Neighbor Attack Detection in Internet of Things

Internet of Things (IoT) hegemonies all other technological development the world has seen so far. 6LoWPAN is emerging as the next generation protocol of IoT. 6LoWPAN protocol enables the resource constrained embedded device to connect to the Internet through IPv6. Routing Protocol for Low Power and Lossy Networks (RPL) is specifically designed as a routing protocol for resource constrained device and it is adaptable with the 6LoWPAN. There are many attacks which make RPL insignificant to achieve its desired objectives. Neighbor attack is momentous and is capable of disrupting possible routing path. In this paper, we proposed intrusion detection system which can detect neighbor attack in RPL protocol and a secure root process to prevent the effect of attack on this protocol. The IDS is incorporated by considering location information and received signal strength to identify malicious node. We have also incorporated secure root process which can rectify disruption in routing path after detecting attacks. This method can act as an optimum method for resources constrained environment.

[1]  GaddourOlfa,et al.  Survey RPL in a nutshell , 2012 .

[2]  Maurizio A. Spirito,et al.  Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[3]  Mohammed Bouhorma,et al.  Denial-of-Service attacks on 6LoWPAN-RPL networks: Threats and an intrusion detection system proposition , 2014 .

[4]  Kevin Weekly,et al.  Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).

[5]  Sayan Kumar Ray,et al.  Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..

[6]  Pavan Pongle,et al.  A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[7]  Mohammed Bouhorma,et al.  Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions , 2014 .

[8]  Jonathan Loo,et al.  A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology , 2016, Inf..

[9]  Anis Koubaa,et al.  RPL in a nutshell: A survey , 2012, Comput. Networks.

[10]  Jonathan Loo,et al.  The impacts of internal threats towards Routing Protocol for Low power and lossy network performance , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).

[11]  T. Gireeshkumar,et al.  Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Reconfigurable Hardware , 2016 .

[12]  AirehrourDavid,et al.  Secure routing for internet of things , 2016 .