A Trust Based Mechanism to Combat Blackhole Attack in RPL Protocol

This article deals with a prime security attack -blackhole attack in Internet of Things networks that uses the RPL in the network layer for routing of data packets. Latest studies indicate that the security has not been given a bigger priority among manufacturers thereby providing a window of opportunity for attacks to creep into a network. A trust-based mechanism is built over the RPL protocol specifically tackle the blackhole attacks. The Cooja simulator based on Contiki OS was used for experimental analysis and the proposed scheme yields better security when the participating nodes were exposed to the blackhole attack.

[1]  Gabi Dreo Rodosek,et al.  Towards a trust computing architecture for RPL in Cyber Physical Systems , 2013, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013).

[2]  Dominique Barthel,et al.  Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks , 2012, RFC.

[3]  N. Bhalaji,et al.  Performance analysis of IoT protocol under different mobility models , 2018, Comput. Electr. Eng..

[4]  N. Bhalaji,et al.  Trust Based Strategy to Resist Collaborative Blackhole Attack in Manet , 2010, BAIP.

[5]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[6]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[7]  Ivana Tomić,et al.  A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.

[8]  Hazrat Ali A Performance Evaluation of RPL in Contiki , 2012 .

[9]  Kevin Weekly,et al.  Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).