Security Vulnerabilities and Countermeasures in the RPL-based Internet of Things

被引:6
|
作者
Yang, Wei [1 ]
Wang, Yuan [1 ]
Lai, Zhixiang [1 ]
Wan, Yadong [2 ]
Cheng, Zhuo [3 ]
机构
[1] Jiangxi Normal Univ, Sch Software, Nanchang, Jiangxi, Peoples R China
[2] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
[3] Jiangxi Normal Univ, Int S&T Cooperat Base Networked Supporting Softwa, Nanchang, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; RPL; Security; Finite State Machine; PROTOCOL;
D O I
10.1109/CyberC.2018.00020
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
RPL is a routing protocol for Low-Power and Lossy Networks, which is the routing protocol standardized for the Internet of Things (IoT). However, RPL has many serious vulnerabilities which can be exploited by attackers. In this paper, we adopt an finite state machines(FSM) based vulnerability discovering approach to analyze the security vulnerabilities of RPL, which can successfully discover sinkhole attack, selective forwarding attack and hello flood attack. Then we propose some security countermeasures to defend against the attacks. Finally, we run a thorough set of simulations to assess the impact of the sinkhole attack and the effectiveness of proposed countermeasure. The results show that the attack can significantly damage the RPL and the countermeasure can successfully detect the malicious node.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 50 条
  • [31] Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
    Al-Sarawi, Shadi
    Anbar, Mohammed
    Alabsi, Basim Ahmad
    Aladaileh, Mohammad Adnan
    Rihan, Shaza Dawood Ahmed
    IEEE ACCESS, 2023, 11 : 94081 - 94093
  • [32] Energy-Aware Adaptive Trickle Timer Algorithm for RPL-based Routing in the Internet of Things
    Musaddiq, Arslan
    Bin Zikria, Yousaf
    Kim, Sung Won
    2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 4 - 9
  • [33] Impact Analysis of Rank Attack on RPL-Based 6LoWPAN Networks in Internet of Things and Aftermaths
    Bang, Ankur
    Rao, Udai Pratap
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (02) : 2489 - 2505
  • [34] Artificial Intelligence-Based Technique for Detection of Selective Forwarding Attack in RPL-Based Internet of Things Networks
    Neerugatti, Vikram
    Reddy, A. Rama Mohan
    EMERGING RESEARCH IN DATA ENGINEERING SYSTEMS AND COMPUTER COMMUNICATIONS, CCODE 2019, 2020, 1054 : 67 - 77
  • [35] A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things
    Al-Amiedy, Taief Alaa
    Anbar, Mohammed
    Belaton, Bahari
    Bahashwan, Abdullah Ahmed
    Hasbullah, Iznan Husainy
    Aladaileh, Mohammad Adnan
    AL Mukhaini, Ghada
    INTERNET OF THINGS, 2023, 22
  • [36] Impact Analysis of Rank Attack on RPL-Based 6LoWPAN Networks in Internet of Things and Aftermaths
    Ankur Bang
    Udai Pratap Rao
    Arabian Journal for Science and Engineering, 2023, 48 : 2489 - 2505
  • [37] Evaluating and improving the scalability of RPL security in the Internet of Things
    Arena, Antonio
    Perazzo, Pericle
    Vallati, Carlo
    Dini, Gianluca
    Anastasi, Giuseppe
    COMPUTER COMMUNICATIONS, 2020, 151 : 119 - 132
  • [38] Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT
    Avila, Karen
    Jabba, Daladier
    Gomez, Javier
    APPLIED SCIENCES-BASEL, 2020, 10 (18):
  • [39] A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures
    Obaidat, Muath A.
    Obeidat, Suhaib
    Holst, Jennifer
    Al Hayajneh, Abdullah
    Brown, Joseph
    COMPUTERS, 2020, 9 (02)
  • [40] Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review
    Verma, Abhishek
    Ranga, Virender
    IEEE SENSORS JOURNAL, 2020, 20 (11) : 5666 - 5690