E2V: Techniques for Detecting and Mitigating Rank Inconsistency Attack (RInA) in RPL based Internet of Things

19Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The Internet of Things (IoT) is a network of physical devices in which smart objects are interconnected that enable to collect and exchange the information via the internet. These devices are resource constrained and connected in the Low power and Lossy Networks (LLNs). Due to this nature, the RPL (IPv6 Routing Protocol for Low power and Lossy networks) is primarily designed for the resource constrained devices. But, this RPL undergoes various types of routing attacks. This paper considered the Rank Inconsistency Attack (RInA), which is illegitimately change the rank value and makes the network vulnerable. The proposed architecture E2V has three phases such as rank calculation, substantiation and malicious node elimination. The ultimate aim of E2V method is to detect and mitigate the RInA attack which includes sinkhole, selective forwarding and blackhole attacks. This system also identifies rank inconsistency based on the energy of each node. Hence, this approach enhances the secure routing in RPL based Internet of Things.

Cite

CITATION STYLE

APA

Stephen, R., & Arockiam, L. (2018). E2V: Techniques for Detecting and Mitigating Rank Inconsistency Attack (RInA) in RPL based Internet of Things. In Journal of Physics: Conference Series (Vol. 1142). Institute of Physics Publishing. https://doi.org/10.1088/1742-6596/1142/1/012009

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free