Open Access   Article Go Back

An Algorithm to Detect Rank Attack in RPL based 6LoWPAN Networks

R. Stephen1 , A. Dalvin Vinoth Kumar2 , L. Arockiam3

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-02 , Page no. 460-463, Mar-2018

Online published on Mar 31, 2018

Copyright © R. Stephen, A. Dalvin Vinoth Kumar, L. Arockiam . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Stephen, A. Dalvin Vinoth Kumar, L. Arockiam, “An Algorithm to Detect Rank Attack in RPL based 6LoWPAN Networks,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.460-463, 2018.

MLA Style Citation: R. Stephen, A. Dalvin Vinoth Kumar, L. Arockiam "An Algorithm to Detect Rank Attack in RPL based 6LoWPAN Networks." International Journal of Computer Sciences and Engineering 06.02 (2018): 460-463.

APA Style Citation: R. Stephen, A. Dalvin Vinoth Kumar, L. Arockiam, (2018). An Algorithm to Detect Rank Attack in RPL based 6LoWPAN Networks. International Journal of Computer Sciences and Engineering, 06(02), 460-463.

BibTex Style Citation:
@article{Stephen_2018,
author = {R. Stephen, A. Dalvin Vinoth Kumar, L. Arockiam},
title = {An Algorithm to Detect Rank Attack in RPL based 6LoWPAN Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {06},
Issue = {02},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {460-463},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=287},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=287
TI - An Algorithm to Detect Rank Attack in RPL based 6LoWPAN Networks
T2 - International Journal of Computer Sciences and Engineering
AU - R. Stephen, A. Dalvin Vinoth Kumar, L. Arockiam
PY - 2018
DA - 2018/03/31
PB - IJCSE, Indore, INDIA
SP - 460-463
IS - 02
VL - 06
SN - 2347-2693
ER -

           

Abstract

Internet of Things (IoT) is connected with numerous number of heterogeneous devices and these devices are communicating with one another. They are deployed in low power lossy networks. These networks encounter various attacks. Such as sinkhole attack, selective forwarding, wormhole attack, rank attack. Internet Engineering Task Force (IETF) standardizes protocol for IoT. One such is IPv6 Routing Protocol for Low power and Lossy network (RPL). RPL is typically designed for IoT in the context of constrained resources. In RPL, source nodes select the preferred parent node based on the rank metric to select the optimum routes. However, the malicious node misuses the rank metric to attract its neighbor nodes. This issue is defined as the rank attack. This paper proposes an algorithm to detect the rank attack in RPL based Internet of Things.

Key-Words / Index Term

Internet of Things, RPL, Rank attack, 6LoWPAN

References

[1] Wallgren Linus, Shahid Raza, and Thiemo Voigt, "Routing attacks and countermeasures in the RPL-based internet of things", International Journal of Distributed Sensor Networks, Vol. 9, Issue. 8, 2013.
[2] Airehrour David, Jairo Gutierrez, and Sayan Kumar Ray, "A testbed implementation of a trust-aware RPL routing protocol", 27th International Telecommunication Networks and Applications Conference (ITNAC) on IEEE, pp. 1-6, 2017.
[3] Airehrour David, Jairo Gutierrez, and Sayan Kumar Ray, "Secure routing for internet of things: A survey", Journal of Network and Computer Applications 66, 2016, pp.198-213.
[4] Anhtuan Le, Jonathan Loo, Yuan Luo, Aboubaker Lasebae, “Specification-based IDS for securing RPL from topology attacks”, ISSN: 2156-9711, 2011, pp. 1-3, DOI: 10.1109/WD.2011.6098218.
[5] Le Anhtuan, Jonathan Loo, Aboubaker Lasebae, Alexey Vinel, Yue Chen, and Michael Chai, "The impact of rank attack on network topology of routing protocol for low-power and lossy networks", IEEE Sensors Journal,Vol. 13, Issue.10, 2013, pp. 3685-3692.
[6] Shreenivas Dharmini, Shahid Raza, and Thiemo Voigt, "Intrusion Detection in the RPL-connected 6LoWPAN Networks", Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, ACM, 2017, pp. 31-38.
[7] Karthik V.K. and Pushpalatha M, “Addressing attacks and security mechanism in the RPL based IoT”, International journal of computer science and engineering communications, vol.5, Issue.5, 2017, pp. 1715-1721.
[8] Alzubaidi Mahmood, Mohammed Anbar, Samer Al-Saleem, Shadi Al-Sarawi, and Kamal Alieyan, "Review on mechanisms for detecting sinkhole attacks on RPLs", Information Technology (ICIT), 8th International Conference on. IEEE, 2017, pp.369-374.
[9] Medjek, F., Tandjaoui, D., Romdhani, I., and Djedjig, N, “A Trust-based Intrusion Detection System for Mobile RPL Based Networks”, In IEEE 10th International Conference on Internet of Things, 2017.
[10] Fu, Y., Yan, Z., Cao, J., Koné, O., and Cao, X, “An Automata Based Intrusion Detection Method for Internet of Things”, Mobile Information Systems, 2017.
[11] Shahid Raza, Linus Wallgren, and Thiemo Voigt, "SVELTE: Real-time intrusion detection in the Internet of Things", Journal on Ad hoc networks, Vol.11, Issue.08, 2013, pp. 2661-2674.
[12] Anhtuan Le, Jonathan loo, Kok Keong Chai and Mahdi Aiash, "A specification-based IDS for detecting attacks on RPL-based network topology", Information 7. Issue.2, Vol.25, 2016.
[13] Heiner Perrey, Martin Landsmann, Osman Ugus, Matthias W¨ahlisch and Thomas C. Schmidt, “TRAIL: Topology authentication in RPL”, 2013.
[14] Kevin Weekly and Kristofer Pister, "Evaluating sinkhole defense techniques in RPL networks", Network Protocols (ICNP), 20th IEEE International Conference on. IEEE, 2012, pp. 1-6.
[15] Christian Cervantes, Diego Poplade, Michele Nogueira and Aldri Santos, "Detection of sinkhole attacks for supporting secure routing on 6lowpan for internet of things", Integrated Network Management (IM), IFIP/IEEE International Symposium on. IEEE, 2015.
[16] A. Rehman, M. M. Khan, M. A. Lodhi and F. B. Hussain, “Rank attack using objective function in RPL for low power and lossy networks”, International Conference on Industrial Informatics and Computer Systems (CIICS), 2016, pp. 1-5, DOI: 10.1109/ICCSII.2016.7462418.
[17] Airehrour David, Jairo Gutierrez, and Sayan Kumar Ray, "Secure routing for internet of things: A survey", Journal of Network and Computer Applications 66, 2016, pp.198-213, http://dx.doi.org/10.1016/j.jnca.2016.03.006.