Abstract

This paper focuses on the security aspect of RPL (Routing Protocol for Low-power and lossy network) by introducing a new type of threat - the topology attack, which changes the node operation for breaking the optimised network topology, and designing a specification-based IDS for detecting it. We present two novel RPL attacks of this type: the rank attack and local repair attack. We also propose an IDS architecture using network monitor backbone, and describe its monitoring mechanisms through a RPL finite state machine implemented in each monitor node. We show that our system can effectively detect these routing operation threats with a reasonable overhead.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.