Security Vulnerabilities and Countermeasures in the RPL-based Internet of Things

被引:6
|
作者
Yang, Wei [1 ]
Wang, Yuan [1 ]
Lai, Zhixiang [1 ]
Wan, Yadong [2 ]
Cheng, Zhuo [3 ]
机构
[1] Jiangxi Normal Univ, Sch Software, Nanchang, Jiangxi, Peoples R China
[2] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
[3] Jiangxi Normal Univ, Int S&T Cooperat Base Networked Supporting Softwa, Nanchang, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; RPL; Security; Finite State Machine; PROTOCOL;
D O I
10.1109/CyberC.2018.00020
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
RPL is a routing protocol for Low-Power and Lossy Networks, which is the routing protocol standardized for the Internet of Things (IoT). However, RPL has many serious vulnerabilities which can be exploited by attackers. In this paper, we adopt an finite state machines(FSM) based vulnerability discovering approach to analyze the security vulnerabilities of RPL, which can successfully discover sinkhole attack, selective forwarding attack and hello flood attack. Then we propose some security countermeasures to defend against the attacks. Finally, we run a thorough set of simulations to assess the impact of the sinkhole attack and the effectiveness of proposed countermeasure. The results show that the attack can significantly damage the RPL and the countermeasure can successfully detect the malicious node.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 50 条
  • [21] Collaborative Detection and Prevention of Sybil Attacks against RPL-Based Internet of Things
    Khan, Muhammad Ali
    Bin Rais, Rao Naveed
    Khalid, Osman
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (01): : 827 - 843
  • [22] A Security Routing Protocol for Internet of Things Based on RPL
    Ma, Guojun
    Li, Xing
    Pei, Qingqi
    Li, Zi
    [J]. 2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 209 - 213
  • [23] A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain
    Pourrahmani, Hossein
    Yavarinasab, Adel
    Monazzah, Amir Mahdi Hosseini
    Van Herle, Jan
    [J]. INTERNET OF THINGS, 2023, 23
  • [24] Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
    Al-Sarawi, Shadi
    Anbar, Mohammed
    Alabsi, Basim Ahmad
    Aladaileh, Mohammad Adnan
    Rihan, Shaza Dawood Ahmed
    [J]. Computers, Materials and Continua, 2023, 77 (01): : 491 - 515
  • [25] Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
    Al-Sarawi, Shadi
    Anbar, Mohammed
    Alabsi, Basim Ahmad
    Aladaileh, Mohammad Adnan
    Rihan, Shaza Dawood Ahmed
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (01): : 491 - 515
  • [26] Architecture, Security Vulnerabilities, and the Proposed Countermeasures in Agriculture-Internet-of-Things (AIoT) Systems
    Kansal N.
    Bhushan B.
    Sharma S.
    [J]. Studies in Big Data, 2021, 99 : 329 - 353
  • [27] Internet of Things: Security Vulnerabilities and Challenges
    Andrea, Ioannis
    Chrysostomou, Chrysostomos
    Hadjichristofi, George
    [J]. 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, : 180 - 187
  • [28] Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning
    Zahra, F.
    Jhanjhi, N. Z.
    Brohi, Sarfraz Nawaz
    Khan, Navid Ali
    Masud, Mehedi
    AlZain, Mohammed A.
    [J]. SENSORS, 2022, 22 (18)
  • [29] Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
    Al-Sarawi, Shadi
    Anbar, Mohammed
    Alabsi, Basim Ahmad
    Aladaileh, Mohammad Adnan
    Rihan, Shaza Dawood Ahmed
    [J]. IEEE ACCESS, 2023, 11 : 94081 - 94093
  • [30] Energy-Aware Adaptive Trickle Timer Algorithm for RPL-based Routing in the Internet of Things
    Musaddiq, Arslan
    Bin Zikria, Yousaf
    Kim, Sung Won
    [J]. 2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 4 - 9