Visible to the public Intrusion Detection System Based RPL Attack Detection Techniques and Countermeasures in IoT: A Comparison

TitleIntrusion Detection System Based RPL Attack Detection Techniques and Countermeasures in IoT: A Comparison
Publication TypeConference Paper
Year of Publication2019
AuthorsNandhini, P.S., Mehtre, B.M.
Conference Name2019 International Conference on Communication and Electronics Systems (ICCES)
Date Publishedjul
PublisherIEEE
ISBN Number978-1-7281-1261-9
Keywordsattacks, Blackhole, Blackhole attack, computer network security, Conferences, countermeasures, IDS, IDS research contribution techniques, Internet of Things, Intrusion detection, intrusion detection system, IoT, knowledge driven approach, lightweight routing protocol stack, LLN, low power lossy networks, pubcrawl, rank attack, resilience, Resiliency, Routing, Routing protocols, RPL, RPL attack detection techniques, RPL based loT, RPL based routing attacks, Scalability, security, security of data, source routing protocol, Topology, version attack, Wormhole, wormhole attack
Abstract

Routing Protocol for Low power and Lossy Network (RPL) is a light weight routing protocol designed for LLN (Low Power Lossy Networks). It is a source routing protocol. Due to constrained nature of resources in LLN, RPL is exposed to various attacks such as blackhole attack, wormhole attack, rank attack, version attack, etc. IDS (Intrusion Detection System) is one of the countermeasures for detection and prevention of attacks for RPL based loT. Traditional IDS techniques are not suitable for LLN due to certain characteristics like different protocol stack, standards and constrained resources. In this paper, we have presented various IDS research contribution for RPL based routing attacks. We have also classified the proposed IDS in the literature, according to the detection techniques. Therefore, this comparison will be an eye-opening stuff for future research in mitigating routing attacks for RPL based IoT.

URLhttps://ieeexplore.ieee.org/document/9002088
DOI10.1109/ICCES45898.2019.9002088
Citation Keynandhini_intrusion_2019