Papers
Topics
Authors
Recent
Search
2000 character limit reached

An Ultimate Approach of Mitigating Attacks in RPL Based Low Power Lossy Networks

Published 29 Oct 2019 in cs.CR | (1910.13435v2)

Abstract: The Routing Protocol for Low-Power and Lossy Networks (RPL) is the existing routing protocol for Internet of Things (IoT). RPL is a proactive,lightweight, Distance Vector protocol which offers security against various forms of routing attacks. Still, there are various attacks(as rank, version attacks and many more ) which is possible in this network due to problem of unauthenticated or unencrypted control frames, centralized root controller, compromised or unauthenticated devices and many more ways. There are various solutions present in the literature but every solution has its pros and cons. There is no appropriate system framework till now which completely solves these all issues. So, we present an ultimate approach to mitigate these RPL attacks more efficiently and effectively. We use IDS based system for internal attacks and a mini-firewall for removing the external attacks. In IDS based approach, we use intrusion detection system at multiple locations for analyzing the behaviour of nodes. The final decision whether the node is attacker or not depends on mainly three things as: trust between the neighbouring nodes, local decision by multiple sink nodes and global decision by root node. We also use some blockchain features in this framework for better internal security. We use some threshold values and rules in mini-firewall for removing external attacks. In this paper, we provide the proposed approach and theoretical analysis of this approach which provide better protection from these attacks than any other method.

Citations (6)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (1)

Collections

Sign up for free to add this paper to one or more collections.