A Novel Method for Secure RPL for Resource Based attacks in Internet of Things

  • et al.
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Routing protocol for low power lossy networks (RPL) was evolved by IETF by considering various conditions of constrained networks. This protocol was aimed in order to encourage several routing topologies known DODAGs which were built under different objective functions to improve the routing using different routing measures. There were billions of devices which were connected all over the world because of which the security is the major concern of routing in IoT devices, where different attacks takes place during the routing. Variety of attacks happens while routing, some on network topology others on network traffic and some other attacks on network resources. This paper studies about resource based attacks which targets at consuming the energy of node, memory, processing power by making malicious nodes to perform unnecessary processing actions and these attacks also effect the network availability and reduce the lifetime of the topology. This paper introduces an allied nodes follow up technique where some allied nodes are staked in the DODAG topology in order to detect the resource based attacks in RPL like version number, neighbour, worst parent, rank attacks. These allied nodes follow up and monitors each and every node and based on proposed constraints not only detects these resource attacks in RPL and also updates the information to the root node about malicious node in order to eradicate it from DODAG. The performance of proposed model was compared with previous attack detection models regarding to the measures like packet delivery ratio, end to end delay and throughput.

Cite

CITATION STYLE

APA

Chaitanya*, P. S., Devi, Dr. B. R., & Kumar, K. S. (2019). A Novel Method for Secure RPL for Resource Based attacks in Internet of Things. International Journal of Innovative Technology and Exploring Engineering, 9(2), 4984–4988. https://doi.org/10.35940/ijitee.b9074.129219

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free