A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks

This research addresses blackhole and selective forwarding routing attacks, which are fundamental security attacks on the routing of data in IoT networks. Most IoT devices today, from medical devices to connected vehicles and even smart buildings, have the capability of communicating wirelessly with one another. Although, consumers are progressively embracing the concept of connected devices, recent studies indicate that security is not high on the priority list of manufacturers, especially in the way these IoT devices route and communicate data amongst themselves. Thus, it leaves the door wide open to attacks and compromises. In this study, a trust-based routing Protocol for Low-Power and Lossy Networks, addressing blackhole and selective forwarding attacks is proposed. We show that our proposed protocol is not only secure from blackhole and selective forwarding attacks, but also does not impose undue overheads on network traffic.

[1]  Ashok Kumar Turuk,et al.  A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).

[2]  Levente Buttyán,et al.  VeRA - Version Number and Rank Authentication in RPL , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[3]  Syed Obaid Amin,et al.  A novel coding scheme to implement signature based IDS in IP based Sensor Networks , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management-Workshops.

[4]  Yuanming Wu,et al.  Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN , 2014 .

[5]  Sayan Kumar Ray,et al.  Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..

[6]  Maurizio A. Spirito,et al.  Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[7]  David Chinn,et al.  Risk and responsibility in a hyperconnected world: implications for enterprises , 2014 .

[8]  Philip Levis,et al.  The Minimum Rank with Hysteresis Objective Function , 2012, RFC.

[9]  Xiaohui Liang,et al.  Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.

[10]  More than 50 billion connected devices , 2011 .

[11]  Avijit Mathur,et al.  Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT , 2016, Sensors.

[12]  Jonathan Loo,et al.  6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..

[13]  Kevin Weekly,et al.  Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).