Abstract
RPL (Routing Protocol for Low-power and lossy networks) is a specific routing protocol designed to optimize 6LoWPAN (IPv6 over Low power Wireless Personal Area Network) operation. As 6LoWPAN suffers from resource constraints on battery, processor, memory and bandwidth, it affects the performance of the RPL protocol. From security point of view, this will make RPL vulnerable to several threats directly or indirectly. Thus, cryptographic systems are not sufficient to protect the RPL from internal attacks; a compromised node from the network may cause undesired operation without being detected by these systems. An intrusion detection system (IDS) should be used, but it is not easy given the nature of 6LoWPAN; on a side its resource constraints, and on the other side its opening to the outside world through the Internet. In this paper we focus on denial of service (DoS) attacks, we determine the elements to be taken into account in selecting a compatible IDS and we give some solutions that we consider effective and valid for 6LoWPAN-RPL based networks Keywords: RPL, ROLL, 6LoWPAN, IDS, DoS, Network security.
Highlights
The Internet of Things (IoT) main concept aim to interconnect heterogeneous objects localized separately in different places, using standard internet protocols
In this paper we focus on denial of service (DoS) attacks, we determine the elements to be taken into account in selecting a compatible intrusion detection system (IDS) and we give some solutions that we consider effective and valid for 6LoWPAN-RPL based networks
To make the concept of IoT real, IETF (Internet Engineering Task Force) created the 6LoWPAN [4], [5]. 6LoWPAN is the acronym of IPv6 over Low power Wireless Personal Area Network, i.e. making low power devices like IEEE 802.15.4-based wireless nodes [6] used in personal area networks like WSN (Wireless Sensor Network) able to connect to the internet having an IPv6 address
Summary
The Internet of Things (IoT) main concept aim to interconnect heterogeneous objects localized separately in different places, using standard internet protocols. Journal of Advanced Computer Science and Technology (Low power Wireless Personal Area Networks) like limited processing power, very dynamic topologies, node mobility, link failures, high loss rates, low data rates and instability To deal with this challenge, IETF create a new protocol compatible to LoWPAN networks under the name of RPL (Routing Protocol for Low-power and lossy network) [7]. Having a resource-constrained network implementing new protocols and connected to the Internet; makes it security a big challenge that must be addressed carefully [8]. Even if it implement known protocols and standards like IPv6 and 802.15.4, which possess many security solutions; it does not solve the problem. The structure of the paper is as follows: Section gives an overview of 6LoWPAN network and its underlying RPL, Section 3 gives more detail on RPL operation, Section 4 discusses denial of service issues and attacks, Section 5 reviews the main countermeasures to secure network routing, Section 6 focus on the IDS approach and techniques and Section 7 concludes the paper
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have