A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Routing Attacks and Countermeasures in the RPL-Based Internet of Things
2013
International Journal of Distributed Sensor Networks
One of the major contributions in this paper is our implementation and demonstration of well-known routing attacks against 6LoWPAN networks running RPL as a routing protocol. ...
We implement these attacks in the RPL implementation in the Contiki operating system and demonstrate these attacks in the Cooja simulator. ...
Implementing Wormhole Attacks against RPL. ...
doi:10.1155/2013/794326
fatcat:aib6qnitvbfxjczzpjrd7pk3ra
A Subjective Logical Framework-Based Trust Model for Wormhole Attack Detection and Mitigation in Low-Power and Lossy (RPL) IoT-Networks
2023
Information
The aim of this study is to make the RPL protocol more secure by using a Subjective Logic Framework-based trust model to detect and mitigate a wormhole attack. ...
node level, a decreased packet loss ratio of 16% at the node level, and an increased attack detection rate at network level from 0.42 to 0.55 in comparison with PCC-RPL. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/info14090478
fatcat:ggnfj7hb45dsph5dsnqsdpnyqy
AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks
2022
Electronics
One of them is a wormhole attack that uses a low latency link between two malicious sensor nodes and affects the routing paths of the entire network. ...
Finally, our paper explored the open research challenges for detecting and mitigating wormhole attacks in wireless networks. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/electronics11152324
fatcat:eqklbnmwfng4barmmdylc4v2wa
Detection of wormhole attacks on IPv6 mobility-based wireless sensor network
2016
EURASIP Journal on Wireless Communications and Networking
RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) is a standard routing protocol commonly used in sensor networks. This study proposes a RPL-based wormhole detection mechanism. ...
Wormhole attack is one of the most common attacks to sensor networks, threatening the network availability by dropping data or disturbing routing paths. ...
Acknowledgments This work is supported in part by the Ministry of Science and Technology, Taiwan, Republic of China, under Grants MOST 105-2221-E-034 -011 -MY2. ...
doi:10.1186/s13638-016-0776-0
fatcat:syi36ufro5grxcoss2fdv32piq
Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review
2020
IEEE Sensors Journal
A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding. ...
In addition, a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is also carried out. ...
ACKNOWLEDGMENT This research was supported by the Ministry of Human Resource Development, Government of India. ...
doi:10.1109/jsen.2020.2973677
fatcat:wuvv6cruwrdmzkkdc4gk7uhtvm
Introducing Network Coding to RPL: The Chained Secure Mode (CSM)
[article]
2020
arXiv
pre-print
The security and performance of a proof-of-concept prototype of CSM were evaluated and compared against RPL in UM and PSM (with and without the optional replay protection) in the presence of Neighbor attack ...
The main goal of CSM is to enhance RPL resilience against replay attacks, with the ability to mitigate some of them. ...
The chaining effect can limit adversaries' ability to launch routing attacks, e.g., Wormhole, identity-cloning, or RPL-specific attacks such as replay or Neighbor attacks [2] . • A proof-of-concept prototype ...
arXiv:2006.00310v3
fatcat:dyfl7c4go5awpph2oy74se7hma
Analysis of Routing Attacks on RPL based 6LoWPAN Networks
2018
International Journal of Grid and Distributed Computing
In this paper, we analyze some well-known routing attacks (Sinkhole, Blackhole, Selective forwarding, Sybil, Clone ID, HELLO flooding and Local Repair) and show their effect on network throughput. ...
Routing attacks are one of the major threats to the Internet of Things which aim to disrupt normal routing operations of the network. ...
Therefore, a detailed analysis and simulation of such attacks against RPL are worth doing before creating a new light-weight Intrusion Detection mechanism [7] for RPL-based networks. ...
doi:10.14257/ijgdc.2018.11.8.05
fatcat:qrstni6hrnbabipejd3lk66r7a
Securing RPL using Network Coding: The Chained Secure Mode (CSM)
[article]
2021
arXiv
pre-print
In this paper, we propose a novel secure mode for RPL, the Chained Secure Mode (CSM), based on the concept of intraflow Network Coding (NC). ...
The security and performance of the proposed CSM were evaluated and compared against RPL in UM and PSM (with and without the optional replay protection) under several routing attacks: the Neighbor attack ...
A prototype of CSM was devised, and its security and performance were evaluated against the currently implemented secure modes of RPL (UM, PSM, and PSMrp) under three replay routing attacks (NA, CA, and ...
arXiv:2102.06254v1
fatcat:3ffxt5kthzastodijozltyfkyi
A Taxonomy of Attacks in RPL-based Internet of Things
2016
International Journal of Network Security
In this paper, we propose to establish a taxonomy of the attacks against this protocol, considering three main categories including attacks targeting network resources, attacks modifying the network topology ...
However, this protocol is exposed to a large variety of attacks. Their consequences can be quite significant in terms of network performance and resources. ...
Acknowledgment This work was funded by Flamingo, a Network of Excellence project (ICT-318488) supported by the European Commission under its Seventh Framework Programme. ...
dblp:journals/ijnsec/MayzaudBC16
fatcat:q353a57vvvc73gte64loc74bli
Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions
2014
Journal of Advanced Computer Science & Technology
Having a resource-constrained network implementing new protocols and connected to the Internet; makes it security a big challenge that must be addressed carefully [8] . ...
To deal with this challenge, IETF create a new protocol compatible to LoWPAN networks under the name of RPL (Routing Protocol for Low-power and lossy network) [7] . ...
Fig. 1 : 1 6LoWPAN-RPL network architecture
Fig. 2 : 2 Spoofing attack
Fig. 3 : 3 Sybil attack
Fig. 4 : 4 Black hole attack
Fig. 5 : 5 Wormhole attack
Fig. 6 : 6 Sinkhole attack
Fig. 7 : 7 ...
doi:10.14419/jacst.v3i2.3321
fatcat:ycu7cklwvrfkdp6i7ee3rxebo4
Secure Routing for MANET Connected Internet of Things Systems
2018
2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)
Routing protocols for multi-hop MANETs are analyzed with a focus on the standardized Routing Protocol for Low-power and Lossy Networks. ...
This paper presents a contemporary review of communication architectures and topographies for MANETconnected Internet-of-Things (IoT) systems. ...
A. Security Attacks against RPL and Countermeasures An insightful review of security attacks against RPL and countermeasures is presented in [16] . ...
doi:10.1109/ficloud.2018.00024
dblp:conf/ficloud/KarlssonDP18
fatcat:l235x2r7ezdbpiullyqw3rbwwu
Design Of Intrusion Detection System For Dos Attack In 6lowpan And RPL Based IoT Network
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
In this paper, we have discussed various attacks on 6LoWPAN and RPL network along with countermeasures to reduce the attacks. ...
Internet of Things (IoT) is a network spread globally and accommodates maximum things under it. ...
SECURITY ATTACKS ON 6LOWPAN AND RPL AND MITIGATION TECHNIQUES: A. 6LoWPAN: IPv6 protocol was not the initial choice for IoT network because of its bulkiness. ...
doi:10.35940/ijitee.k2288.0981119
fatcat:pijfoyydkfb2rlphajcxo2wtsa
An Ultimate Approach of Mitigating Attacks in RPL Based Low Power Lossy Networks
[article]
2019
arXiv
pre-print
RPL is a proactive,lightweight, Distance Vector protocol which offers security against various forms of routing attacks. ...
So, we present an ultimate approach to mitigate these RPL attacks more efficiently and effectively. We use IDS based system for internal attacks and a mini-firewall for removing the external attacks. ...
In paper [3] , They discuss and implement various RPL attacks in cooja simulator. ...
arXiv:1910.13435v2
fatcat:su5c24tc5fcbvhahtp4dmtod5i
COLIDE: A Collaborative Intrusion Detection Framework for Internet of Things
2018
IET Networks
These systems not only require extensive network and system resources but also cause delays in detecting a malicious actor due to unavailability of a comprehensive view of the intruder's activities. ...
Collaboration among IoT devices enables considering knowledge from a collection of host and network devices to achieve improved detection accuracy in a timely manner. ...
As with wormhole attack, literature around sinkhole attack is well established with [23] being an initial effort to identify and mitigate against such attack. ...
doi:10.1049/iet-net.2018.5036
fatcat:6ht6rlcz45furiyyggtacywfjy
An intrusion detection system for smart grid neighborhood area network
2014
2014 IEEE International Conference on Communications (ICC)
We propose an IDS that is implemented in a distributed fashion with respect to NAN's communication and computation needs. An analytical approach is employed for detecting Wormhole attacks. ...
In this paper, we present the requirements for intrusion detection systems (IDSs) in neighborhood area network (NAN) as a component of smart grid. ...
ACKNOWLEDGMENT This work was supported by NSERC and Toronto Hydro Electric System Limited (THESL). ...
doi:10.1109/icc.2014.6883967
dblp:conf/icc/MohammadiMKM14
fatcat:fksaqa6lfzfuxbcd4d3wqxdyne
« Previous
Showing results 1 — 15 out of 162 results