Abstract

The constrained characteristics of devices in the Internet of Things (IoT) environment deters the implementation of robust security solutions. Consequently, intrusion of malicious nodes in IoT environment is a frequent phenomenon. Such malicious nodes often exploit the vulnerabilities of the underlying routing protocol to instigate several DDoS attacks. The IPv6 Routing Protocol for Low Power and Lossy Networks (RPL), popularly used in numerous IoT applications, is susceptible to several routing attacks. Various researchers have proposed mechanisms for detecting routing attacks and identifying malicious nodes in RPL-based IoT environments. However, the benefit of such mechanisms can only be harness when identified malicious nodes are quickly isolated from the IoT environment. Therefore, the removal of identified malicious nodes outweighs any other security measure. Malicious nodes, often located in remote locations, are difficult to dislodge at the earliest. This paper proposes to embed the isolation and blacklisting mechanism of suspected malicious nodes in the routing process itself. We propose upgrades in the existing RPL routing process to enable fair nodes to collaboratively weed out malicious nodes and restrict the spread of malicious activities in the IoT environment. We call the modified RPL with self mechanized isolation and blacklisting of malicious nodes as IB-RPL.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call