Visible to the public A Detailed Review of the IoT with Detection of Sinkhole Attacks in RPL based network

TitleA Detailed Review of the IoT with Detection of Sinkhole Attacks in RPL based network
Publication TypeConference Paper
Year of Publication2022
AuthorsRani, Jyoti, Dhingra, Akshaya, Sindhu, Vikas
Conference Name2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)
Date PublishedMarch
Keywords6LoWPAN, composability, hospitals, Industries, internetworking, IoT, LLNs, Network topology, pubcrawl, resilience, Resiliency, Routing, Routing protocols, RPL, Software algorithms, WSN
Abstract

The "Internet of Things" (IoT) is internetworking of physical devices known as 'things', algorithms, equipment and techniques that allow communication with another device, equipment and software over the network. And with the advancement in data communication, every device must be connected via the Internet. For this purpose, we use resource-constrained sensor nodes for collecting data from homes, offices, hospitals, industries and data centers. But various vulnerabilities may ruin the functioning of the sensor nodes. Routing Protocol for Low Power and Lossy Networks (RPL) is a standardized, secure routing protocol designed for the 6LoWPAN IoT network. It's a proactive routing protocol that works on the destination-oriented topology to perform safe routing. The Sinkhole is a networking attack that destroys the topology of the RPL protocol as the attacker node changes the route of all the traffic in the IoT network. In this paper, we have given a survey of Sinkhole attacks in IoT and proposed different methods for preventing and detecting these attacks in a low-power-based IoT network.

DOI10.1109/IC3IOT53935.2022.9768015
Citation Key9768015