Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








162 Hits in 5.1 sec

Routing Attacks and Countermeasures in the RPL-Based Internet of Things

Linus Wallgren, Shahid Raza, Thiemo Voigt
2013 International Journal of Distributed Sensor Networks  
One of the major contributions in this paper is our implementation and demonstration of well-known routing attacks against 6LoWPAN networks running RPL as a routing protocol.  ...  We implement these attacks in the RPL implementation in the Contiki operating system and demonstrate these attacks in the Cooja simulator.  ...  Implementing Wormhole Attacks against RPL.  ... 
doi:10.1155/2013/794326 fatcat:aib6qnitvbfxjczzpjrd7pk3ra

A Subjective Logical Framework-Based Trust Model for Wormhole Attack Detection and Mitigation in Low-Power and Lossy (RPL) IoT-Networks

Sarmad Javed, Ahthasham Sajid, Tayybah Kiren, Inam Ullah Khan, Christine Dewi, Francesco Cauteruccio, Henoch Juli Christanto
2023 Information  
The aim of this study is to make the RPL protocol more secure by using a Subjective Logic Framework-based trust model to detect and mitigate a wormhole attack.  ...  node level, a decreased packet loss ratio of 16% at the node level, and an increased attack detection rate at network level from 0.42 to 0.55 in comparison with PCC-RPL.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/info14090478 fatcat:ggnfj7hb45dsph5dsnqsdpnyqy

AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks

Maria Hanif, Humaira Ashraf, Zakia Jalil, Noor Zaman Jhanjhi, Mamoona Humayun, Saqib Saeed, Abdullah M. Almuhaideb
2022 Electronics  
One of them is a wormhole attack that uses a low latency link between two malicious sensor nodes and affects the routing paths of the entire network.  ...  Finally, our paper explored the open research challenges for detecting and mitigating wormhole attacks in wireless networks.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics11152324 fatcat:eqklbnmwfng4barmmdylc4v2wa

Detection of wormhole attacks on IPv6 mobility-based wireless sensor network

Gu-Hsin Lai
2016 EURASIP Journal on Wireless Communications and Networking  
RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) is a standard routing protocol commonly used in sensor networks. This study proposes a RPL-based wormhole detection mechanism.  ...  Wormhole attack is one of the most common attacks to sensor networks, threatening the network availability by dropping data or disturbing routing paths.  ...  Acknowledgments This work is supported in part by the Ministry of Science and Technology, Taiwan, Republic of China, under Grants MOST 105-2221-E-034 -011 -MY2.  ... 
doi:10.1186/s13638-016-0776-0 fatcat:syi36ufro5grxcoss2fdv32piq

Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review

Abhishek Verma, Virender Ranga
2020 IEEE Sensors Journal  
A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding.  ...  In addition, a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is also carried out.  ...  ACKNOWLEDGMENT This research was supported by the Ministry of Human Resource Development, Government of India.  ... 
doi:10.1109/jsen.2020.2973677 fatcat:wuvv6cruwrdmzkkdc4gk7uhtvm

Introducing Network Coding to RPL: The Chained Secure Mode (CSM) [article]

Ahmed Raoof, Chung-Horng Lung, Ashraf Matrawy
2020 arXiv   pre-print
The security and performance of a proof-of-concept prototype of CSM were evaluated and compared against RPL in UM and PSM (with and without the optional replay protection) in the presence of Neighbor attack  ...  The main goal of CSM is to enhance RPL resilience against replay attacks, with the ability to mitigate some of them.  ...  The chaining effect can limit adversaries' ability to launch routing attacks, e.g., Wormhole, identity-cloning, or RPL-specific attacks such as replay or Neighbor attacks [2] . • A proof-of-concept prototype  ... 
arXiv:2006.00310v3 fatcat:dyfl7c4go5awpph2oy74se7hma

Analysis of Routing Attacks on RPL based 6LoWPAN Networks

Abhishek Verma, Virender Ranga
2018 International Journal of Grid and Distributed Computing  
In this paper, we analyze some well-known routing attacks (Sinkhole, Blackhole, Selective forwarding, Sybil, Clone ID, HELLO flooding and Local Repair) and show their effect on network throughput.  ...  Routing attacks are one of the major threats to the Internet of Things which aim to disrupt normal routing operations of the network.  ...  Therefore, a detailed analysis and simulation of such attacks against RPL are worth doing before creating a new light-weight Intrusion Detection mechanism [7] for RPL-based networks.  ... 
doi:10.14257/ijgdc.2018.11.8.05 fatcat:qrstni6hrnbabipejd3lk66r7a

Securing RPL using Network Coding: The Chained Secure Mode (CSM) [article]

Ahmed Raoof, Chung-Horng Lung, Ashraf Matrawy
2021 arXiv   pre-print
In this paper, we propose a novel secure mode for RPL, the Chained Secure Mode (CSM), based on the concept of intraflow Network Coding (NC).  ...  The security and performance of the proposed CSM were evaluated and compared against RPL in UM and PSM (with and without the optional replay protection) under several routing attacks: the Neighbor attack  ...  A prototype of CSM was devised, and its security and performance were evaluated against the currently implemented secure modes of RPL (UM, PSM, and PSMrp) under three replay routing attacks (NA, CA, and  ... 
arXiv:2102.06254v1 fatcat:3ffxt5kthzastodijozltyfkyi

A Taxonomy of Attacks in RPL-based Internet of Things

Anthéa Mayzaud, Remi Badonnel, Isabelle Chrisment
2016 International Journal of Network Security  
In this paper, we propose to establish a taxonomy of the attacks against this protocol, considering three main categories including attacks targeting network resources, attacks modifying the network topology  ...  However, this protocol is exposed to a large variety of attacks. Their consequences can be quite significant in terms of network performance and resources.  ...  Acknowledgment This work was funded by Flamingo, a Network of Excellence project (ICT-318488) supported by the European Commission under its Seventh Framework Programme.  ... 
dblp:journals/ijnsec/MayzaudBC16 fatcat:q353a57vvvc73gte64loc74bli

Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions

Anass RGHIOUI, Anass KHANNOUS, Mohammed BOUHORMA
2014 Journal of Advanced Computer Science & Technology  
Having a resource-constrained network implementing new protocols and connected to the Internet; makes it security a big challenge that must be addressed carefully [8] .  ...  To deal with this challenge, IETF create a new protocol compatible to LoWPAN networks under the name of RPL (Routing Protocol for Low-power and lossy network) [7] .  ...  Fig. 1 : 1 6LoWPAN-RPL network architecture Fig. 2 : 2 Spoofing attack Fig. 3 : 3 Sybil attack Fig. 4 : 4 Black hole attack Fig. 5 : 5 Wormhole attack Fig. 6 : 6 Sinkhole attack Fig. 7 : 7  ... 
doi:10.14419/jacst.v3i2.3321 fatcat:ycu7cklwvrfkdp6i7ee3rxebo4

Secure Routing for MANET Connected Internet of Things Systems

Jonny Karlsson, Laurence S. Dooley, Goran Pulkkis
2018 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)  
Routing protocols for multi-hop MANETs are analyzed with a focus on the standardized Routing Protocol for Low-power and Lossy Networks.  ...  This paper presents a contemporary review of communication architectures and topographies for MANETconnected Internet-of-Things (IoT) systems.  ...  A. Security Attacks against RPL and Countermeasures An insightful review of security attacks against RPL and countermeasures is presented in [16] .  ... 
doi:10.1109/ficloud.2018.00024 dblp:conf/ficloud/KarlssonDP18 fatcat:l235x2r7ezdbpiullyqw3rbwwu

Design Of Intrusion Detection System For Dos Attack In 6lowpan And RPL Based IoT Network

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In this paper, we have discussed various attacks on 6LoWPAN and RPL network along with countermeasures to reduce the attacks.  ...  Internet of Things (IoT) is a network spread globally and accommodates maximum things under it.  ...  SECURITY ATTACKS ON 6LOWPAN AND RPL AND MITIGATION TECHNIQUES: A. 6LoWPAN: IPv6 protocol was not the initial choice for IoT network because of its bulkiness.  ... 
doi:10.35940/ijitee.k2288.0981119 fatcat:pijfoyydkfb2rlphajcxo2wtsa

An Ultimate Approach of Mitigating Attacks in RPL Based Low Power Lossy Networks [article]

Jaspreet Kaur
2019 arXiv   pre-print
RPL is a proactive,lightweight, Distance Vector protocol which offers security against various forms of routing attacks.  ...  So, we present an ultimate approach to mitigate these RPL attacks more efficiently and effectively. We use IDS based system for internal attacks and a mini-firewall for removing the external attacks.  ...  In paper [3] , They discuss and implement various RPL attacks in cooja simulator.  ... 
arXiv:1910.13435v2 fatcat:su5c24tc5fcbvhahtp4dmtod5i

COLIDE: A Collaborative Intrusion Detection Framework for Internet of Things

Muhammad Azad, Mohammad Mahmoud Abdellatif, Habib Ur Rehman, Khaled Salah, Junaid Arshad
2018 IET Networks  
These systems not only require extensive network and system resources but also cause delays in detecting a malicious actor due to unavailability of a comprehensive view of the intruder's activities.  ...  Collaboration among IoT devices enables considering knowledge from a collection of host and network devices to achieve improved detection accuracy in a timely manner.  ...  As with wormhole attack, literature around sinkhole attack is well established with [23] being an initial effort to identify and mitigate against such attack.  ... 
doi:10.1049/iet-net.2018.5036 fatcat:6ht6rlcz45furiyyggtacywfjy

An intrusion detection system for smart grid neighborhood area network

Nasim Beigi-Mohammadi, Jelena Misic, Hamzeh Khazaei, Vojislav B. Misic
2014 2014 IEEE International Conference on Communications (ICC)  
We propose an IDS that is implemented in a distributed fashion with respect to NAN's communication and computation needs. An analytical approach is employed for detecting Wormhole attacks.  ...  In this paper, we present the requirements for intrusion detection systems (IDSs) in neighborhood area network (NAN) as a component of smart grid.  ...  ACKNOWLEDGMENT This work was supported by NSERC and Toronto Hydro Electric System Limited (THESL).  ... 
doi:10.1109/icc.2014.6883967 dblp:conf/icc/MohammadiMKM14 fatcat:fksaqa6lfzfuxbcd4d3wqxdyne
« Previous Showing results 1 — 15 out of 162 results