Security Vulnerabilities and Countermeasures in the RPL-based Internet of Things

被引:6
|
作者
Yang, Wei [1 ]
Wang, Yuan [1 ]
Lai, Zhixiang [1 ]
Wan, Yadong [2 ]
Cheng, Zhuo [3 ]
机构
[1] Jiangxi Normal Univ, Sch Software, Nanchang, Jiangxi, Peoples R China
[2] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
[3] Jiangxi Normal Univ, Int S&T Cooperat Base Networked Supporting Softwa, Nanchang, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; RPL; Security; Finite State Machine; PROTOCOL;
D O I
10.1109/CyberC.2018.00020
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
RPL is a routing protocol for Low-Power and Lossy Networks, which is the routing protocol standardized for the Internet of Things (IoT). However, RPL has many serious vulnerabilities which can be exploited by attackers. In this paper, we adopt an finite state machines(FSM) based vulnerability discovering approach to analyze the security vulnerabilities of RPL, which can successfully discover sinkhole attack, selective forwarding attack and hello flood attack. Then we propose some security countermeasures to defend against the attacks. Finally, we run a thorough set of simulations to assess the impact of the sinkhole attack and the effectiveness of proposed countermeasure. The results show that the attack can significantly damage the RPL and the countermeasure can successfully detect the malicious node.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 50 条
  • [41] Internet-of-Things Security and Vulnerabilities: Case Study
    Alqarawi, Ghaida
    Alkhalifah, Bashayer
    Alharbi, Najla
    El Khediri, Salim
    JOURNAL OF APPLIED SECURITY RESEARCH, 2023, 18 (03) : 559 - 575
  • [42] Internet of Things (IoT): Application Systems and Security Vulnerabilities
    Ahamed, Jinesh
    Rajan, Amala V.
    2016 5TH INTERNATIONAL CONFERENCE ON ELECTRONIC DEVICES, SYSTEMS AND APPLICATIONS (ICEDSA), 2016,
  • [43] Research on Defects and Countermeasures of Internet of Things Security Technology
    Lin, Jie
    2018 4TH INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND MATERIAL APPLICATION, 2019, 252
  • [44] Analysis of Security Issues and Countermeasures for the Industrial Internet of Things
    Pal, Shantanu
    Jadidi, Zahra
    APPLIED SCIENCES-BASEL, 2021, 11 (20):
  • [45] The Security for Power Internet of Things: Framework, Policies and Countermeasures
    Zhang, Yiying
    Zou, Weifu
    Chen, Xi
    Yang, Chengyue
    Cao, Jinping
    2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 139 - 142
  • [46] Security and Privacy Problems and Countermeasures of Internet of Things Applications
    Liu, Junlan
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING (ICMMCCE 2017), 2017, 141 : 223 - 226
  • [47] Trust-based RPL for the Internet of Things
    Djedjig, Nabil
    Tandjaoui, Djamel
    Medjek, Faiza
    2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, : 962 - 967
  • [48] Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice
    Kejun Chen
    Shuai Zhang
    Zhikun Li
    Yi Zhang
    Qingxu Deng
    Sandip Ray
    Yier Jin
    Journal of Hardware and Systems Security, 2018, 2 (2) : 97 - 110
  • [49] Analysis of Security Vulnerabilities and Countermeasures
    Son, Hyun-Min
    Joo, Nak-Keun
    Choi, Hyun-Taek
    Lee, Hyun-Cheol
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 200 - 206
  • [50] Internet of healthcare things security vulnerabilities and jamming attack analysis
    Sharma, Kavita
    EXPERT SYSTEMS, 2022, 39 (03)