Skip to main content
Erschienen in: Telecommunication Systems 1/2020

26.05.2020

CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis

verfasst von: Abhishek Verma, Virender Ranga

Erschienen in: Telecommunication Systems | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The IPv6 routing protocol for low-power and lossy networks (RPL) is the standard routing protocol for IPv6 based low-power wireless personal area networks (6LoWPANs). In RPL protocol, DODAG information object (DIO) messages are used to disseminate routing information to other nodes in the network. A malicious node may eavesdrop DIO messages of its neighbor nodes and later replay the captured DIO many times with fixed intervals. In this paper, we present and investigate one of the severe attacks named as a non-spoofed copycat attack, a type of replay based DoS attack against RPL protocol. It is shown that the non-spoofed copycat attack increases the average end-to-end delay (AE2ED) and packet delivery ratio of the network. Thus, to address this problem, an intrusion detection system (IDS) named CoSec-RPL is proposed in this paper. The attack detection logic of CoSec-RPL is primarily based on the idea of outlier detection (OD). CoSec-RPL significantly mitigates the effects of the non-spoofed copycat attack on the network’s performance. The effectiveness of the proposed IDS is compared with the standard RPL protocol. The experimental results indicate that CoSec-RPL detects and mitigates non-spoofed copycat attack efficiently in both static and mobile network scenarios without adding any significant overhead to the nodes. To the best of our knowledge, CoSec-RPL is the first RPL specific IDS that utilizes OD for intrusion detection in 6LoWPANs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Adat, V., & Gupta, B. (2018). Security in internet of things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67(3), 423–441.CrossRef Adat, V., & Gupta, B. (2018). Security in internet of things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67(3), 423–441.CrossRef
3.
Zurück zum Zitat Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). Secure routing for internet of things: A survey. Journal of Network and Computer Applications, 66, 198–213.CrossRef Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). Secure routing for internet of things: A survey. Journal of Network and Computer Applications, 66, 198–213.CrossRef
4.
Zurück zum Zitat Airehrour, D., Gutierrez, J. A., & Ray, S. K. (2018). SecTrust -RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Generation Computer Systems. Airehrour, D., Gutierrez, J. A., & Ray, S. K. (2018). SecTrust -RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Generation Computer Systems.
5.
Zurück zum Zitat Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications, 88, 10–28.CrossRef Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications, 88, 10–28.CrossRef
6.
Zurück zum Zitat Ammar, M., Russello, G., & Crispo, B. (2018). Internet of things: A survey on the security of iot frameworks. Journal of Information Security and Applications, 38, 8–27.CrossRef Ammar, M., Russello, G., & Crispo, B. (2018). Internet of things: A survey on the security of iot frameworks. Journal of Information Security and Applications, 38, 8–27.CrossRef
7.
Zurück zum Zitat Ancillotti, E., Bolettieri, S., & Bruno, R. (2018). Rtt-based congestion control for the internet of things. In International conference on wired/wireless internet communication (pp 3–15). Berlin: Springer. Ancillotti, E., Bolettieri, S., & Bruno, R. (2018). Rtt-based congestion control for the internet of things. In International conference on wired/wireless internet communication (pp 3–15). Berlin: Springer.
8.
Zurück zum Zitat Ashton, K. (2009). That ‘internet of things’ thing. RFID Journal, 22(7), 97–114. Ashton, K. (2009). That ‘internet of things’ thing. RFID Journal, 22(7), 97–114.
9.
Zurück zum Zitat Barnett, V., & Lewis, T. (1974). Outliers in statistical data. London: Wiley. Barnett, V., & Lewis, T. (1974). Outliers in statistical data. London: Wiley.
10.
Zurück zum Zitat Bostani, H., & Sheikhan, M. (2017). Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach. Computer Communications. Bostani, H., & Sheikhan, M. (2017). Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach. Computer Communications.
11.
Zurück zum Zitat Domingues, R., Filippone, M., Michiardi, P., & Zouaoui, J. (2018). A comparative evaluation of outlier detection algorithms: Experiments and analyses. Pattern Recognition, 74, 406–421.CrossRef Domingues, R., Filippone, M., Michiardi, P., & Zouaoui, J. (2018). A comparative evaluation of outlier detection algorithms: Experiments and analyses. Pattern Recognition, 74, 406–421.CrossRef
12.
Zurück zum Zitat Dunkels, A., Schmidt, O., Finne, N., Eriksson, J., Österlind, F., & Durvy, N. T. M. (2011). The contiki os: The operating system for the internet of things. http://www.contikios.org. Retrieved March 10, 2020. Dunkels, A., Schmidt, O., Finne, N., Eriksson, J., Österlind, F., & Durvy, N. T. M. (2011). The contiki os: The operating system for the internet of things. http://​www.​contikios.​org. Retrieved March 10, 2020.
13.
Zurück zum Zitat Gaddour, O., & Koubâa, A. (2012). RPL in a nutshell: A survey. Computer Networks, 56(14), 3163–3178.CrossRef Gaddour, O., & Koubâa, A. (2012). RPL in a nutshell: A survey. Computer Networks, 56(14), 3163–3178.CrossRef
14.
Zurück zum Zitat Gara, F., Saad, L. B., & Ayed, R. B. (2017). An efficient intrusion detection system for selective forwarding and clone attackers in ipv6-based wireless sensor networks under mobility. International Journal on Semantic Web and Information Systems (IJSWIS), 13(3), 22–47.CrossRef Gara, F., Saad, L. B., & Ayed, R. B. (2017). An efficient intrusion detection system for selective forwarding and clone attackers in ipv6-based wireless sensor networks under mobility. International Journal on Semantic Web and Information Systems (IJSWIS), 13(3), 22–47.CrossRef
15.
Zurück zum Zitat Ghaleb, B., Al-Dubai, A., Ekonomou, E., Qasem, M., Romdhani, I., & Mackenzie, L. (2018a). Addressing the DAO Insider Attack in RPL’s Internet of Things Networks. IEEE Communications Letters, 23(1), 68–71.CrossRef Ghaleb, B., Al-Dubai, A., Ekonomou, E., Qasem, M., Romdhani, I., & Mackenzie, L. (2018a). Addressing the DAO Insider Attack in RPL’s Internet of Things Networks. IEEE Communications Letters, 23(1), 68–71.CrossRef
16.
Zurück zum Zitat Ghaleb, B., Al-Dubai, A. Y., Ekonomou, E., Alsarhan, A., Nasser, Y., Mackenzie, L. M., et al. (2018b). A survey of limitations and enhancements of the ipv6 routing protocol for low-power and lossy networks: A focus on core operations. IEEE Communications Surveys & Tutorials, 21(2), 1607–1635.CrossRef Ghaleb, B., Al-Dubai, A. Y., Ekonomou, E., Alsarhan, A., Nasser, Y., Mackenzie, L. M., et al. (2018b). A survey of limitations and enhancements of the ipv6 routing protocol for low-power and lossy networks: A focus on core operations. IEEE Communications Surveys & Tutorials, 21(2), 1607–1635.CrossRef
19.
Zurück zum Zitat Gungor, V. C., & Hancke, G. P. (2009). Industrial wireless sensor networks: Challenges, design principles, and technical approaches. IEEE Transactions on Industrial Electronics, 56(10), 4258–4265.CrossRef Gungor, V. C., & Hancke, G. P. (2009). Industrial wireless sensor networks: Challenges, design principles, and technical approaches. IEEE Transactions on Industrial Electronics, 56(10), 4258–4265.CrossRef
20.
Zurück zum Zitat Hamid, M. A., Rashid, M., & Hong, C. S. (2006). Routing security in sensor network: Hello flood attack and defense. In IEEE, Proceedings of First International Conference on Next-Generation Wireless Systems (ICNEWS) (pp 2–4). Hamid, M. A., Rashid, M., & Hong, C. S. (2006). Routing security in sensor network: Hello flood attack and defense. In IEEE, Proceedings of First International Conference on Next-Generation Wireless Systems (ICNEWS) (pp 2–4).
21.
Zurück zum Zitat Hoaglin, D. C. (2003). John W. Tukey and data analysis. Statistical Science (pp. 311–318). Hoaglin, D. C. (2003). John W. Tukey and data analysis. Statistical Science (pp. 311–318).
25.
Zurück zum Zitat Jabez, J., & Muthukumar, B. (2015). Intrusion detection system (IDS): Anomaly detection using outlier detection approach. Procedia Computer Science, 48, 338–346.CrossRef Jabez, J., & Muthukumar, B. (2015). Intrusion detection system (IDS): Anomaly detection using outlier detection approach. Procedia Computer Science, 48, 338–346.CrossRef
26.
Zurück zum Zitat Kabilan, K., Bhalaji, N., Selvaraj, C., Kumaar, M., & Karthikeyan, P. (2018). Performance analysis of IoT protocol under different mobility models. Computers & Electrical Engineering, 72, 154–168.CrossRef Kabilan, K., Bhalaji, N., Selvaraj, C., Kumaar, M., & Karthikeyan, P. (2018). Performance analysis of IoT protocol under different mobility models. Computers & Electrical Engineering, 72, 154–168.CrossRef
27.
Zurück zum Zitat Kanaris, L., Sergiou, C., Kokkinis, A., Pafitis, A., Antoniou, N., & Stavrou, S. (2019). On the realistic radio and network planning of iot sensor networks. Sensors, 19(15), 3264.CrossRef Kanaris, L., Sergiou, C., Kokkinis, A., Pafitis, A., Antoniou, N., & Stavrou, S. (2019). On the realistic radio and network planning of iot sensor networks. Sensors, 19(15), 3264.CrossRef
28.
Zurück zum Zitat Kumar, N., & Kumar, U. (2016). Anomaly-based network intrusion detection: An outlier detection techniques. In International Conference on Soft Computing and Pattern Recognition (pp. 262–269). Berlin: Springer. Kumar, N., & Kumar, U. (2016). Anomaly-based network intrusion detection: An outlier detection techniques. In International Conference on Soft Computing and Pattern Recognition (pp. 262–269). Berlin: Springer.
29.
Zurück zum Zitat Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., & Chai, M. (2013). The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sensors Journal, 13(10), 3685–3692.CrossRef Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., & Chai, M. (2013). The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sensors Journal, 13(10), 3685–3692.CrossRef
30.
Zurück zum Zitat Le, A., Loo, J., Chai, K., & Aiash, M. (2016). A specification-based IDS for detecting attacks on RPL-based network topology. Information, 7(2), 25.CrossRef Le, A., Loo, J., Chai, K., & Aiash, M. (2016). A specification-based IDS for detecting attacks on RPL-based network topology. Information, 7(2), 25.CrossRef
32.
Zurück zum Zitat Malik, M., Dutta, M., & Granjal, J. (2019). A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things. IEEE Access, 7, 27443–27464.CrossRef Malik, M., Dutta, M., & Granjal, J. (2019). A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things. IEEE Access, 7, 27443–27464.CrossRef
33.
Zurück zum Zitat Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., & Schönwälder, J. (2014). A study of RPL DODAG version attacks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 8508 LNCS:92–104. Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., & Schönwälder, J. (2014). A study of RPL DODAG version attacks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 8508 LNCS:92–104.
34.
Zurück zum Zitat Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., & Schönwälder, J. (2015). Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks. International Journal of Network Management, 25(5), 320–339.CrossRef Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., & Schönwälder, J. (2015). Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks. International Journal of Network Management, 25(5), 320–339.CrossRef
35.
Zurück zum Zitat Mayzaud, A., Badonnel, R., & Chrisment, I. (2016a). Detecting version number attacks using a distributed monitoring architecture. In Proceedings of IEEE/IFIP/In Assoc with ACM SIGCOMM international conference on network and service management (CNSM 2016) (pp. 127–135). Mayzaud, A., Badonnel, R., & Chrisment, I. (2016a). Detecting version number attacks using a distributed monitoring architecture. In Proceedings of IEEE/IFIP/In Assoc with ACM SIGCOMM international conference on network and service management (CNSM 2016) (pp. 127–135).
36.
Zurück zum Zitat Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., & Schönwälder, J. (2016b). Using the RPL protocol for supporting passive monitoring in the Internet of Things. In Proceedings of the NOMS 2016—2016 IEEE/IFIP network operations and management symposium (pp. 366–374). Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., & Schönwälder, J. (2016b). Using the RPL protocol for supporting passive monitoring in the Internet of Things. In Proceedings of the NOMS 2016—2016 IEEE/IFIP network operations and management symposium (pp. 366–374).
37.
Zurück zum Zitat Mayzaud, A., Badonnel, R., & Chrisment, I. (2017). A distributed monitoring strategy for detecting version number attacks in RPL-based networks. IEEE Transactions on Network and Service Management, 14(2), 472–486.CrossRef Mayzaud, A., Badonnel, R., & Chrisment, I. (2017). A distributed monitoring strategy for detecting version number attacks in RPL-based networks. IEEE Transactions on Network and Service Management, 14(2), 472–486.CrossRef
38.
Zurück zum Zitat Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2018). Security threats in the internet of things: Rpl’s attacks and countermeasures. In Security and privacy in smart sensor networks, IGI Global (pp. 147–178). Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2018). Security threats in the internet of things: Rpl’s attacks and countermeasures. In Security and privacy in smart sensor networks, IGI Global (pp. 147–178).
39.
Zurück zum Zitat Mohammadi, P., & Ghaffari, A. (2019). Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Personal Communications, 106(2), 365–376.CrossRef Mohammadi, P., & Ghaffari, A. (2019). Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Personal Communications, 106(2), 365–376.CrossRef
40.
Zurück zum Zitat Musaddiq, A., Zikria, Y. B., Hahm, O., Yu, H., Bashir, A. K., & Kim, S. W. (2018). A survey on resource management in IoT operating systems. IEEE Access, 6, 8459–8482.CrossRef Musaddiq, A., Zikria, Y. B., Hahm, O., Yu, H., Bashir, A. K., & Kim, S. W. (2018). A survey on resource management in IoT operating systems. IEEE Access, 6, 8459–8482.CrossRef
41.
Zurück zum Zitat Čolaković, A., & Hadžialić, M. (2018). Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues. Computer Networks, 144, 17–39.CrossRef Čolaković, A., & Hadžialić, M. (2018). Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues. Computer Networks, 144, 17–39.CrossRef
42.
Zurück zum Zitat Pathan, A. S. K., Lee, H. W., & Hong, C. S. (2006). Security in wireless sensor networks: Issues and challenges. IEEE, 2006 8th international conference advanced communication technology (pp. 1043–1048). Pathan, A. S. K., Lee, H. W., & Hong, C. S. (2006). Security in wireless sensor networks: Issues and challenges. IEEE, 2006 8th international conference advanced communication technology (pp. 1043–1048).
43.
Zurück zum Zitat Perazzo, P., Vallati, C., Anastasi, G., & Dini, G. (2017a). DIO suppression attack against routing in the Internet of Things. IEEE Communications Letters, 21(11), 2524–2527.CrossRef Perazzo, P., Vallati, C., Anastasi, G., & Dini, G. (2017a). DIO suppression attack against routing in the Internet of Things. IEEE Communications Letters, 21(11), 2524–2527.CrossRef
44.
Zurück zum Zitat Perazzo, P., Vallati, C., Arena, A., Anastasi, G., & Dini, G. (2017b). An implementation and evaluation of the security features of RPL. In Lecture Notes in Computer Science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics). Perazzo, P., Vallati, C., Arena, A., Anastasi, G., & Dini, G. (2017b). An implementation and evaluation of the security features of RPL. In Lecture Notes in Computer Science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics).
45.
Zurück zum Zitat Raoof, A., Matrawy, A., & Lung, C. (2019). Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Communications Surveys Tutorials, 21(2), 1582–1606.CrossRef Raoof, A., Matrawy, A., & Lung, C. (2019). Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Communications Surveys Tutorials, 21(2), 1582–1606.CrossRef
46.
Zurück zum Zitat Raymond, D. R., & Midkiff, S. F. (2008). Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 1, 74–81.CrossRef Raymond, D. R., & Midkiff, S. F. (2008). Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 1, 74–81.CrossRef
48.
Zurück zum Zitat Raza, S., Wallgren, L., & Voigt, T. (2013). Svelte: Real-time intrusion detection in the internet of things. Ad Hoc Networks, 11(8), 2661–2674.CrossRef Raza, S., Wallgren, L., & Voigt, T. (2013). Svelte: Real-time intrusion detection in the internet of things. Ad Hoc Networks, 11(8), 2661–2674.CrossRef
49.
Zurück zum Zitat Seeber, S., Sehgal, A., Stelte, B., Rodosek, G. D., & Schonwalder, J. (2013). Towards a trust computing architecture for RPL in Cyber Physical Systems. In 2013 9th International conference on network and service management (CNSM), IEEE (pp. 134–137). Seeber, S., Sehgal, A., Stelte, B., Rodosek, G. D., & Schonwalder, J. (2013). Towards a trust computing architecture for RPL in Cyber Physical Systems. In 2013 9th International conference on network and service management (CNSM), IEEE (pp. 134–137).
50.
Zurück zum Zitat Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in the Internet of Things. Digital Communications and Networks, 4(2), 118–137.CrossRef Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in the Internet of Things. Digital Communications and Networks, 4(2), 118–137.CrossRef
51.
Zurück zum Zitat Shamsoshoara, A., Korenda, A., Afghah, F., & Zeadally, S. (2019). A survey on hardware-based security mechanisms for internet of things. arXiv preprint arXiv:1907.12525 Shamsoshoara, A., Korenda, A., Afghah, F., & Zeadally, S. (2019). A survey on hardware-based security mechanisms for internet of things. arXiv preprint arXiv:​1907.​12525
53.
Zurück zum Zitat Thulasiraman, P., & Wang, Y. (2019). A lightweight trust-based security architecture for RPL in mobile IoT networks. In 2019 16th IEEE annual consumer communications & networking conference (CCNC), IEEE (pp 1–6). Thulasiraman, P., & Wang, Y. (2019). A lightweight trust-based security architecture for RPL in mobile IoT networks. In 2019 16th IEEE annual consumer communications & networking conference (CCNC), IEEE (pp 1–6).
54.
Zurück zum Zitat Tripathi, J. (2014). On design, evaluation and enhancement of IP-based routing solutions for low power and lossy networks. PhD thesis, Drexel University. Tripathi, J. (2014). On design, evaluation and enhancement of IP-based routing solutions for low power and lossy networks. PhD thesis, Drexel University.
56.
Zurück zum Zitat Vallati, C. (2019). Personal communication. Vallati, C. (2019). Personal communication.
58.
Zurück zum Zitat Verma, A., & Ranga, V. (2019a). Addressing flooding attacks in IPv6-based low power and lossy networks. In TENCON 2019-2019 IEEE Region 10 Conference (TENCON), IEEE (pp 552–557). Verma, A., & Ranga, V. (2019a). Addressing flooding attacks in IPv6-based low power and lossy networks. In TENCON 2019-2019 IEEE Region 10 Conference (TENCON), IEEE (pp 552–557).
59.
Zurück zum Zitat Verma, A., & Ranga, V. (2019b). ELNIDS: Ensemble learning based network intrusion detection system for RPL based Internet of Things. In 2019 4th International conference on Internet of Things: Smart innovation and usages (IoT-SIU), IEEE (pp 1–6). Verma, A., & Ranga, V. (2019b). ELNIDS: Ensemble learning based network intrusion detection system for RPL based Internet of Things. In 2019 4th International conference on Internet of Things: Smart innovation and usages (IoT-SIU), IEEE (pp 1–6).
60.
Zurück zum Zitat Verma, A., & Ranga, V. (2019c). Evaluation of network intrusion detection systems for RPL based 6LoWPAN networks in IoT. Wireless Personal Communications (pp. 1–24). Verma, A., & Ranga, V. (2019c). Evaluation of network intrusion detection systems for RPL based 6LoWPAN networks in IoT. Wireless Personal Communications (pp. 1–24).
61.
Zurück zum Zitat Verma, A., & Ranga, V. (2020). Mitigation of DIS flooding attacks in RPL-based 6LoWPAN networks. Transactions on Emerging Telecommunications Technologies, 31(2), e3802.CrossRef Verma, A., & Ranga, V. (2020). Mitigation of DIS flooding attacks in RPL-based 6LoWPAN networks. Transactions on Emerging Telecommunications Technologies, 31(2), e3802.CrossRef
63.
Zurück zum Zitat Wadhaj, I., Ghaleb, B., Thomson, C., Al-Dubai, A., & Buchanan, W. J. (2020). Mitigation mechanisms against the DAO attack on the routing protocol for low power and lossy networks (RPL). IEEE Access, 8, 43665–43675.CrossRef Wadhaj, I., Ghaleb, B., Thomson, C., Al-Dubai, A., & Buchanan, W. J. (2020). Mitigation mechanisms against the DAO attack on the routing protocol for low power and lossy networks (RPL). IEEE Access, 8, 43665–43675.CrossRef
64.
Zurück zum Zitat Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based Internet of Things. International Journal of Distributed Sensor Networks, 9(8), 794326.CrossRef Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based Internet of Things. International Journal of Distributed Sensor Networks, 9(8), 794326.CrossRef
65.
Zurück zum Zitat Wang, H., Li, H., Fang, J., & Wang, H. (2018). Robust Gaussian Kalman filter with outlier detection. IEEE Signal Processing Letters, 25(8), 1236–1240.CrossRef Wang, H., Li, H., Fang, J., & Wang, H. (2018). Robust Gaussian Kalman filter with outlier detection. IEEE Signal Processing Letters, 25(8), 1236–1240.CrossRef
66.
Zurück zum Zitat Wang, J., Chalhoub, G., Tall, H., & Misson, M. (2017). Routing protocol enhancement for mobility support in wireless sensor networks. In International conference on ad-hoc networks and wireless (pp 262–275). Berlin: Springer. Wang, J., Chalhoub, G., Tall, H., & Misson, M. (2017). Routing protocol enhancement for mobility support in wireless sensor networks. In International conference on ad-hoc networks and wireless (pp 262–275). Berlin: Springer.
67.
68.
Zurück zum Zitat Xie, W., Goyal, M., Hosseini, H., Martocci, J., Bashir, Y., Baccelli, E., & Durresi, A. (2010). Routing loops in dag-based low power and lossy networks. In 2010 24th IEEE international conference on advanced information networking and applications (AINA), IEEE (pp. 888–895). Xie, W., Goyal, M., Hosseini, H., Martocci, J., Bashir, Y., Baccelli, E., & Durresi, A. (2010). Routing loops in dag-based low power and lossy networks. In 2010 24th IEEE international conference on advanced information networking and applications (AINA), IEEE (pp. 888–895).
69.
Zurück zum Zitat Xu, L. D., He, W., & Li, S. (2014). Internet of Things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243.CrossRef Xu, L. D., He, W., & Li, S. (2014). Internet of Things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243.CrossRef
70.
Zurück zum Zitat Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250–1258.CrossRef Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250–1258.CrossRef
71.
Zurück zum Zitat Zhi, T., Luo, H., & Liu, Y. (2018). A Gini impurity-based interest flooding attack defence mechanism in NDN. IEEE Communications Letters, 22(3), 538–541.CrossRef Zhi, T., Luo, H., & Liu, Y. (2018). A Gini impurity-based interest flooding attack defence mechanism in NDN. IEEE Communications Letters, 22(3), 538–541.CrossRef
72.
Zurück zum Zitat Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the Internet of Things: Threats and challenges. Security and Communication Networks, 7(12), 2728–2742.CrossRef Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the Internet of Things: Threats and challenges. Security and Communication Networks, 7(12), 2728–2742.CrossRef
Metadaten
Titel
CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis
verfasst von
Abhishek Verma
Virender Ranga
Publikationsdatum
26.05.2020
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 1/2020
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-020-00674-w

Weitere Artikel der Ausgabe 1/2020

Telecommunication Systems 1/2020 Zur Ausgabe

Neuer Inhalt