Proceedings ArticleDOI
A Secure Routing Protocol Based on RPL for Internet of Things
Ghada Glissa,Abderrezak Rachedi,Aref Meddeb +2 more
- pp 1-7
Reads0
Chats0
TLDR
The concept of rank threshold along with hash chain authentication technique to deal with internal attacks like sinkhole, black hole, selective forwarding attacks etc is introduced.Abstract:
Data transportation and routing in Internet of Things (IoT) is a challenging issue where massive data collection and gathering are predictable. The Routing Protocol for Low- power and Lossy Networks (RPL) is one of the best candidates to ensure routing in 6LoWPAN networks. However, RPL is vulnerable to a number of attacks related to exchanged control messages. In this paper, we propose a new secure routing protocol based on RPL referred to as Secure-RPL (SRPL). The main aim of SRPL is to prevent misbehaving nodes from maliciously changing control message values such as the rank of a node that may disturb a network by creating a fake topology. We introduce the concept of rank threshold along with hash chain authentication technique to deal with internal attacks like sinkhole, black hole, selective forwarding attacks etc. Simulation results show that SRPL is robust and resistant to this kind of attacks based on malicious manipulation of RPL metrics.read more
Citations
More filters
Journal ArticleDOI
A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT
TL;DR: A taxonomy of the security research areas in IoT/IIoT along with their corresponding solutions is designed and several open research directions relevant to the focus of this survey are identified.
Journal ArticleDOI
A Survey of Internet of Things (IoT) Authentication Schemes
TL;DR: This paper provides a near complete and up-to-date view of the IoT authentication field and provides a summary of a large range of authentication protocols proposed in the literature, using a multi-criteria classification previously introduced in this work.
Journal ArticleDOI
SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things
TL;DR: Based on SecTrust-RPL, a time-based trust-aware RPL routing protocol, the viability of using trust as an effective security system for mitigating attacks in IoT networks is shown.
Journal ArticleDOI
Routing Attacks and Mitigation Methods for RPL-Based Internet of Things
TL;DR: This paper conducted a detailed review of the RPL standard, including a recently proposed modification, and investigated all recently published attacks on RPL and their mitigation methods through the literature, introducing a first-of-its-kind classification scheme for the mitigation methods that is based on the techniques used for the prevention.
Journal ArticleDOI
Hybrid Satellite-Terrestrial Communication Networks for the Maritime Internet of Things: Key Technologies, Opportunities, and Challenges
TL;DR: A survey on the demand for maritime communications enabled by state-of-the-art hybrid satellite-terrestrial maritime communication networks (MCNs), and envision the use of external auxiliary information to build up an environment-aware, service-driven, and integrated satellite-air-ground MCN.
References
More filters
Journal ArticleDOI
Routing Attacks and Countermeasures in the RPL-Based Internet of Things
TL;DR: This paper implements and demonstrates well-known routing attacks against 6LoWPAN networks running RPL as a routing protocol, and highlights novel security features in the IPv6 protocol and exemplifies the use of these features for intrusion detection in the IoT by implementing a lightweight heartbeat protocol.
Journal ArticleDOI
A Taxonomy of Attacks in RPL-based Internet of Things
TL;DR: This paper proposes to establish a taxonomy of the attacks against this protocol, considering three main categories including attacks targeting network resources, attacks modifying the network topology and attacks related to network traffic.
Proceedings ArticleDOI
VeRA - Version Number and Rank Authentication in RPL
TL;DR: A new security service is described that prevents any misbehaving node from illegitimately increasing the Version Number and compromise illegitimate decreased Rank values in RPL.
Journal ArticleDOI
A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology
Maha Bouaziz,Abderrezak Rachedi +1 more
TL;DR: This paper proposed a survey on mobility management protocols in WSNs based on 6LoWPAN technology, which enables to connect IP sensor devices to other IP networks without any need for gateways.
A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs)
TL;DR: This document presents a security threat analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs) that builds upon previous work on routing security and adapts the assessments to the issues and constraints specific to low-power and lossy networks.