Authors:
Firoz Ahmed
and
Young-Bae Ko
Affiliation:
Ajou University, Korea, Republic of
Keyword(s):
RPL, DODAG Version Number Attack, Security, Distributed, Cooperative.
Related
Ontology
Subjects/Areas/Topics:
Computer-Supported Education
;
Embedded Communications Systems
;
Information Technologies Supporting Learning
;
Mobile and Pervasive Computing
;
Networking and Connectivity
;
Pervasive Embedded Networks
;
Security and Privacy
;
Telecommunications
;
Ubiquitous Computing Systems and Services
Abstract:
To design a routing protocol for Low-power and Lossy Networks (LLNs), the IETF developed RPL (Routing Protocol for Low-power and lossy network) which is novel, standard and light weight routing protocol standardized for constrained environment and does not have the functionality like of traditional routing protocols. Providing security in RPL is still challenging as the devices are connected to the vulnerable Internet, limited resources, and the communication links are lossy. Therefore, an attacker can easily exploit the functionalities of RPL protocol. RPL exposed to a variety of attacks. One of the most inconsistency topological attacks is DODAG version number attack. In this paper, we proposed a distributed and cooperative verification mechanism to securely defend against the DODAG version number attack with low control overhead and high reliability. Simulation results show that the proposed approach defends DODAG version number attack reliably and reduces control overhead signifi
cantly.
(More)