scispace - formally typeset
Proceedings ArticleDOI

A Secure Routing Protocol Based on RPL for Internet of Things

Reads0
Chats0
TLDR
The concept of rank threshold along with hash chain authentication technique to deal with internal attacks like sinkhole, black hole, selective forwarding attacks etc is introduced.
Abstract
Data transportation and routing in Internet of Things (IoT) is a challenging issue where massive data collection and gathering are predictable. The Routing Protocol for Low- power and Lossy Networks (RPL) is one of the best candidates to ensure routing in 6LoWPAN networks. However, RPL is vulnerable to a number of attacks related to exchanged control messages. In this paper, we propose a new secure routing protocol based on RPL referred to as Secure-RPL (SRPL). The main aim of SRPL is to prevent misbehaving nodes from maliciously changing control message values such as the rank of a node that may disturb a network by creating a fake topology. We introduce the concept of rank threshold along with hash chain authentication technique to deal with internal attacks like sinkhole, black hole, selective forwarding attacks etc. Simulation results show that SRPL is robust and resistant to this kind of attacks based on malicious manipulation of RPL metrics.

read more

Citations
More filters
Journal ArticleDOI

A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT

TL;DR: A taxonomy of the security research areas in IoT/IIoT along with their corresponding solutions is designed and several open research directions relevant to the focus of this survey are identified.
Journal ArticleDOI

A Survey of Internet of Things (IoT) Authentication Schemes

TL;DR: This paper provides a near complete and up-to-date view of the IoT authentication field and provides a summary of a large range of authentication protocols proposed in the literature, using a multi-criteria classification previously introduced in this work.
Journal ArticleDOI

SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things

TL;DR: Based on SecTrust-RPL, a time-based trust-aware RPL routing protocol, the viability of using trust as an effective security system for mitigating attacks in IoT networks is shown.
Journal ArticleDOI

Routing Attacks and Mitigation Methods for RPL-Based Internet of Things

TL;DR: This paper conducted a detailed review of the RPL standard, including a recently proposed modification, and investigated all recently published attacks on RPL and their mitigation methods through the literature, introducing a first-of-its-kind classification scheme for the mitigation methods that is based on the techniques used for the prevention.
Journal ArticleDOI

Hybrid Satellite-Terrestrial Communication Networks for the Maritime Internet of Things: Key Technologies, Opportunities, and Challenges

TL;DR: A survey on the demand for maritime communications enabled by state-of-the-art hybrid satellite-terrestrial maritime communication networks (MCNs), and envision the use of external auxiliary information to build up an environment-aware, service-driven, and integrated satellite-air-ground MCN.
References
More filters
Journal ArticleDOI

Routing Attacks and Countermeasures in the RPL-Based Internet of Things

TL;DR: This paper implements and demonstrates well-known routing attacks against 6LoWPAN networks running RPL as a routing protocol, and highlights novel security features in the IPv6 protocol and exemplifies the use of these features for intrusion detection in the IoT by implementing a lightweight heartbeat protocol.
Journal ArticleDOI

A Taxonomy of Attacks in RPL-based Internet of Things

TL;DR: This paper proposes to establish a taxonomy of the attacks against this protocol, considering three main categories including attacks targeting network resources, attacks modifying the network topology and attacks related to network traffic.
Proceedings ArticleDOI

VeRA - Version Number and Rank Authentication in RPL

TL;DR: A new security service is described that prevents any misbehaving node from illegitimately increasing the Version Number and compromise illegitimate decreased Rank values in RPL.
Journal ArticleDOI

A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology

TL;DR: This paper proposed a survey on mobility management protocols in WSNs based on 6LoWPAN technology, which enables to connect IP sensor devices to other IP networks without any need for gateways.

A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs)

TL;DR: This document presents a security threat analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs) that builds upon previous work on routing security and adapts the assessments to the issues and constraints specific to low-power and lossy networks.
Related Papers (5)