Skip to main content

2018 | OriginalPaper | Buchkapitel

Neighbor Attack Detection in Internet of Things

verfasst von : Arun Thomas, T. Gireesh Kumar, Ashok Kumar Mohan

Erschienen in: Advanced Computational and Communication Paradigms

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT) hegemonies all other technological development the world has seen so far. 6LoWPAN is emerging as the next generation protocol of IoT. 6LoWPAN protocol enables the resource constrained embedded device to connect to the Internet through IPv6. Routing Protocol for Low Power and Lossy Networks (RPL) is specifically designed as a routing protocol for resource constrained device and it is adaptable with the 6LoWPAN. There are many attacks which make RPL insignificant to achieve its desired objectives. Neighbor attack is momentous and is capable of disrupting possible routing path. In this paper, we proposed intrusion detection system which can detect neighbor attack in RPL protocol and a secure root process to prevent the effect of attack on this protocol. The IDS is incorporated by considering location information and received signal strength to identify malicious node. We have also incorporated secure root process which can rectify disruption in routing path after detecting attacks. This method can act as an optimum method for resources constrained environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Le, A., Loo, J., Chai, K.K., Aiash, M.: A specification-based IDS for detecting attacks on RPL-based network topology. Information 7(2), 25 (2016)CrossRef Le, A., Loo, J., Chai, K.K., Aiash, M.: A specification-based IDS for detecting attacks on RPL-based network topology. Information 7(2), 25 (2016)CrossRef
3.
Zurück zum Zitat Rghioui, A., Khannous, A., Bouhorma, M.: Denial-of-Service attacks on 6LoWPAN-RPL networks: threats and an intrusion detection system proposition. J. Adv. Comput. Sci. Technol. 3(2), 143 (2014)CrossRef Rghioui, A., Khannous, A., Bouhorma, M.: Denial-of-Service attacks on 6LoWPAN-RPL networks: threats and an intrusion detection system proposition. J. Adv. Comput. Sci. Technol. 3(2), 143 (2014)CrossRef
4.
Zurück zum Zitat Pongle, P., Chavan, G.: A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International Conference on Pervasive Computing (ICPC), pp. 1–6. IEEE, Jan 2015 Pongle, P., Chavan, G.: A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International Conference on Pervasive Computing (ICPC), pp. 1–6. IEEE, Jan 2015
5.
Zurück zum Zitat Le, A., Loo, J., Luo, Y., Lasebae, A.: The impacts of internal threats towards routing protocol for low power and lossy network performance. In: 2013 IEEE Symposium on Computers and Communications (ISCC), pp. 000789–000794. IEEE, July 2013 Le, A., Loo, J., Luo, Y., Lasebae, A.: The impacts of internal threats towards routing protocol for low power and lossy network performance. In: 2013 IEEE Symposium on Computers and Communications (ISCC), pp. 000789–000794. IEEE, July 2013
6.
Zurück zum Zitat Weekly, K., Pister, K.: Evaluating sinkhole defense techniques in RPL networks. In: 2012 20th IEEE International Conference on Network Protocols (ICNP), pp. 1–6. IEEE, Oct 2012 Weekly, K., Pister, K.: Evaluating sinkhole defense techniques in RPL networks. In: 2012 20th IEEE International Conference on Network Protocols (ICNP), pp. 1–6. IEEE, Oct 2012
7.
Zurück zum Zitat IETF, RPL. Routing Over Low Power and Lossy Networks IETF, RPL. Routing Over Low Power and Lossy Networks
8.
Zurück zum Zitat Kasinathan, P., Pastrone, C., Spirito, M.A., Vinkovits, M.: Denial-of-Service detection in 6LoWPAN based Internet of Things. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 600–607. IEEE, Oct 2013 Kasinathan, P., Pastrone, C., Spirito, M.A., Vinkovits, M.: Denial-of-Service detection in 6LoWPAN based Internet of Things. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 600–607. IEEE, Oct 2013
9.
Zurück zum Zitat Airehrour, D., Gutierrez, J., Ray, S.K.: Secure routing for internet of things: a survey. J. Netw. Comput. Appl. 66, 198–213 (2016)CrossRef Airehrour, D., Gutierrez, J., Ray, S.K.: Secure routing for internet of things: a survey. J. Netw. Comput. Appl. 66, 198–213 (2016)CrossRef
10.
Zurück zum Zitat Gaddour, O., Kouba, A.: RPL in a nutshell: a survey. Comput. Netw. 56(14), 3163–3178 (2012)CrossRef Gaddour, O., Kouba, A.: RPL in a nutshell: a survey. Comput. Netw. 56(14), 3163–3178 (2012)CrossRef
11.
Zurück zum Zitat Jose, E., Gireesh, K.T.: Gigabit network intrusion detection system using extended bloom filter in reconfigurable hardware: In: Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, vol. 1, pp. 11–19 (2016) Jose, E., Gireesh, K.T.: Gigabit network intrusion detection system using extended bloom filter in reconfigurable hardware: In: Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, vol. 1, pp. 11–19 (2016)
Metadaten
Titel
Neighbor Attack Detection in Internet of Things
verfasst von
Arun Thomas
T. Gireesh Kumar
Ashok Kumar Mohan
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8237-5_18

Neuer Inhalt