Reference Hub2
A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things

A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things

Anshuman Patel, Devesh Jinwala
Copyright: © 2021 |Volume: 15 |Issue: 4 |Pages: 17
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781799859895|DOI: 10.4018/IJISP.2021100101
Cite Article Cite Article

MLA

Patel, Anshuman, and Devesh Jinwala. "A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things." IJISP vol.15, no.4 2021: pp.1-17. http://doi.org/10.4018/IJISP.2021100101

APA

Patel, A. & Jinwala, D. (2021). A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things. International Journal of Information Security and Privacy (IJISP), 15(4), 1-17. http://doi.org/10.4018/IJISP.2021100101

Chicago

Patel, Anshuman, and Devesh Jinwala. "A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things," International Journal of Information Security and Privacy (IJISP) 15, no.4: 1-17. http://doi.org/10.4018/IJISP.2021100101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Internet of things (IoT) offers communication between user-to-machine and machine-to-machine. Due to their inherent characteristics of open medium, very dynamic topology, lack of infrastructure and lack of centralized management authority, IoT present serious vulnerabilities to security attacks. The routing protocol for low-power and lossy networks (RPL) does not have an inherent mechanism to detect routing attacks. Popular among these IoT attacks is blackhole attack. An attacker can exploit the routing system of RPL to launch blackhole attack against an IoT network. To secure IoT networks from blackhole attack, trust-integrated RPL protocol (TRPL) is proposed and implemented. The trust system is embedded in the RPL protocol to detect and isolate a blackhole attack while optimizing network performance. The trust is calculated from successful interaction between two nodes. The calculated trust value is considered in parent selection. TRPL demonstrates its superior performance over the standard RPL protocol and existing techniques in the detection and isolation of blackhole attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.