Title | Intrusion Detection in the RPL-connected 6LoWPAN Networks |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Shreenivas, Dharmini, Raza, Shahid, Voigt, Thiemo |
Conference Name | Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4969-7 |
Keywords | 6LoWPAN, Collaboration, composability, cyber security, ETX, IDS, Internet of Things, Intrusion detection, IPv6, ipv6 security, Metrics, pubcrawl, Resiliency, RPL |
Abstract | The interconnectivity of 6LoWPAN networks with the Internet raises serious security concerns, as constrained 6LoWPAN devices are accessible anywhere from the untrusted global Internet. Also, 6LoWPAN devices are mostly deployed in unattended environments, hence easy to capture and clone. Despite that state of the art crypto solutions provide information security, IPv6 enabled smart objects are vulnerable to attacks from outside and inside 6LoWPAN networks that are aimed to disrupt networks. This paper attempts to identify intrusions aimed to disrupt the Routing Protocol for Low-Power and Lossy Networks (RPL).In order to improve the security within 6LoWPAN networks, we extend SVELTE, an intrusion detection system for the Internet of Things, with an intrusion detection module that uses the ETX (Expected Transmissions) metric. In RPL, ETX is a link reliability metric and monitoring the ETX value can prevent an intruder from actively engaging 6LoWPAN nodes in malicious activities. We also propose geographic hints to identify malicious nodes that conduct attacks against ETX-based networks. We implement these extensions in the Contiki OS and evaluate them using the Cooja simulator. |
URL | http://doi.acm.org/10.1145/3055245.3055252 |
DOI | 10.1145/3055245.3055252 |
Citation Key | shreenivas_intrusion_2017 |