Intrusion Detection System Based RPL Attack Detection Techniques and Countermeasures in IoT: A Comparison
Title | Intrusion Detection System Based RPL Attack Detection Techniques and Countermeasures in IoT: A Comparison |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Nandhini, P.S., Mehtre, B.M. |
Conference Name | 2019 International Conference on Communication and Electronics Systems (ICCES) |
Date Published | jul |
Publisher | IEEE |
ISBN Number | 978-1-7281-1261-9 |
Keywords | attacks, Blackhole, Blackhole attack, computer network security, Conferences, countermeasures, IDS, IDS research contribution techniques, Internet of Things, Intrusion detection, intrusion detection system, IoT, knowledge driven approach, lightweight routing protocol stack, LLN, low power lossy networks, pubcrawl, rank attack, resilience, Resiliency, Routing, Routing protocols, RPL, RPL attack detection techniques, RPL based loT, RPL based routing attacks, Scalability, security, security of data, source routing protocol, Topology, version attack, Wormhole, wormhole attack |
Abstract | Routing Protocol for Low power and Lossy Network (RPL) is a light weight routing protocol designed for LLN (Low Power Lossy Networks). It is a source routing protocol. Due to constrained nature of resources in LLN, RPL is exposed to various attacks such as blackhole attack, wormhole attack, rank attack, version attack, etc. IDS (Intrusion Detection System) is one of the countermeasures for detection and prevention of attacks for RPL based loT. Traditional IDS techniques are not suitable for LLN due to certain characteristics like different protocol stack, standards and constrained resources. In this paper, we have presented various IDS research contribution for RPL based routing attacks. We have also classified the proposed IDS in the literature, according to the detection techniques. Therefore, this comparison will be an eye-opening stuff for future research in mitigating routing attacks for RPL based IoT. |
URL | https://ieeexplore.ieee.org/document/9002088 |
DOI | 10.1109/ICCES45898.2019.9002088 |
Citation Key | nandhini_intrusion_2019 |
- Scalability
- resilience
- Resiliency
- Routing
- Routing protocols
- RPL
- RPL attack detection techniques
- RPL based loT
- RPL based routing attacks
- rank attack
- security
- security of data
- source routing protocol
- Topology
- version attack
- Wormhole
- wormhole attack
- Intrusion Detection
- Blackhole
- Blackhole attack
- computer network security
- Conferences
- countermeasures
- IDS
- IDS research contribution techniques
- Internet of Things
- attacks
- intrusion detection system
- IoT
- knowledge driven approach
- lightweight routing protocol stack
- LLN
- low power lossy networks
- pubcrawl