Loading…
Enhancing RPL Resilience Against Routing Layer Insider Attacks
To gather and transmit data, low cost wireless devices are often deployed in open, unattended and possibly hostile environment, making them particularly vulnerable to physical attacks. Resilience is needed to mitigate such inherent vulnerabilities and risks related to security and reliability. In th...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 807 |
container_issue | |
container_start_page | 802 |
container_title | |
container_volume | |
creator | Heurtefeux, Karel Erdene-Ochir, Ochirkhand Mohsin, Nasreen Menouar, Hamid |
description | To gather and transmit data, low cost wireless devices are often deployed in open, unattended and possibly hostile environment, making them particularly vulnerable to physical attacks. Resilience is needed to mitigate such inherent vulnerabilities and risks related to security and reliability. In this paper, Routing Protocol for Low-Power and Lossy Networks (RPL) is studied in presence of packet dropping malicious compromised nodes. Random behavior and data replication have been introduced to RPL to enhance its resilience against such insider attacks. The classical RPL and its resilient variants have been analyzed through Cooja simulations and hardware emulation. Resilient techniques introduced to RPL have enhanced significantly the resilience against attacks providing route diversification to exploit the redundant topology created by wireless communications. In particular, the proposed resilient RPL exhibits better performance in terms of delivery ratio (up to 40%), fairness and connectivity while staying energy efficient. |
doi_str_mv | 10.1109/AINA.2015.271 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>proquest_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_7098056</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7098056</ieee_id><sourcerecordid>1685830303</sourcerecordid><originalsourceid>FETCH-LOGICAL-i208t-5d5f48330284c6415f01eca405565a605cd86b907b6efa5d5024d928e1a816753</originalsourceid><addsrcrecordid>eNotjjtPwzAUhQ0CibYwMrFkZEm5flw_FqSoKlApAlSB1C1yHacYUrfE6dB_TxDoDN9wPh0dQq4pTCkFc1csnospA4pTpugJGVOhjFEGxOqUjBjnLEeJ-oyMKCLkQuDqgoxT-gTgUigckft5_LDRhbjJlq9ltvQptMFH57NiY0NMfbbcHfrfurRH32WLmEI9sOh7677SJTlvbJv81T8n5P1h_jZ7ysuXx8WsKPPAQPc51tgIzTkwLZwUFBug3lkBONyzEtDVWq4NqLX0jR1sYKI2THtqNZUK-YTc_u3uu933wae-2obkfNva6HeHVFGpUXMYMqg3f2rw3lf7Lmxtd6wUGA0o-Q-LElV5</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>1685830303</pqid></control><display><type>conference_proceeding</type><title>Enhancing RPL Resilience Against Routing Layer Insider Attacks</title><source>IEEE Xplore All Conference Series</source><creator>Heurtefeux, Karel ; Erdene-Ochir, Ochirkhand ; Mohsin, Nasreen ; Menouar, Hamid</creator><creatorcontrib>Heurtefeux, Karel ; Erdene-Ochir, Ochirkhand ; Mohsin, Nasreen ; Menouar, Hamid</creatorcontrib><description>To gather and transmit data, low cost wireless devices are often deployed in open, unattended and possibly hostile environment, making them particularly vulnerable to physical attacks. Resilience is needed to mitigate such inherent vulnerabilities and risks related to security and reliability. In this paper, Routing Protocol for Low-Power and Lossy Networks (RPL) is studied in presence of packet dropping malicious compromised nodes. Random behavior and data replication have been introduced to RPL to enhance its resilience against such insider attacks. The classical RPL and its resilient variants have been analyzed through Cooja simulations and hardware emulation. Resilient techniques introduced to RPL have enhanced significantly the resilience against attacks providing route diversification to exploit the redundant topology created by wireless communications. In particular, the proposed resilient RPL exhibits better performance in terms of delivery ratio (up to 40%), fairness and connectivity while staying energy efficient.</description><identifier>ISSN: 1550-445X</identifier><identifier>EISSN: 2332-5658</identifier><identifier>EISBN: 147997904X</identifier><identifier>EISBN: 1479979058</identifier><identifier>EISBN: 9781479979059</identifier><identifier>EISBN: 9781479979042</identifier><identifier>DOI: 10.1109/AINA.2015.271</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer information security ; Computer networks ; Conferences ; Energy consumption ; Hardware ; Resilience ; Routing ; Routing (telecommunications) ; Routing protocols ; RPL ; Security ; Simulation ; Wireless communication ; Wireless Network ; Wireless sensor networks</subject><ispartof>2015 IEEE 29th International Conference on Advanced Information Networking and Applications, 2015, p.802-807</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7098056$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,314,780,784,789,790,23930,23931,25140,27924,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7098056$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Heurtefeux, Karel</creatorcontrib><creatorcontrib>Erdene-Ochir, Ochirkhand</creatorcontrib><creatorcontrib>Mohsin, Nasreen</creatorcontrib><creatorcontrib>Menouar, Hamid</creatorcontrib><title>Enhancing RPL Resilience Against Routing Layer Insider Attacks</title><title>2015 IEEE 29th International Conference on Advanced Information Networking and Applications</title><addtitle>AINA</addtitle><description>To gather and transmit data, low cost wireless devices are often deployed in open, unattended and possibly hostile environment, making them particularly vulnerable to physical attacks. Resilience is needed to mitigate such inherent vulnerabilities and risks related to security and reliability. In this paper, Routing Protocol for Low-Power and Lossy Networks (RPL) is studied in presence of packet dropping malicious compromised nodes. Random behavior and data replication have been introduced to RPL to enhance its resilience against such insider attacks. The classical RPL and its resilient variants have been analyzed through Cooja simulations and hardware emulation. Resilient techniques introduced to RPL have enhanced significantly the resilience against attacks providing route diversification to exploit the redundant topology created by wireless communications. In particular, the proposed resilient RPL exhibits better performance in terms of delivery ratio (up to 40%), fairness and connectivity while staying energy efficient.</description><subject>Computer information security</subject><subject>Computer networks</subject><subject>Conferences</subject><subject>Energy consumption</subject><subject>Hardware</subject><subject>Resilience</subject><subject>Routing</subject><subject>Routing (telecommunications)</subject><subject>Routing protocols</subject><subject>RPL</subject><subject>Security</subject><subject>Simulation</subject><subject>Wireless communication</subject><subject>Wireless Network</subject><subject>Wireless sensor networks</subject><issn>1550-445X</issn><issn>2332-5658</issn><isbn>147997904X</isbn><isbn>1479979058</isbn><isbn>9781479979059</isbn><isbn>9781479979042</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2015</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjjtPwzAUhQ0CibYwMrFkZEm5flw_FqSoKlApAlSB1C1yHacYUrfE6dB_TxDoDN9wPh0dQq4pTCkFc1csnospA4pTpugJGVOhjFEGxOqUjBjnLEeJ-oyMKCLkQuDqgoxT-gTgUigckft5_LDRhbjJlq9ltvQptMFH57NiY0NMfbbcHfrfurRH32WLmEI9sOh7677SJTlvbJv81T8n5P1h_jZ7ysuXx8WsKPPAQPc51tgIzTkwLZwUFBug3lkBONyzEtDVWq4NqLX0jR1sYKI2THtqNZUK-YTc_u3uu933wae-2obkfNva6HeHVFGpUXMYMqg3f2rw3lf7Lmxtd6wUGA0o-Q-LElV5</recordid><startdate>20150301</startdate><enddate>20150301</enddate><creator>Heurtefeux, Karel</creator><creator>Erdene-Ochir, Ochirkhand</creator><creator>Mohsin, Nasreen</creator><creator>Menouar, Hamid</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20150301</creationdate><title>Enhancing RPL Resilience Against Routing Layer Insider Attacks</title><author>Heurtefeux, Karel ; Erdene-Ochir, Ochirkhand ; Mohsin, Nasreen ; Menouar, Hamid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i208t-5d5f48330284c6415f01eca405565a605cd86b907b6efa5d5024d928e1a816753</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Computer information security</topic><topic>Computer networks</topic><topic>Conferences</topic><topic>Energy consumption</topic><topic>Hardware</topic><topic>Resilience</topic><topic>Routing</topic><topic>Routing (telecommunications)</topic><topic>Routing protocols</topic><topic>RPL</topic><topic>Security</topic><topic>Simulation</topic><topic>Wireless communication</topic><topic>Wireless Network</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Heurtefeux, Karel</creatorcontrib><creatorcontrib>Erdene-Ochir, Ochirkhand</creatorcontrib><creatorcontrib>Mohsin, Nasreen</creatorcontrib><creatorcontrib>Menouar, Hamid</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library Online</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Heurtefeux, Karel</au><au>Erdene-Ochir, Ochirkhand</au><au>Mohsin, Nasreen</au><au>Menouar, Hamid</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Enhancing RPL Resilience Against Routing Layer Insider Attacks</atitle><btitle>2015 IEEE 29th International Conference on Advanced Information Networking and Applications</btitle><stitle>AINA</stitle><date>2015-03-01</date><risdate>2015</risdate><spage>802</spage><epage>807</epage><pages>802-807</pages><issn>1550-445X</issn><eissn>2332-5658</eissn><eisbn>147997904X</eisbn><eisbn>1479979058</eisbn><eisbn>9781479979059</eisbn><eisbn>9781479979042</eisbn><coden>IEEPAD</coden><abstract>To gather and transmit data, low cost wireless devices are often deployed in open, unattended and possibly hostile environment, making them particularly vulnerable to physical attacks. Resilience is needed to mitigate such inherent vulnerabilities and risks related to security and reliability. In this paper, Routing Protocol for Low-Power and Lossy Networks (RPL) is studied in presence of packet dropping malicious compromised nodes. Random behavior and data replication have been introduced to RPL to enhance its resilience against such insider attacks. The classical RPL and its resilient variants have been analyzed through Cooja simulations and hardware emulation. Resilient techniques introduced to RPL have enhanced significantly the resilience against attacks providing route diversification to exploit the redundant topology created by wireless communications. In particular, the proposed resilient RPL exhibits better performance in terms of delivery ratio (up to 40%), fairness and connectivity while staying energy efficient.</abstract><pub>IEEE</pub><doi>10.1109/AINA.2015.271</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1550-445X |
ispartof | 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, 2015, p.802-807 |
issn | 1550-445X 2332-5658 |
language | eng |
recordid | cdi_ieee_primary_7098056 |
source | IEEE Xplore All Conference Series |
subjects | Computer information security Computer networks Conferences Energy consumption Hardware Resilience Routing Routing (telecommunications) Routing protocols RPL Security Simulation Wireless communication Wireless Network Wireless sensor networks |
title | Enhancing RPL Resilience Against Routing Layer Insider Attacks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T08%3A19%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Enhancing%20RPL%20Resilience%20Against%20Routing%20Layer%20Insider%20Attacks&rft.btitle=2015%20IEEE%2029th%20International%20Conference%20on%20Advanced%20Information%20Networking%20and%20Applications&rft.au=Heurtefeux,%20Karel&rft.date=2015-03-01&rft.spage=802&rft.epage=807&rft.pages=802-807&rft.issn=1550-445X&rft.eissn=2332-5658&rft.coden=IEEPAD&rft_id=info:doi/10.1109/AINA.2015.271&rft.eisbn=147997904X&rft.eisbn_list=1479979058&rft.eisbn_list=9781479979059&rft.eisbn_list=9781479979042&rft_dat=%3Cproquest_CHZPO%3E1685830303%3C/proquest_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i208t-5d5f48330284c6415f01eca405565a605cd86b907b6efa5d5024d928e1a816753%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1685830303&rft_id=info:pmid/&rft_ieee_id=7098056&rfr_iscdi=true |