Loading [MathJax]/extensions/MathMenu.js
Detecting Rules-related Attacks in RPL-based Resource-Constrained Wireless Networks | IEEE Conference Publication | IEEE Xplore

Detecting Rules-related Attacks in RPL-based Resource-Constrained Wireless Networks


Abstract:

The Routing Protocol for Low Power and Lossy Networks (RPL) was designed to meet the routing requirements of resource-constrained wireless networks to support different t...Show More

Abstract:

The Routing Protocol for Low Power and Lossy Networks (RPL) was designed to meet the routing requirements of resource-constrained wireless networks to support different topologies as well as various Quality of Services (QoS). In RPL, nodes carefully select the best routes toward the root and avoid routing loops according to their locations in the network. Unfortunately, nodes can be compromised to perform a variety of internal attacks against the RPL rules. To improve the security within the RPL-based networks, in this paper, we extend a centralized Intrusion Detection System (IDS) called ARM, with specification-based intrusion modules added to both the root and the RPL nodes to enhance their ability in detecting a wider range of RPL rules-related attacks. Our extensive simulation results show that the proposed IDS, ARM-Pro, can achieve high accuracy in detecting the RPL rules-related attacks while incurring a moderate overhead on the devices resources.
Date of Conference: 09-11 December 2020
Date Added to IEEE Xplore: 22 April 2021
ISBN Information:

ISSN Information:

Conference Location: Louisville, KY, USA

Contact IEEE to Subscribe

References

References is not available for this document.