• Login
    View Item 
    •   Research Bank Home
    • Unitec Institute of Technology
    • Study Areas
    • Computing
    • Computing Journal Articles
    • View Item
    •   Research Bank Home
    • Unitec Institute of Technology
    • Study Areas
    • Computing
    • Computing Journal Articles
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks

    Airehrour, David; Ray, J.; Ray, S. K.

    Thumbnail
    Share
    View fulltext online
    A_Trust_Aware_RPL_Routing_Protocol.pdf (1.122Mb)
    Date
    2017-03-26
    Citation:
    Airehrour, D., Ray, J., & Ray, S. K. (2017). A Trust-Aware RPL Routing Protocol to Detect Blackhole and Selective Forwarding Attacks. Australian Journal of Telecommunications and the Digital Economy, 5(1), 50-69. doi:10.18080/ajtde.v5n1.88
    Permanent link to Research Bank record:
    https://hdl.handle.net/10652/4391
    Abstract
    This research addresses blackhole and selective forwarding routing attacks, whichare fundamental security attacks on the routing of data in IoT networks. Most IoT devices today,from medical devices to connected vehicles and even smart buildings, have the capability ofcommunicating wirelessly with one another. Although, consumers are progressively embracingthe concept of connected devices, recent studies indicate that security is not high on the prioritylist of manufacturers, especially in the way these IoT devices route and communicate dataamongst themselves. Thus, it leaves the door wide open to attacks and compromises. In thisstudy, a trust-based routing Protocol for Low-Power and Lossy Networks, addressing blackholeand selective forwarding attacks is proposed. We show that our proposed protocol is not onlysecure from blackhole and selective forwarding attacks, but also does not impose undueoverheads on network traffic.
    Keywords:
    Internet of Things (IoT), IoT, routing protocol for low-power and lossy networks (RPL), RPL, blackhole attacks, selective forwarding attacks
    ANZSRC Field of Research:
    080303 Computer System Security
    Copyright Holder:
    Copyright Telecommunications Association Inc.

    Copyright Notice:
    This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
    Rights:
    This digital work is protected by copyright. It may be consulted by you, provided you comply with the provisions of the Act and the following conditions of use. These documents or images may be used for research or private study purposes. Whether they can be used for any other purpose depends upon the Copyright Notice above. You will recognise the author's and publishers rights and give due acknowledgement where appropriate.
    Metadata
    Show detailed record
    This item appears in
    • Computing Journal Articles [51]

    Te Pūkenga

    Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

    • About Te Pūkenga
    • Privacy Notice

    Copyright ©2022 Te Pūkenga

    Usage

    Downloads, last 12 months
    90
     
     

    Usage Statistics

    For this itemFor the Research Bank

    Share

    About

    About Research BankContact us

    Help for authors  

    How to add research

    Register for updates  

    LoginRegister

    Browse Research Bank  

    EverywhereInstitutionsStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaboratorThis CollectionStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaborator

    Te Pūkenga

    Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

    • About Te Pūkenga
    • Privacy Notice

    Copyright ©2022 Te Pūkenga