Unveiling the Energy-Based Validation and Verification (EVV) Method for Perceiving and Averting Rank Inconsistency Attacks (RIA) for Guarding IoT Routing

被引:0
|
作者
Ramu K. [1 ]
Gomathi N. [2 ]
Suman S.K. [4 ]
Josephson P.J. [5 ]
Vadivukarassi M. [6 ]
Lavudiya N.S. [7 ]
Bhagyalakshmi L. [8 ]
机构
[1] IBM KYNDRYL LLC, TN, Chennai
[2] D Institute of Science and Technology, TN, Chennai
[3] Department of ECE, St. Martin’s Engineering College, Telangana, Secunderabad
[4] Department of ECE, Malla Reddy Engineering College, Telangana, Secunderabad
[5] Department of Computer Science and Engineering, St Martin’s Engineering College, Telangana, Secunderabad
[6] Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, AP, Vaddeswaram, Guntur
[7] Department of ECE, Rajalakshmi Engineering College, TN, Chennai
关键词
DODAG; EVV; IoT; RIA; RPL;
D O I
10.1007/s42979-023-02568-5
中图分类号
学科分类号
摘要
The need for connected devices is increasing rapidly in response to the expanding demand for internet connectivity and related services. Due to the high need for IoT applications, new methods and tools have been developed. RPL is a protocol suite used in IoT networks that facilitates communication and movement between nodes. Commercial implementation of the Internet of Thing (IoT) is hampered by a small number of security problems, despite the fact that there are many benefits to adopting IoT. The EVV approach is what the authors suggest utilizing in order to locate the rank node in an RPL topology that has been incorrectly assigned. A rank value is a numerical representation of each node's position in the tree in relation to the root node. To identify the malicious hub, the proposed EVV method is implemented at the root hub. Attackers in RPL use the energy meter to their advantage and launch a variety of attacks by moving up the RPL directed attack graph (DODAG). This work proposes an energy-based intrusion detection module to identify these attacks and the malicious nodes. Against a rank attack, also known as a rank inconsistency attack (RIA), this EVV module can hold its own. Select network parameters are used to evaluate the proposed EVV method against the current systems. Thus, compared to prior methods, the EVV significantly decreased the time required for both attacker identification and network convergence. © The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd 2024.
引用
收藏
相关论文
empty
未找到相关数据