Skip to main content
Top
Published in: Telecommunication Systems 1/2020

26-05-2020

CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis

Authors: Abhishek Verma, Virender Ranga

Published in: Telecommunication Systems | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The IPv6 routing protocol for low-power and lossy networks (RPL) is the standard routing protocol for IPv6 based low-power wireless personal area networks (6LoWPANs). In RPL protocol, DODAG information object (DIO) messages are used to disseminate routing information to other nodes in the network. A malicious node may eavesdrop DIO messages of its neighbor nodes and later replay the captured DIO many times with fixed intervals. In this paper, we present and investigate one of the severe attacks named as a non-spoofed copycat attack, a type of replay based DoS attack against RPL protocol. It is shown that the non-spoofed copycat attack increases the average end-to-end delay (AE2ED) and packet delivery ratio of the network. Thus, to address this problem, an intrusion detection system (IDS) named CoSec-RPL is proposed in this paper. The attack detection logic of CoSec-RPL is primarily based on the idea of outlier detection (OD). CoSec-RPL significantly mitigates the effects of the non-spoofed copycat attack on the network’s performance. The effectiveness of the proposed IDS is compared with the standard RPL protocol. The experimental results indicate that CoSec-RPL detects and mitigates non-spoofed copycat attack efficiently in both static and mobile network scenarios without adding any significant overhead to the nodes. To the best of our knowledge, CoSec-RPL is the first RPL specific IDS that utilizes OD for intrusion detection in 6LoWPANs.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Adat, V., & Gupta, B. (2018). Security in internet of things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67(3), 423–441.CrossRef Adat, V., & Gupta, B. (2018). Security in internet of things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67(3), 423–441.CrossRef
3.
go back to reference Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). Secure routing for internet of things: A survey. Journal of Network and Computer Applications, 66, 198–213.CrossRef Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). Secure routing for internet of things: A survey. Journal of Network and Computer Applications, 66, 198–213.CrossRef
4.
go back to reference Airehrour, D., Gutierrez, J. A., & Ray, S. K. (2018). SecTrust -RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Generation Computer Systems. Airehrour, D., Gutierrez, J. A., & Ray, S. K. (2018). SecTrust -RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Generation Computer Systems.
5.
go back to reference Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications, 88, 10–28.CrossRef Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications, 88, 10–28.CrossRef
6.
go back to reference Ammar, M., Russello, G., & Crispo, B. (2018). Internet of things: A survey on the security of iot frameworks. Journal of Information Security and Applications, 38, 8–27.CrossRef Ammar, M., Russello, G., & Crispo, B. (2018). Internet of things: A survey on the security of iot frameworks. Journal of Information Security and Applications, 38, 8–27.CrossRef
7.
go back to reference Ancillotti, E., Bolettieri, S., & Bruno, R. (2018). Rtt-based congestion control for the internet of things. In International conference on wired/wireless internet communication (pp 3–15). Berlin: Springer. Ancillotti, E., Bolettieri, S., & Bruno, R. (2018). Rtt-based congestion control for the internet of things. In International conference on wired/wireless internet communication (pp 3–15). Berlin: Springer.
8.
go back to reference Ashton, K. (2009). That ‘internet of things’ thing. RFID Journal, 22(7), 97–114. Ashton, K. (2009). That ‘internet of things’ thing. RFID Journal, 22(7), 97–114.
9.
go back to reference Barnett, V., & Lewis, T. (1974). Outliers in statistical data. London: Wiley. Barnett, V., & Lewis, T. (1974). Outliers in statistical data. London: Wiley.
10.
go back to reference Bostani, H., & Sheikhan, M. (2017). Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach. Computer Communications. Bostani, H., & Sheikhan, M. (2017). Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach. Computer Communications.
11.
go back to reference Domingues, R., Filippone, M., Michiardi, P., & Zouaoui, J. (2018). A comparative evaluation of outlier detection algorithms: Experiments and analyses. Pattern Recognition, 74, 406–421.CrossRef Domingues, R., Filippone, M., Michiardi, P., & Zouaoui, J. (2018). A comparative evaluation of outlier detection algorithms: Experiments and analyses. Pattern Recognition, 74, 406–421.CrossRef
12.
go back to reference Dunkels, A., Schmidt, O., Finne, N., Eriksson, J., Österlind, F., & Durvy, N. T. M. (2011). The contiki os: The operating system for the internet of things. http://www.contikios.org. Retrieved March 10, 2020. Dunkels, A., Schmidt, O., Finne, N., Eriksson, J., Österlind, F., & Durvy, N. T. M. (2011). The contiki os: The operating system for the internet of things. http://​www.​contikios.​org. Retrieved March 10, 2020.
13.
go back to reference Gaddour, O., & Koubâa, A. (2012). RPL in a nutshell: A survey. Computer Networks, 56(14), 3163–3178.CrossRef Gaddour, O., & Koubâa, A. (2012). RPL in a nutshell: A survey. Computer Networks, 56(14), 3163–3178.CrossRef
14.
go back to reference Gara, F., Saad, L. B., & Ayed, R. B. (2017). An efficient intrusion detection system for selective forwarding and clone attackers in ipv6-based wireless sensor networks under mobility. International Journal on Semantic Web and Information Systems (IJSWIS), 13(3), 22–47.CrossRef Gara, F., Saad, L. B., & Ayed, R. B. (2017). An efficient intrusion detection system for selective forwarding and clone attackers in ipv6-based wireless sensor networks under mobility. International Journal on Semantic Web and Information Systems (IJSWIS), 13(3), 22–47.CrossRef
15.
go back to reference Ghaleb, B., Al-Dubai, A., Ekonomou, E., Qasem, M., Romdhani, I., & Mackenzie, L. (2018a). Addressing the DAO Insider Attack in RPL’s Internet of Things Networks. IEEE Communications Letters, 23(1), 68–71.CrossRef Ghaleb, B., Al-Dubai, A., Ekonomou, E., Qasem, M., Romdhani, I., & Mackenzie, L. (2018a). Addressing the DAO Insider Attack in RPL’s Internet of Things Networks. IEEE Communications Letters, 23(1), 68–71.CrossRef
16.
go back to reference Ghaleb, B., Al-Dubai, A. Y., Ekonomou, E., Alsarhan, A., Nasser, Y., Mackenzie, L. M., et al. (2018b). A survey of limitations and enhancements of the ipv6 routing protocol for low-power and lossy networks: A focus on core operations. IEEE Communications Surveys & Tutorials, 21(2), 1607–1635.CrossRef Ghaleb, B., Al-Dubai, A. Y., Ekonomou, E., Alsarhan, A., Nasser, Y., Mackenzie, L. M., et al. (2018b). A survey of limitations and enhancements of the ipv6 routing protocol for low-power and lossy networks: A focus on core operations. IEEE Communications Surveys & Tutorials, 21(2), 1607–1635.CrossRef
19.
go back to reference Gungor, V. C., & Hancke, G. P. (2009). Industrial wireless sensor networks: Challenges, design principles, and technical approaches. IEEE Transactions on Industrial Electronics, 56(10), 4258–4265.CrossRef Gungor, V. C., & Hancke, G. P. (2009). Industrial wireless sensor networks: Challenges, design principles, and technical approaches. IEEE Transactions on Industrial Electronics, 56(10), 4258–4265.CrossRef
20.
go back to reference Hamid, M. A., Rashid, M., & Hong, C. S. (2006). Routing security in sensor network: Hello flood attack and defense. In IEEE, Proceedings of First International Conference on Next-Generation Wireless Systems (ICNEWS) (pp 2–4). Hamid, M. A., Rashid, M., & Hong, C. S. (2006). Routing security in sensor network: Hello flood attack and defense. In IEEE, Proceedings of First International Conference on Next-Generation Wireless Systems (ICNEWS) (pp 2–4).
21.
go back to reference Hoaglin, D. C. (2003). John W. Tukey and data analysis. Statistical Science (pp. 311–318). Hoaglin, D. C. (2003). John W. Tukey and data analysis. Statistical Science (pp. 311–318).
25.
go back to reference Jabez, J., & Muthukumar, B. (2015). Intrusion detection system (IDS): Anomaly detection using outlier detection approach. Procedia Computer Science, 48, 338–346.CrossRef Jabez, J., & Muthukumar, B. (2015). Intrusion detection system (IDS): Anomaly detection using outlier detection approach. Procedia Computer Science, 48, 338–346.CrossRef
26.
go back to reference Kabilan, K., Bhalaji, N., Selvaraj, C., Kumaar, M., & Karthikeyan, P. (2018). Performance analysis of IoT protocol under different mobility models. Computers & Electrical Engineering, 72, 154–168.CrossRef Kabilan, K., Bhalaji, N., Selvaraj, C., Kumaar, M., & Karthikeyan, P. (2018). Performance analysis of IoT protocol under different mobility models. Computers & Electrical Engineering, 72, 154–168.CrossRef
27.
go back to reference Kanaris, L., Sergiou, C., Kokkinis, A., Pafitis, A., Antoniou, N., & Stavrou, S. (2019). On the realistic radio and network planning of iot sensor networks. Sensors, 19(15), 3264.CrossRef Kanaris, L., Sergiou, C., Kokkinis, A., Pafitis, A., Antoniou, N., & Stavrou, S. (2019). On the realistic radio and network planning of iot sensor networks. Sensors, 19(15), 3264.CrossRef
28.
go back to reference Kumar, N., & Kumar, U. (2016). Anomaly-based network intrusion detection: An outlier detection techniques. In International Conference on Soft Computing and Pattern Recognition (pp. 262–269). Berlin: Springer. Kumar, N., & Kumar, U. (2016). Anomaly-based network intrusion detection: An outlier detection techniques. In International Conference on Soft Computing and Pattern Recognition (pp. 262–269). Berlin: Springer.
29.
go back to reference Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., & Chai, M. (2013). The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sensors Journal, 13(10), 3685–3692.CrossRef Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., & Chai, M. (2013). The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sensors Journal, 13(10), 3685–3692.CrossRef
30.
go back to reference Le, A., Loo, J., Chai, K., & Aiash, M. (2016). A specification-based IDS for detecting attacks on RPL-based network topology. Information, 7(2), 25.CrossRef Le, A., Loo, J., Chai, K., & Aiash, M. (2016). A specification-based IDS for detecting attacks on RPL-based network topology. Information, 7(2), 25.CrossRef
32.
go back to reference Malik, M., Dutta, M., & Granjal, J. (2019). A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things. IEEE Access, 7, 27443–27464.CrossRef Malik, M., Dutta, M., & Granjal, J. (2019). A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things. IEEE Access, 7, 27443–27464.CrossRef
33.
go back to reference Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., & Schönwälder, J. (2014). A study of RPL DODAG version attacks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 8508 LNCS:92–104. Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., & Schönwälder, J. (2014). A study of RPL DODAG version attacks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 8508 LNCS:92–104.
34.
go back to reference Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., & Schönwälder, J. (2015). Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks. International Journal of Network Management, 25(5), 320–339.CrossRef Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., & Schönwälder, J. (2015). Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks. International Journal of Network Management, 25(5), 320–339.CrossRef
35.
go back to reference Mayzaud, A., Badonnel, R., & Chrisment, I. (2016a). Detecting version number attacks using a distributed monitoring architecture. In Proceedings of IEEE/IFIP/In Assoc with ACM SIGCOMM international conference on network and service management (CNSM 2016) (pp. 127–135). Mayzaud, A., Badonnel, R., & Chrisment, I. (2016a). Detecting version number attacks using a distributed monitoring architecture. In Proceedings of IEEE/IFIP/In Assoc with ACM SIGCOMM international conference on network and service management (CNSM 2016) (pp. 127–135).
36.
go back to reference Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., & Schönwälder, J. (2016b). Using the RPL protocol for supporting passive monitoring in the Internet of Things. In Proceedings of the NOMS 2016—2016 IEEE/IFIP network operations and management symposium (pp. 366–374). Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., & Schönwälder, J. (2016b). Using the RPL protocol for supporting passive monitoring in the Internet of Things. In Proceedings of the NOMS 2016—2016 IEEE/IFIP network operations and management symposium (pp. 366–374).
37.
go back to reference Mayzaud, A., Badonnel, R., & Chrisment, I. (2017). A distributed monitoring strategy for detecting version number attacks in RPL-based networks. IEEE Transactions on Network and Service Management, 14(2), 472–486.CrossRef Mayzaud, A., Badonnel, R., & Chrisment, I. (2017). A distributed monitoring strategy for detecting version number attacks in RPL-based networks. IEEE Transactions on Network and Service Management, 14(2), 472–486.CrossRef
38.
go back to reference Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2018). Security threats in the internet of things: Rpl’s attacks and countermeasures. In Security and privacy in smart sensor networks, IGI Global (pp. 147–178). Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2018). Security threats in the internet of things: Rpl’s attacks and countermeasures. In Security and privacy in smart sensor networks, IGI Global (pp. 147–178).
39.
go back to reference Mohammadi, P., & Ghaffari, A. (2019). Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Personal Communications, 106(2), 365–376.CrossRef Mohammadi, P., & Ghaffari, A. (2019). Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Personal Communications, 106(2), 365–376.CrossRef
40.
go back to reference Musaddiq, A., Zikria, Y. B., Hahm, O., Yu, H., Bashir, A. K., & Kim, S. W. (2018). A survey on resource management in IoT operating systems. IEEE Access, 6, 8459–8482.CrossRef Musaddiq, A., Zikria, Y. B., Hahm, O., Yu, H., Bashir, A. K., & Kim, S. W. (2018). A survey on resource management in IoT operating systems. IEEE Access, 6, 8459–8482.CrossRef
41.
go back to reference Čolaković, A., & Hadžialić, M. (2018). Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues. Computer Networks, 144, 17–39.CrossRef Čolaković, A., & Hadžialić, M. (2018). Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues. Computer Networks, 144, 17–39.CrossRef
42.
go back to reference Pathan, A. S. K., Lee, H. W., & Hong, C. S. (2006). Security in wireless sensor networks: Issues and challenges. IEEE, 2006 8th international conference advanced communication technology (pp. 1043–1048). Pathan, A. S. K., Lee, H. W., & Hong, C. S. (2006). Security in wireless sensor networks: Issues and challenges. IEEE, 2006 8th international conference advanced communication technology (pp. 1043–1048).
43.
go back to reference Perazzo, P., Vallati, C., Anastasi, G., & Dini, G. (2017a). DIO suppression attack against routing in the Internet of Things. IEEE Communications Letters, 21(11), 2524–2527.CrossRef Perazzo, P., Vallati, C., Anastasi, G., & Dini, G. (2017a). DIO suppression attack against routing in the Internet of Things. IEEE Communications Letters, 21(11), 2524–2527.CrossRef
44.
go back to reference Perazzo, P., Vallati, C., Arena, A., Anastasi, G., & Dini, G. (2017b). An implementation and evaluation of the security features of RPL. In Lecture Notes in Computer Science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics). Perazzo, P., Vallati, C., Arena, A., Anastasi, G., & Dini, G. (2017b). An implementation and evaluation of the security features of RPL. In Lecture Notes in Computer Science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics).
45.
go back to reference Raoof, A., Matrawy, A., & Lung, C. (2019). Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Communications Surveys Tutorials, 21(2), 1582–1606.CrossRef Raoof, A., Matrawy, A., & Lung, C. (2019). Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Communications Surveys Tutorials, 21(2), 1582–1606.CrossRef
46.
go back to reference Raymond, D. R., & Midkiff, S. F. (2008). Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 1, 74–81.CrossRef Raymond, D. R., & Midkiff, S. F. (2008). Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 1, 74–81.CrossRef
48.
go back to reference Raza, S., Wallgren, L., & Voigt, T. (2013). Svelte: Real-time intrusion detection in the internet of things. Ad Hoc Networks, 11(8), 2661–2674.CrossRef Raza, S., Wallgren, L., & Voigt, T. (2013). Svelte: Real-time intrusion detection in the internet of things. Ad Hoc Networks, 11(8), 2661–2674.CrossRef
49.
go back to reference Seeber, S., Sehgal, A., Stelte, B., Rodosek, G. D., & Schonwalder, J. (2013). Towards a trust computing architecture for RPL in Cyber Physical Systems. In 2013 9th International conference on network and service management (CNSM), IEEE (pp. 134–137). Seeber, S., Sehgal, A., Stelte, B., Rodosek, G. D., & Schonwalder, J. (2013). Towards a trust computing architecture for RPL in Cyber Physical Systems. In 2013 9th International conference on network and service management (CNSM), IEEE (pp. 134–137).
50.
go back to reference Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in the Internet of Things. Digital Communications and Networks, 4(2), 118–137.CrossRef Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in the Internet of Things. Digital Communications and Networks, 4(2), 118–137.CrossRef
51.
go back to reference Shamsoshoara, A., Korenda, A., Afghah, F., & Zeadally, S. (2019). A survey on hardware-based security mechanisms for internet of things. arXiv preprint arXiv:1907.12525 Shamsoshoara, A., Korenda, A., Afghah, F., & Zeadally, S. (2019). A survey on hardware-based security mechanisms for internet of things. arXiv preprint arXiv:​1907.​12525
53.
go back to reference Thulasiraman, P., & Wang, Y. (2019). A lightweight trust-based security architecture for RPL in mobile IoT networks. In 2019 16th IEEE annual consumer communications & networking conference (CCNC), IEEE (pp 1–6). Thulasiraman, P., & Wang, Y. (2019). A lightweight trust-based security architecture for RPL in mobile IoT networks. In 2019 16th IEEE annual consumer communications & networking conference (CCNC), IEEE (pp 1–6).
54.
go back to reference Tripathi, J. (2014). On design, evaluation and enhancement of IP-based routing solutions for low power and lossy networks. PhD thesis, Drexel University. Tripathi, J. (2014). On design, evaluation and enhancement of IP-based routing solutions for low power and lossy networks. PhD thesis, Drexel University.
56.
go back to reference Vallati, C. (2019). Personal communication. Vallati, C. (2019). Personal communication.
58.
go back to reference Verma, A., & Ranga, V. (2019a). Addressing flooding attacks in IPv6-based low power and lossy networks. In TENCON 2019-2019 IEEE Region 10 Conference (TENCON), IEEE (pp 552–557). Verma, A., & Ranga, V. (2019a). Addressing flooding attacks in IPv6-based low power and lossy networks. In TENCON 2019-2019 IEEE Region 10 Conference (TENCON), IEEE (pp 552–557).
59.
go back to reference Verma, A., & Ranga, V. (2019b). ELNIDS: Ensemble learning based network intrusion detection system for RPL based Internet of Things. In 2019 4th International conference on Internet of Things: Smart innovation and usages (IoT-SIU), IEEE (pp 1–6). Verma, A., & Ranga, V. (2019b). ELNIDS: Ensemble learning based network intrusion detection system for RPL based Internet of Things. In 2019 4th International conference on Internet of Things: Smart innovation and usages (IoT-SIU), IEEE (pp 1–6).
60.
go back to reference Verma, A., & Ranga, V. (2019c). Evaluation of network intrusion detection systems for RPL based 6LoWPAN networks in IoT. Wireless Personal Communications (pp. 1–24). Verma, A., & Ranga, V. (2019c). Evaluation of network intrusion detection systems for RPL based 6LoWPAN networks in IoT. Wireless Personal Communications (pp. 1–24).
61.
go back to reference Verma, A., & Ranga, V. (2020). Mitigation of DIS flooding attacks in RPL-based 6LoWPAN networks. Transactions on Emerging Telecommunications Technologies, 31(2), e3802.CrossRef Verma, A., & Ranga, V. (2020). Mitigation of DIS flooding attacks in RPL-based 6LoWPAN networks. Transactions on Emerging Telecommunications Technologies, 31(2), e3802.CrossRef
63.
go back to reference Wadhaj, I., Ghaleb, B., Thomson, C., Al-Dubai, A., & Buchanan, W. J. (2020). Mitigation mechanisms against the DAO attack on the routing protocol for low power and lossy networks (RPL). IEEE Access, 8, 43665–43675.CrossRef Wadhaj, I., Ghaleb, B., Thomson, C., Al-Dubai, A., & Buchanan, W. J. (2020). Mitigation mechanisms against the DAO attack on the routing protocol for low power and lossy networks (RPL). IEEE Access, 8, 43665–43675.CrossRef
64.
go back to reference Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based Internet of Things. International Journal of Distributed Sensor Networks, 9(8), 794326.CrossRef Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based Internet of Things. International Journal of Distributed Sensor Networks, 9(8), 794326.CrossRef
65.
go back to reference Wang, H., Li, H., Fang, J., & Wang, H. (2018). Robust Gaussian Kalman filter with outlier detection. IEEE Signal Processing Letters, 25(8), 1236–1240.CrossRef Wang, H., Li, H., Fang, J., & Wang, H. (2018). Robust Gaussian Kalman filter with outlier detection. IEEE Signal Processing Letters, 25(8), 1236–1240.CrossRef
66.
go back to reference Wang, J., Chalhoub, G., Tall, H., & Misson, M. (2017). Routing protocol enhancement for mobility support in wireless sensor networks. In International conference on ad-hoc networks and wireless (pp 262–275). Berlin: Springer. Wang, J., Chalhoub, G., Tall, H., & Misson, M. (2017). Routing protocol enhancement for mobility support in wireless sensor networks. In International conference on ad-hoc networks and wireless (pp 262–275). Berlin: Springer.
67.
68.
go back to reference Xie, W., Goyal, M., Hosseini, H., Martocci, J., Bashir, Y., Baccelli, E., & Durresi, A. (2010). Routing loops in dag-based low power and lossy networks. In 2010 24th IEEE international conference on advanced information networking and applications (AINA), IEEE (pp. 888–895). Xie, W., Goyal, M., Hosseini, H., Martocci, J., Bashir, Y., Baccelli, E., & Durresi, A. (2010). Routing loops in dag-based low power and lossy networks. In 2010 24th IEEE international conference on advanced information networking and applications (AINA), IEEE (pp. 888–895).
69.
go back to reference Xu, L. D., He, W., & Li, S. (2014). Internet of Things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243.CrossRef Xu, L. D., He, W., & Li, S. (2014). Internet of Things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243.CrossRef
70.
go back to reference Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250–1258.CrossRef Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250–1258.CrossRef
71.
go back to reference Zhi, T., Luo, H., & Liu, Y. (2018). A Gini impurity-based interest flooding attack defence mechanism in NDN. IEEE Communications Letters, 22(3), 538–541.CrossRef Zhi, T., Luo, H., & Liu, Y. (2018). A Gini impurity-based interest flooding attack defence mechanism in NDN. IEEE Communications Letters, 22(3), 538–541.CrossRef
72.
go back to reference Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the Internet of Things: Threats and challenges. Security and Communication Networks, 7(12), 2728–2742.CrossRef Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the Internet of Things: Threats and challenges. Security and Communication Networks, 7(12), 2728–2742.CrossRef
Metadata
Title
CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis
Authors
Abhishek Verma
Virender Ranga
Publication date
26-05-2020
Publisher
Springer US
Published in
Telecommunication Systems / Issue 1/2020
Print ISSN: 1018-4864
Electronic ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-020-00674-w

Other articles of this Issue 1/2020

Telecommunication Systems 1/2020 Go to the issue