Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network
- 1 October 2015
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
The IPv6 Routing Protocol for Low-power and Lossy networks (RPL) is a standard routing protocol to realize the Internet of Things (IoT). Since RPL is a tree-based topology network, an attacking node may falsely claim its rank towards neighbor nodes in order to be chosen as a parent of them and to collect more packets to tamper. In this paper, we propose a secure parent selection scheme so that each child node can select a legitimate node as its parent. In the proposed scheme, each node chooses a parent after excluding the best candidate if multiple parent candidates exist. Our scheme utilizes the fact that an attacking node claims falsely a lower rank than that of a legitimate nodes. We show that attacking nodes have no merits to claim lower ranks than true ones in a secure parent node selection scheme. By the computer simulation, we show that the proposed scheme reduces the total number of child nodes attached to attacking nodes in comparison with the conventional RPL scheme.Keywords
This publication has 9 references indexed in Scilit:
- Low false alarm attackers detection in RPL by considering timing inconstancy between the rank measurementsIEICE Communications Express, 2015
- Low false alarm rate RPL network monitoring system by considering timing inconstancy between the rank measurementsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- SVELTE: Real-time intrusion detection in the Internet of ThingsAd Hoc Networks, 2013
- The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy NetworksIEEE Sensors Journal, 2013
- Topology Authentication in RPLPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approachInternational Journal of Communication Systems, 2012
- VeRA - Version Number and Rank Authentication in RPLPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Cross-Level Sensor Network Simulation with COOJAProceedings. 2006 31st IEEE Conference on Local Computer Networks, 2006
- Secure routing in wireless sensor networks: attacks and countermeasuresAd Hoc Networks, 2003