros and cons. There is no
appropriate system framework till now which completely solves these all issues.
So, we present a ultimate approach to mitigate these RPL attacks more
efficiently and effectively. We use IDS based system for internal attacks and a
mini-firewall for removing the external attacks. In IDS based approach, we use
intrusion detection system at multiple locations for analyzing the behaviour of
nodes. The final decision whether the node is attacker or not depends on mainly
three things as: trust between the neighbouring nodes, local decision by
multiple sink nodes and global decision by root node. We also use some
blockchain features in this framework for better internal security. We use some
threshold values and rules in mini-firewall for removing external attacks. In
this paper, we provide the proposed approach and theoretical analysis of this
approach which provide better protection from these attacks than any other
method.
In text/plain
format
Archived Files and Locations
application/pdf 194.9 kB
file_bkmui5xwsfcunaw2gjguirn2ca
|
arxiv.org (repository) web.archive.org (webarchive) |
1910.13435v1
access all versions, variants, and formats of this works (eg, pre-prints)