Abstract

A cyber–physical system (CPS) classically comprises the physical components, computational units, the controller, and the communication network. The Wireless sensor networks (WSNs) is a key component in the CPS and connects the distributed sensors for computation and communication. As the usage of such networks increases, the attack surface also increases and mechanisms for mitigating security threats must be developed. The nodes in the WSN are low-powered devices that cannot host traditional security systems. Moreover, specialized architectures of such networks mean that new attacks specifically targeting such architectures would be discovered. The proposed work introduces a security mechanism for black hole attack in Ripple Routing Protocol (RPL) networks, utilizing features such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) network discovery. The state-of-the-art mechanisms existing today for such threats are either heavyweight intrusion detection systems or require nodes working in promiscuous mode. The promiscuity of nodes can be a security concern in itself, whereas large intrusion detection systems require huge processing and network overheads. The proposed work does not rely on either but utilizes a distributed timer-based mechanism to perform malicious node detection. The work has been evaluated using the Cooja simulator, and it has been seen that it can detect black holes with high accuracy resulting in a decrease in packet loss. The true positive rate can reach up to 100%.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call