Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








86 Hits in 6.5 sec

Blackhole attacks in internet of things networks: a review

Noor Hisham Kamis, Warusia Yassin, Mohd Faizal Abdollah, Siti Fatimah Abdul Razak, Sumendra Yogarayan
2023 Indonesian Journal of Electrical Engineering and Computer Science  
To solve this, RPL or routing protocol for low power Lossy network is deploy by utilizing a distance vector scheme.  ...  IPv6 over low-power wireless personal area networks (6LoWPAN) is a one of IPv6 header pressure technology, and accordingly, it is vulnerable to attack.  ...  ACKNOWLEDGEMENTS The authors would like to thank everyone who has contributed to this research, either directly or indirectly.  ... 
doi:10.11591/ijeecs.v30.i2.pp1080-1090 fatcat:wfeoyytdbnbbvaw355p5ojje6y

A Trust-Management-Based Intrusion Detection System for Routing Protocol Attacks in Internet of Things

mahmoud elbaradie, Ashraf Elsisi, anas yousef
2020 IJCI. International Journal of Computers and Information  
In this paper an intrusion detection system is proposed for routing protocol for lossy and low power network attacks.  ...  The objective of the proposed system is to detect a variety of routing attacks namely sinkhole, selective forward and blackhole attacks.  ...  INTRODUCTION The Internet of things (IoT) systems are exposed to several attacks because of the huge number of connected devices and the nature of this devices which all operate in low power and lossy  ... 
doi:10.21608/ijci.2020.37546.1025 fatcat:uwlx7te3ybagjljpxnymmwvl2u

Secure Routing for MANET Connected Internet of Things Systems

Jonny Karlsson, Laurence S. Dooley, Goran Pulkkis
2018 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)  
Routing protocols for multi-hop MANETs are analyzed with a focus on the standardized Routing Protocol for Low-power and Lossy Networks.  ...  This paper presents a contemporary review of communication architectures and topographies for MANETconnected Internet-of-Things (IoT) systems.  ...  The Routing Protocol for Low-power and Lossy Networks (RPL) has been proposed by the IETF Working Group ROLL WG [15] for LLN implementations based on 6LoWPAN.  ... 
doi:10.1109/ficloud.2018.00024 dblp:conf/ficloud/KarlssonDP18 fatcat:l235x2r7ezdbpiullyqw3rbwwu

Survey on Intrusion Detection System for various Attacks in IOT

Samiksha Khule
2020 International Journal for Research in Applied Science and Engineering Technology  
The network layer Routing Protocol for Low Power and Lossy Networks (RPL) is the routing protocol suspectable for various security attacks.  ...  Samir Athmani [19] proposed an efficient Intrusion Detection System to detect blackhole attack in WSN is implemented NS2 network simulator.  ...  IOT PROTOCOLS The protocols which are affected mostly are the Routing Protocol for Low-Power and Lossy-Network (RPL) and IPv6 over Low Power and Wireless Private Area Network (6LoWPAN). A.  ... 
doi:10.22214/ijraset.2020.6231 fatcat:5r2datbuyfahphexq5nsennvpe

Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures

Ismail Butun, Patrik Osterberg, Houbing Song
2019 IEEE Communications Surveys and Tutorials  
., low production cost, low installation cost, unattended network operation, autonomous and longtime operation.  ...  Understanding these attacks and their associated defense mechanisms will help to pave a secure path towards the proliferation and public acceptance of IoT technology.  ...  For this kind o networks, a new network layer routing protocol is designed called RPL (Routing Protocol for Low-power and lossy networks) [72] .  ... 
doi:10.1109/comst.2019.2953364 fatcat:wi7zt3goknciplqc2nhgqdfdei

A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks

Philokypros P. Ioulianou, Vassilios G. Vassilakis, Siamak F. Shahandashti
2022 Journal of Cybersecurity and Privacy  
Obtained results suggest that the SRF-IoT framework is an efficient and promising solution that combines trust-based and IDS-based approaches to protect IoT networks against routing attacks.  ...  In this work, we study the impact of the combination of rank and blackhole attacks in the IPv6 routing protocol for low-power and lossy (RPL) networks, and we propose a new security framework for RPL-based  ...  RPL Overview IPv6 routing protocol for low power and lossy networks (RPL) is a routing protocol used in IoT networks based on IPv6 [6] .  ... 
doi:10.3390/jcp2010009 fatcat:pui6yxq2bzeupi57p22hvqvtty

An Experimental Study of IoT Networks Under Internal Routing Attack

Mohammad Alreshoodi
2020 Zenodo  
The Internet Engineering Task Force (IETF) provides an effective IPv6-based LLN routing protocol, namely the IPv6 Routing Protocol for Low Power and Lossy Network (RPL).  ...  Internet of Things (IoT) deployments mostly relies on the establishment of Low-Power and Lossy Networks (LLNs) among a large number of constraint devices.  ...  Thus, Low-Power and Lossy Networks (LLNs) provide such a need with low-cost and less-complex deployments.  ... 
doi:10.5281/zenodo.4023803 fatcat:tnti27gnpbe3hfmhse22r3m24q

An Ultimate Approach of Mitigating Attacks in RPL Based Low Power Lossy Networks [article]

Jaspreet Kaur
2019 arXiv   pre-print
The Routing Protocol for Low-Power and Lossy Networks (RPL) is the existing routing protocol for Internet of Things (IoT).  ...  So, we present an ultimate approach to mitigate these RPL attacks more efficiently and effectively. We use IDS based system for internal attacks and a mini-firewall for removing the external attacks.  ...  INTRODUCTION In todays world, IoT is technical revolutionary area in mobile and wireless communication field which deploy Low power and Lossy Networks (LLN).  ... 
arXiv:1910.13435v2 fatcat:su5c24tc5fcbvhahtp4dmtod5i

A Data Driven Trust Mechanism Based on Blockchain in IoT Sensor Networks for Detection and Mitigation of Attacks

Sivaganesan D
2021 Journal of Trends in Computer Science and Smart Technology  
A data driven trust mechanism based on blockchain is presented in this paper as a decentralized and energy efficient solution for detection of internal attacks in IoT powered SNs.  ...  Hazards due to internal and external attacks exist along with the advantages of the smart things and its applications.  ...  In IoT networks with Routing Protocol for Low power and Lossy Networks (RPL), a trust-aware, time-based solution is provided to address the insider attacks [11] .  ... 
doi:10.36548/jtcsst.2021.1.006 fatcat:rkz6sgwnnnaufmpp5hzkx5w3ty

Enhancing Routing Security in IoT: Performance Evaluation of RPL Secure Mode under Attacks [article]

Ahmed Raoof, Ashraf Matrawy, Chung-Horng Lung
2020 arXiv   pre-print
As the Routing Protocol for Low Power and Lossy Networks (RPL) became the standard for routing in the Internet of Things (IoT) networks, many researchers had investigated the security aspects of this protocol  ...  First, a comparison of RPL performance, with and without its security mechanisms, under four routing attacks (Blackhole, Selective-Forward, Neighbor, and Wormhole attacks) is conducted using several metrics  ...  Our previous work in [14] presented the first glimpse of the effects that RPL's security mechanisms could have on RPLbased IoT networks when there is an actual attack.  ... 
arXiv:2004.07815v2 fatcat:ikma4l67szetbjvnalche6uigi

E2V: Techniques for Detecting and Mitigating Rank Inconsistency Attack (RInA) in RPL based Internet of Things

R Stephen, L Arockiam
2018 Journal of Physics, Conference Series  
These devices are resource constrained and connected in the Low power and Lossy Networks (LLNs).  ...  Due to this nature, the RPL (IPv6 Routing Protocol for Low power and Lossy networks) is primarily designed for the resource constrained devices.  ...  The distance vector protocols are used in dynamic environment and RPL is used in static environment. RPL is an IP-based routing protocol for low power and lossy networks.  ... 
doi:10.1088/1742-6596/1142/1/012009 fatcat:mmeggdpk5jf2ljmndfr3cuw2sm

A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things

Shapla Khanam, Ismail Bin Ahmedy, Mohd Yamani Idna Idris, Mohamed Hisham Jaward, Aznul Qalid Bin Md Sabri
2020 IEEE Access  
IoT devices are connected under the constraints of low power and lossy networks (LLNs), which are weak in energy, memory and processing capabilities.  ...  IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) is low power and low-cost communication network, which makes IoT devices to be connected to the internet through IPv6.  ... 
doi:10.1109/access.2020.3037359 fatcat:pw4fsmelmjgc5anm7hp537l63e

Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset

John Foley, Naghmeh Moradpoor, Henry Ochen
2020 Security and Communication Networks  
One of the important features of routing protocol for low-power and lossy networks (RPLs) is objective function (OF). OF influences an IoT network in terms of routing strategies and network topology.  ...  For this, we created a novel IoT dataset based on power and network metrics, which is deployed as part of an RPL IDS/IPS solution to enhance information security.  ...  Routing protocol for low-power and lossy networks (RPLs) is used for IPv6 over low-power wireless personal area networks (6LoWPAN) and IoT networks.  ... 
doi:10.1155/2020/2804291 fatcat:rzigtgny4rhtjkgo7g5oldcasu

Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication

Kobra Mabodi, Mehdi Yusefi, Shahram Zandiyan, Leili Irankhah, Reza Fotohi
2020 Journal of Supercomputing  
Because of wide openness, relatively high processing power, and wide distribution of IoT things, they are ideal for attacks of the gray hole.  ...  The proposed approach consists of four phases, such as the verifying node trust in the IoT, testing the routes, gray hole attack discovery, and the malicious attack elimination process in MTISS-IoT.  ...  In this work, a trust-oriented routing Protocol is provided for Lossy and Low-Power Networks stating blackhole and selective forwarding attacks.  ... 
doi:10.1007/s11227-019-03137-5 fatcat:g6cjxjfutrhh3ge3gxm2syeccm

Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review

Abhishek Verma, Virender Ranga
2020 IEEE Sensors Journal  
In RFC 6550, the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) is specified by IETF's ROLL working group for facilitating efficient routing in 6LoWPAN networks, while considering its limitations  ...  Due to resource constrained nature of nodes in the IoT, RPL is vulnerable to many attacks that consume the node's resources and degrade the network's performance.  ...  IETF Internet Engineering Task Force ROLL Routing Over Low power and Lossy Networks 6LoWPAN IPv6 over Low Power Wireless Personal Area Networks LLNs Low power and Lossy Networks CoAP Constrained Application  ... 
doi:10.1109/jsen.2020.2973677 fatcat:wuvv6cruwrdmzkkdc4gk7uhtvm
« Previous Showing results 1 — 15 out of 86 results