2020
DOI: 10.20944/preprints202007.0476.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Detection and Mitigation of RPL Rank and Version Number Attacks in Smart Internet of Things

Abstract: The rapid growth of the smart Internet of Things (IoT) and massive propagation of wireless technologies revealed the recent opportunities for development in various domains of real life such as smart cities and E-Health applications. A slight defense against different forms of attacks is offered for the current secure and lightweight Routing Protocol for Low Power and Lossy Networks (RPL) of IoT resource-constrained devices. Data packets are highly likely to be exposed while transmitting them during data packe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 31 publications
0
6
0
Order By: Relevance
“…Therefore, it would make sense if the device manufacturing companies put in measures like closing ports that would normally not be used by end-users and setting up non-trivial credentials. We also studied a prevention mechanism in which unused ports are closed and default login credentials are changed to thwart brute-force DoS attacks (Almusaylim et al, 2020;Kumar et al, 2015) which are currently the most happening. These attacks can also be stopped if standards are maintained across devices and companies manufacturing them.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, it would make sense if the device manufacturing companies put in measures like closing ports that would normally not be used by end-users and setting up non-trivial credentials. We also studied a prevention mechanism in which unused ports are closed and default login credentials are changed to thwart brute-force DoS attacks (Almusaylim et al, 2020;Kumar et al, 2015) which are currently the most happening. These attacks can also be stopped if standards are maintained across devices and companies manufacturing them.…”
Section: Related Workmentioning
confidence: 99%
“…With its modified RPL file, the malicious node increases the version number before forwarding received DIO messages ( Figure 6 ), thus triggering unnecessary global repairs. This increases overhead control and packet loss [ 53 ].…”
Section: Anomaly Detection Scenariosmentioning
confidence: 99%
“…The extensive use of the IoT concept has contributed to the presence of RPL, which enables smart devices to interact or communicate in the surrounding ambient at anytime and anywhere. Recently, many studies have been conducted on the various aspect of RPL optimization, such as congestion control [23], data aggregation [24], security and mobility [25,26], and OF design [27]. While RPL significantly satisfies the requirements of LLN for IoT based applications, to be fit in the IIoT concept, some aspects are crucial, such as energy efficiency and reliable routing.…”
Section: Qos Provision In Resource-constrained Networkmentioning
confidence: 99%