Abstract

Internet of Things devices have become increasingly prevalent in various domains, including smart homes, healthcare, transportation, and industrial automation. As the number of IoT devices continues to grow, so does the potential for security challenges. Routing protocols play a critical role in IoT networks by determining the path for packet transmission. However, their susceptibility to modification and manipulation attacks can have far-reaching consequences. These attacks can lead to unauthorized access to sensitive data, disruption of critical services, and even physical harm in certain applications such as healthcare and industrial automation. This paper presents the design and implementation of a security-enhanced routing module aimed at protecting Internet of Things networks from modification and manipulation attacks, particularly focusing on the challenges within the IPv6 Routing Protocol for Low-Power and Lossy Networks. Acknowledging the increasing pervasiveness of IoT devices and their susceptibility to routing disruptions, this work contributes a novel approach to augment RPL's Lamport’s Keyed Hash Chain scheme security posture without impinging on the protocol's inherent resource-efficiency. Through a comprehensive simulation-based system verification process, the module demonstrates its effectiveness in mitigating common routing attacks, its adaptability in dynamic network conditions, and its fidelity to established RPL performance metrics

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call