2016
DOI: 10.3390/info7020025
|View full text |Cite
|
Sign up to set email alerts
|

A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology

Abstract: Routing Protocol for Low power and Lossy network (RPL) topology attacks can downgrade the network performance significantly by disrupting the optimal protocol structure. To detect such threats, we propose a RPL-specification, obtained by a semi-auto profiling technique that constructs a high-level abstract of operations through network simulation traces, to use as reference for verifying the node behaviors. This specification, including all the legitimate protocol states and transitions with corresponding stat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
85
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 161 publications
(98 citation statements)
references
References 11 publications
0
85
0
Order By: Relevance
“…A malicious node can apply the neighbor attack by retransmitting the routing control messages it hears [27]. This behavior causes neighbor nodes to think that the source of the control message is close to them and take actions accordingly.…”
Section: D/dos Attacks To the Network Layermentioning
confidence: 99%
See 4 more Smart Citations
“…A malicious node can apply the neighbor attack by retransmitting the routing control messages it hears [27]. This behavior causes neighbor nodes to think that the source of the control message is close to them and take actions accordingly.…”
Section: D/dos Attacks To the Network Layermentioning
confidence: 99%
“…Similar to the global repair, the local repair mechanism of RPL can be the target of a D/DoS attack called local repair [27,29]. Local repair is an alternative repair solution of RPL which aims to solve the local inconsistencies and issues and cost less than the global repair mechanism since it involves a smaller portion of the network.…”
Section: D/dos Attacks To the Network Layermentioning
confidence: 99%
See 3 more Smart Citations