A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks

Loading...
Thumbnail Image

Supplementary material

Other Title

Authors

Airehrour, David
Ray, J.
Ray, S. K.

Author ORCID Profiles (clickable)

Degree

Grantor

Date

2017-03-26

Supervisors

Type

Journal Article

Ngā Upoko Tukutuku (Māori subject headings)

Keyword

Internet of Things (IoT)
IoT
routing protocol for low-power and lossy networks (RPL)
RPL
blackhole attacks
selective forwarding attacks

ANZSRC Field of Research Code (2020)

Citation

Airehrour, D., Ray, J., & Ray, S. K. (2017). A Trust-Aware RPL Routing Protocol to Detect Blackhole and Selective Forwarding Attacks. Australian Journal of Telecommunications and the Digital Economy, 5(1), 50-69. doi:10.18080/ajtde.v5n1.88

Abstract

This research addresses blackhole and selective forwarding routing attacks, whichare fundamental security attacks on the routing of data in IoT networks. Most IoT devices today,from medical devices to connected vehicles and even smart buildings, have the capability ofcommunicating wirelessly with one another. Although, consumers are progressively embracingthe concept of connected devices, recent studies indicate that security is not high on the prioritylist of manufacturers, especially in the way these IoT devices route and communicate dataamongst themselves. Thus, it leaves the door wide open to attacks and compromises. In thisstudy, a trust-based routing Protocol for Low-Power and Lossy Networks, addressing blackholeand selective forwarding attacks is proposed. We show that our proposed protocol is not onlysecure from blackhole and selective forwarding attacks, but also does not impose undueoverheads on network traffic.

Publisher

RMIT University, Melbourne, Victoria, Australia

Link to ePress publication

DOI

doi:10.18080/ajtde.v5n1.88

Copyright holder

Copyright Telecommunications Association Inc.

Copyright notice

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Copyright license

Available online at

This item appears in: