scispace - formally typeset
Proceedings ArticleDOI

Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network

Reads0
Chats0
TLDR
It is shown that attacking nodes have no merits to claim lower ranks than true ones in a secure parent node selection scheme, and the proposed scheme reduces the total number of child nodes attached to attacking nodes in comparison with the conventional RPL scheme.
Abstract
The IPv6 Routing Protocol for Low-power and Lossy networks (RPL) is a standard routing protocol to realize the Internet of Things (IoT). Since RPL is a tree-based topology network, an attacking node may falsely claim its rank towards neighbor nodes in order to be chosen as a parent of them and to collect more packets to tamper. In this paper, we propose a secure parent selection scheme so that each child node can select a legitimate node as its parent. In the proposed scheme, each node chooses a parent after excluding the best candidate if multiple parent candidates exist. Our scheme utilizes the fact that an attacking node claims falsely a lower rank than that of a legitimate nodes. We show that attacking nodes have no merits to claim lower ranks than true ones in a secure parent node selection scheme. By the computer simulation, we show that the proposed scheme reduces the total number of child nodes attached to attacking nodes in comparison with the conventional RPL scheme.

read more

Citations
More filters
Journal ArticleDOI

IoT Privacy and Security Challenges for Smart Home Environments

TL;DR: After surveying existing solutions for enhancing IoT security, key future requirements for trusted Smart Home systems are identified and a gateway architecture is selected as the most appropriate for resource-constrained devices, and for high system availability.
Journal ArticleDOI

SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things

TL;DR: Based on SecTrust-RPL, a time-based trust-aware RPL routing protocol, the viability of using trust as an effective security system for mitigating attacks in IoT networks is shown.
Journal ArticleDOI

Routing Attacks and Mitigation Methods for RPL-Based Internet of Things

TL;DR: This paper conducted a detailed review of the RPL standard, including a recently proposed modification, and investigated all recently published attacks on RPL and their mitigation methods through the literature, introducing a first-of-its-kind classification scheme for the mitigation methods that is based on the techniques used for the prevention.
Journal ArticleDOI

Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review

TL;DR: A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding and a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is carried out.
Journal ArticleDOI

Proposing a Secure RPL based Internet of Things Routing Protocol: A Review

TL;DR: A review of existing Routing Protocols for Low Power and Lossy Networks for IoT devices and the need for a new secure RPL protocol to address the security issues of IoT applications for smart cities is considered, particularly based on available literature.
References
More filters

Security Architecture for the Internet Protocol

R. Atkinson
TL;DR: This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer, and obsoletes RFC 2401 (November 1998).
Journal ArticleDOI

Secure routing in wireless sensor networks: attacks and countermeasures

TL;DR: This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.

That ‘Internet of Things’ Thing

Kevin Ashton
TL;DR: The phrase "Internet of Things" started life as the title of a presentation I made at Procter & Gamble (P&G) in 1999 as mentioned in this paper, which was more than just a good way to get executive attention.
Proceedings ArticleDOI

Contiki - a lightweight and flexible operating system for tiny networked sensors

TL;DR: This work presents Contiki, a lightweight operating system with support for dynamic loading and replacement of individual programs and services, built around an event-driven kernel but provides optional preemptive multithreading that can be applied to individual processes.
ReportDOI

RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks

Tim Winter
TL;DR: This document specifies the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), which provides a mechanism whereby multipoint-to-point traffic from devices inside the LLN towards a central control point as well as point- to- multipoint traffic from the central control points to the devices insideThe LLN are supported.
Related Papers (5)