当前位置: X-MOL 学术J. Supercomput. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case
The Journal of Supercomputing ( IF 3.3 ) Pub Date : 2021-05-03 , DOI: 10.1007/s11227-021-03816-2
A. O. Bang , Udai Pratap Rao

Internet of things (IoT) is renowned for being a massive revolution led by business leaders and researchers. Routing protocol for low-power and lossy network (RPL) is a standardized protocol that serves the routing need of the IPv6-based low-power and lossy networks, which are the significant enablers of the IoT technology. Despite its many outstanding features, RPL offers very low protection against different routing attacks. In this respect, we mainly emphasize on the sybil attack. Specifically, we focus on three different types of sybil attack on a realistic smart home network topology. Considering the involvement of resource-constraint devices, we propose and evaluate a novel decentralized countermeasure against these attacks. The proposed countermeasure is based on a hybrid approach that involves the use of the geographical location of the nodes and a trust value-based parent selection procedure. Along with this, we use specially configured monitoring nodes that are responsible for the detection of the malicious attacker node(s). Further, we use RPL’s multi-instance property to integrate the proposed decentralized architecture into the exiting RPL protocol. We implement the proposed countermeasure in Cooja, the Contiki operating system-based network simulator. The results obtained through our experiments validate the practicality of the proposed countermeasure.



中文翻译:

基于RPL的IoT网络中针对sybil攻击的新型去中心化安全架构:关注智能家居使用案例

物联网(IoT)以商业领袖和研究人员领导的一场大规模革命而闻名。低功耗有损网络(RPL)的路由协议是一种标准化协议,可满足IoT技术的重要推动者,基于IPv6的低功耗有损网络的路由需求。尽管RPL具有许多出色的功能,但它们针对不同的路由攻击提供的防护非常低。在这方面,我们主要强调sybil攻击。具体来说,我们将重点放在现实智能家庭网络拓扑上的三种不同类型的sybil攻击上。考虑到资源受限设备的参与,我们提出并评估了针对这些攻击的新型分散式对策。提出的对策基于一种混合方法,该方法涉及使用节点的地理位置和基于信任值的父级选择过程。与此同时,我们使用专门配置的监视节点,这些节点负责检测恶意攻击者节点。此外,我们使用RPL的多实例属性将拟议的分散式架构集成到现有的RPL协议中。我们在基于Contiki操作系统的网络模拟器Cooja中实施了建议的对策。通过我们的实验获得的结果验证了所提出对策的实用性。我们使用RPL的多实例属性将拟议的分散式架构集成到现有的RPL协议中。我们在基于Contiki操作系统的网络模拟器Cooja中实施了建议的对策。通过我们的实验获得的结果验证了所提出对策的实用性。我们使用RPL的多实例属性将拟议的分散式架构集成到现有的RPL协议中。我们在基于Contiki操作系统的网络模拟器Cooja中实施了建议的对策。通过我们的实验获得的结果验证了所提出对策的实用性。

更新日期:2021-05-03
down
wechat
bug