Security Vulnerabilities and Countermeasures in the RPL-based Internet of Things

被引:6
|
作者
Yang, Wei [1 ]
Wang, Yuan [1 ]
Lai, Zhixiang [1 ]
Wan, Yadong [2 ]
Cheng, Zhuo [3 ]
机构
[1] Jiangxi Normal Univ, Sch Software, Nanchang, Jiangxi, Peoples R China
[2] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
[3] Jiangxi Normal Univ, Int S&T Cooperat Base Networked Supporting Softwa, Nanchang, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; RPL; Security; Finite State Machine; PROTOCOL;
D O I
10.1109/CyberC.2018.00020
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
RPL is a routing protocol for Low-Power and Lossy Networks, which is the routing protocol standardized for the Internet of Things (IoT). However, RPL has many serious vulnerabilities which can be exploited by attackers. In this paper, we adopt an finite state machines(FSM) based vulnerability discovering approach to analyze the security vulnerabilities of RPL, which can successfully discover sinkhole attack, selective forwarding attack and hello flood attack. Then we propose some security countermeasures to defend against the attacks. Finally, we run a thorough set of simulations to assess the impact of the sinkhole attack and the effectiveness of proposed countermeasure. The results show that the attack can significantly damage the RPL and the countermeasure can successfully detect the malicious node.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 50 条
  • [1] Routing Attacks and Countermeasures in the RPL-Based Internet of Things
    Wallgren, Linus
    Raza, Shahid
    Voigt, Thiemo
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [2] Denial-of-Service Attacks and Countermeasures in the RPL-Based Internet of Things
    Ioulianou, Philokypros P.
    Vassilakis, Vassilios G.
    [J]. COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 374 - 390
  • [3] A taxonomy of attacks in RPL-based internet of things
    [J]. Mayzaud, Anthéa (anthea.mayzaud@inria.fr), 1600, Femto Technique Co., Ltd. (18):
  • [4] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644
  • [5] Security Attacks and Secure Routing Protocols in RPL-based Internet of Things: Survey
    Kamble, Arvind
    Malemath, Virendra S.
    Patil, Deepika
    [J]. 2017 INTERNATIONAL CONFERENCE ON EMERGING TRENDS & INNOVATION IN ICT (ICEI), 2017, : 33 - 39
  • [6] Energy balancing RPL-based routing for Internet of Things
    Mai Banh
    Nam Nguyen
    Kieu-Ha Phung
    Nguyen, Long
    Nguyen Huu Thanh
    Steenhaut, Kris
    [J]. 2016 IEEE SIXTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (ICCE), 2016, : 125 - 130
  • [7] Load balancing for RPL-based Internet of Things: A review
    Pancaroglu, Doruk
    Sen, Sevil
    [J]. AD HOC NETWORKS, 2021, 116
  • [8] Routing Attacks and Mitigation Methods for RPL-Based Internet of Things
    Raoof, Ahmed
    Matrawy, Ashraf
    Lung, Chung-Horng
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1582 - 1606
  • [9] The DAO Induction Attack Against the RPL-based Internet of Things
    Baghani, Ahmad Shabani
    Rahimpour, Sonbol
    Khabbazian, Majid
    [J]. 2020 28TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2020, : 379 - 383
  • [10] Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses
    Pu, Cong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) : 4937 - 4949