Loading [MathJax]/extensions/MathMenu.js
Security Vulnerabilities and Countermeasures in the RPL-Based Internet of Things | IEEE Conference Publication | IEEE Xplore

Security Vulnerabilities and Countermeasures in the RPL-Based Internet of Things


Abstract:

RPL is a routing protocol for Low-Power and Lossy Networks, which is the routing protocol standardized for the Internet of Things (IoT). However, RPL has many serious vul...Show More

Abstract:

RPL is a routing protocol for Low-Power and Lossy Networks, which is the routing protocol standardized for the Internet of Things (IoT). However, RPL has many serious vulnerabilities which can be exploited by attackers. In this paper, we adopt an finite state machines(FSM) based vulnerability discovering approach to analyze the security vulnerabilities of RPL, which can successfully discover sinkhole attack, selective-forwarding attack and hello flood attack. Then we propose some security countermeasures to defend against the attacks. Finally, we run a thorough set of simulations to assess the impact of the sinkhole attack and the effectiveness of proposed countermeasure. The results show that the attack can significantly damage the RPL and the countermeasure can successfully detect the malicious node.
Date of Conference: 18-20 October 2018
Date Added to IEEE Xplore: 21 February 2019
ISBN Information:
Conference Location: Zhengzhou, China
Citations are not available for this document.

I. Introduction

The Internet-of-Things (IoT)silently changes the way people communicate with the physical world by a possibly large number of intelligent devices. It is expected to be widely used in smart city, home automation, health monitoring and industrial applications [1]–[2]. In this technological revolution, standardization plays a very important role. Numerous groups are currently working on the protocols at different levels of the stack of IoT. The IEEE and IETF working group are collaborating to make a standard protocol stack for IoT [3]–[4]. The goal is that the resource-constrained wireless sensors in IoT can be connect into the Internet. So anyone can visit or communicate with them in anytime by website.

Cites in Papers - |

Cites in Papers - IEEE (3)

Select All
1.
Nadia A. Alfriehat, Mohammed Anbar, Shankar Karuppayah, Shaza Dawood Ahmed Rihan, Basim Ahmad Alabsi, Alaa M. Momani, "Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy", IEEE Access, vol.12, pp.31136-31158, 2024.
2.
Okan Yaman, Baríş Sokat, Tolga Ayav, Yusuf Murat Erten, "A Novel Countermeasure for Selective Forwarding Attacks in IoT Networks", 2022 3rd International Informatics and Software Engineering Conference (IISEC), pp.1-6, 2022.
3.
Abbas Jamalipour, Sarumathi Murali, "A Taxonomy of Machine-Learning-Based Intrusion Detection Systems for the Internet of Things: A Survey", IEEE Internet of Things Journal, vol.9, no.12, pp.9444-9466, 2022.

Cites in Papers - Other Publishers (2)

1.
Joshua Teddy Ibibo, "A Bibliometric Analysis and Comprehensive Overview of Security Attacks Against RPL in IoT Networks", The Seventh International Conference on Safety and Security with IoT, pp.45, 2024.
2.
Ayman El Hajjar, "Key-Pre Distribution for the Internet of Things Challenges, Threats and Recommendations", Wireless Networks, pp.1, 2023.
Contact IEEE to Subscribe

References

References is not available for this document.