A Ultimate Approach of Mitigating Attacks in RPL Based Low Power Lossy Networks

by   Jaspreet Kaur, et al.

The Routing Protocol for Low-Power and Lossy Networks (RPL) is the existing routing protocol for Internet of Things (IoT). RPL is a proactive,lightweight, Distance Vector protocol which offers security against various forms of routing attacks. Still, there are various attacks(as rank, version attacks and many more ) which is possible in this network due to problem of unauthenticated or unencrypted control frames, centralized root controller, compromised or unauthenticated devices and many more ways. There are various solutions present in the literature but every solution has its pros and cons. There is no appropriate system framework till now which completely solves these all issues. So, we present a ultimate approach to mitigate these RPL attacks more efficiently and effectively. We use IDS based system for internal attacks and a mini-firewall for removing the external attacks. In IDS based approach, we use intrusion detection system at multiple locations for analyzing the behaviour of nodes. The final decision whether the node is attacker or not depends on mainly three things as: trust between the neighbouring nodes, local decision by multiple sink nodes and global decision by root node. We also use some blockchain features in this framework for better internal security. We use some threshold values and rules in mini-firewall for removing external attacks. In this paper, we provide the proposed approach and theoretical analysis of this approach which provide better protection from these attacks than any other method.


page 1

page 2

page 3

page 4


Assessing the Impact of Mobile Attackers on RPL-based Internet of Things

The Internet of Things (IoT) is becoming ubiquitous in our daily life. I...

Securing RPL using Network Coding: The Chained Secure Mode (CSM)

As the de facto routing protocol for many Internet of Things (IoT) netwo...

Addressing DAO Insider Attacks in IPv6-Based Low-Power and Lossy Networks

Low-Power and Lossy Networks (LLNs) run on resource-constrained devices ...

Introducing Network Coding to RPL: The Chained Secure Mode (CSM)

As the de facto routing protocol for many Internet of Things (IoT) netwo...

Resolving the Decreased Rank Attack in RPL's IoT Networks

The Routing Protocol for Low power and Lossy networks (RPL) has been dev...

Adaptive Hybrid Heterogeneous IDS for 6LoWPAN

IPv6 over Low-powered Wireless Personal Area Networks (6LoWPAN) have gro...

Selective Jamming of LoRaWAN using Commodity Hardware

Long range, low power networks are rapidly gaining acceptance in the Int...

Please sign up or login with your details

Forgot password? Click here to reset