Intrusion Detection System for RPL from Routing Choice Intrusion

被引:0
|
作者
Zhang, Lan [1 ]
Feng, Gang [1 ]
Qin, Shuang [1 ]
机构
[1] Univ Elect Sci & Technol China, Natl Key Lab Commun, Chengdu, Peoples R China
关键词
LLNs; RPL; Routing Choice (RC) intrusion; IDSs; Contiki OS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RPL is specifically designed for Low power and Lossy Networks (LLNs). With the expansion of LLNs applications, security of RPL becomes one of the major concerns. This paper mainly addresses the security aspect of RPL. We first analyze the vulnerability of RPL self-organising properties, and identify a new RPL internal intrusion, named routing choice (RC) intrusion. We specially analyze the harm of a type RC intrusion in RPL using ETX metric, which further validates the effectiveness of our work. Second, we design IDSs for RPL to defense intrusions. Our design discusses detection methodologies, system architectures, detection data and intrusion respose with some promotions. To satisfy the energy efficiency requirements, we propose three type Monitor Nodes (MNs) devices for different RPL applications. To explicitly show the design of IDSs, we apply our IDS to defense the type of RC intrusion in RPL using ETX metric on Contiki OS, and the results verify the effectiveness of our IDSs. Finally, we theoretically analyzed the applicability of IDSs for RPL.
引用
收藏
页码:2652 / 2658
页数:7
相关论文
共 50 条
  • [21] A Novel Intrusion Detection System for RPL-Based Cyber-Physical Systems
    Sharma, Mridula
    Elmiligi, Haytham
    Gebali, Fayez
    IEEE CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2021, 44 (02): : 246 - 252
  • [22] The sound of intrusion: A novel network intrusion detection system
    Aldarwbi, Mohammed Y.
    Lashkari, Arash H.
    Ghorbani, Ali A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [23] Intrusion Detection Using Rule Based Approach in RPL Networks
    Belavagi, Manjula C
    Muniyal, Balachandra
    IAENG International Journal of Computer Science, 2023, 50 (03)
  • [24] Intrusion and intrusion detection
    John McHugh
    International Journal of Information Security, 2001, 1 (1) : 14 - 35
  • [25] An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection
    Liu, Jiannan
    Xiao, Kun
    Luo, Lei
    Li, Yun
    Chen, Lirong
    2020 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY (QRS 2020), 2020, : 122 - 129
  • [26] Establishing a secure routing in MANET using a Hybrid Intrusion Detection System
    Indira, N.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 260 - 263
  • [27] Implementation and Evaluation of an Intrusion Detection System for IoT: Against Routing Attacks
    Khardioui, Mohamed
    Bamou, Abdelouahed
    Ouadghiri, My Driss El
    Aghoutane, Badraddine
    ADVANCED INTELLIGENT SYSTEMS FOR SUSTAINABLE DEVELOPMENT, AI2SD'2019, VOL 6: ADVANCED INTELLIGENT SYSTEMS FOR NETWORKS AND SYSTEMS, 2020, 92 : 155 - 166
  • [28] Intrusion Detection System Through Deep Learning in Routing MANET Networks
    Abbood, Zainab Ali
    Atilla, Dogu Cagdas
    Aydin, Cagatay
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 37 (01): : 268 - 281
  • [29] Intrusion detection for routing attacks in sensor networks
    Loo, Chong Eik
    Ng, Mun Yong
    Leckie, Christopher
    Palaniswami, Marimuthu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2006, 2 (04): : 313 - 332
  • [30] A Survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and Protection System (IIDPS)
    Borkar, Amol
    Donode, Akshay
    Kumari, Anjali
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 949 - 953