Loading…

Enhancing RPL Resilience Against Routing Layer Insider Attacks

To gather and transmit data, low cost wireless devices are often deployed in open, unattended and possibly hostile environment, making them particularly vulnerable to physical attacks. Resilience is needed to mitigate such inherent vulnerabilities and risks related to security and reliability. In th...

Full description

Saved in:
Bibliographic Details
Main Authors: Heurtefeux, Karel, Erdene-Ochir, Ochirkhand, Mohsin, Nasreen, Menouar, Hamid
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 807
container_issue
container_start_page 802
container_title
container_volume
creator Heurtefeux, Karel
Erdene-Ochir, Ochirkhand
Mohsin, Nasreen
Menouar, Hamid
description To gather and transmit data, low cost wireless devices are often deployed in open, unattended and possibly hostile environment, making them particularly vulnerable to physical attacks. Resilience is needed to mitigate such inherent vulnerabilities and risks related to security and reliability. In this paper, Routing Protocol for Low-Power and Lossy Networks (RPL) is studied in presence of packet dropping malicious compromised nodes. Random behavior and data replication have been introduced to RPL to enhance its resilience against such insider attacks. The classical RPL and its resilient variants have been analyzed through Cooja simulations and hardware emulation. Resilient techniques introduced to RPL have enhanced significantly the resilience against attacks providing route diversification to exploit the redundant topology created by wireless communications. In particular, the proposed resilient RPL exhibits better performance in terms of delivery ratio (up to 40%), fairness and connectivity while staying energy efficient.
doi_str_mv 10.1109/AINA.2015.271
format conference_proceeding
fullrecord <record><control><sourceid>proquest_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_7098056</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7098056</ieee_id><sourcerecordid>1685830303</sourcerecordid><originalsourceid>FETCH-LOGICAL-i208t-5d5f48330284c6415f01eca405565a605cd86b907b6efa5d5024d928e1a816753</originalsourceid><addsrcrecordid>eNotjjtPwzAUhQ0CibYwMrFkZEm5flw_FqSoKlApAlSB1C1yHacYUrfE6dB_TxDoDN9wPh0dQq4pTCkFc1csnospA4pTpugJGVOhjFEGxOqUjBjnLEeJ-oyMKCLkQuDqgoxT-gTgUigckft5_LDRhbjJlq9ltvQptMFH57NiY0NMfbbcHfrfurRH32WLmEI9sOh7677SJTlvbJv81T8n5P1h_jZ7ysuXx8WsKPPAQPc51tgIzTkwLZwUFBug3lkBONyzEtDVWq4NqLX0jR1sYKI2THtqNZUK-YTc_u3uu933wae-2obkfNva6HeHVFGpUXMYMqg3f2rw3lf7Lmxtd6wUGA0o-Q-LElV5</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>1685830303</pqid></control><display><type>conference_proceeding</type><title>Enhancing RPL Resilience Against Routing Layer Insider Attacks</title><source>IEEE Xplore All Conference Series</source><creator>Heurtefeux, Karel ; Erdene-Ochir, Ochirkhand ; Mohsin, Nasreen ; Menouar, Hamid</creator><creatorcontrib>Heurtefeux, Karel ; Erdene-Ochir, Ochirkhand ; Mohsin, Nasreen ; Menouar, Hamid</creatorcontrib><description>To gather and transmit data, low cost wireless devices are often deployed in open, unattended and possibly hostile environment, making them particularly vulnerable to physical attacks. Resilience is needed to mitigate such inherent vulnerabilities and risks related to security and reliability. In this paper, Routing Protocol for Low-Power and Lossy Networks (RPL) is studied in presence of packet dropping malicious compromised nodes. Random behavior and data replication have been introduced to RPL to enhance its resilience against such insider attacks. The classical RPL and its resilient variants have been analyzed through Cooja simulations and hardware emulation. Resilient techniques introduced to RPL have enhanced significantly the resilience against attacks providing route diversification to exploit the redundant topology created by wireless communications. In particular, the proposed resilient RPL exhibits better performance in terms of delivery ratio (up to 40%), fairness and connectivity while staying energy efficient.</description><identifier>ISSN: 1550-445X</identifier><identifier>EISSN: 2332-5658</identifier><identifier>EISBN: 147997904X</identifier><identifier>EISBN: 1479979058</identifier><identifier>EISBN: 9781479979059</identifier><identifier>EISBN: 9781479979042</identifier><identifier>DOI: 10.1109/AINA.2015.271</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer information security ; Computer networks ; Conferences ; Energy consumption ; Hardware ; Resilience ; Routing ; Routing (telecommunications) ; Routing protocols ; RPL ; Security ; Simulation ; Wireless communication ; Wireless Network ; Wireless sensor networks</subject><ispartof>2015 IEEE 29th International Conference on Advanced Information Networking and Applications, 2015, p.802-807</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7098056$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,314,780,784,789,790,23930,23931,25140,27924,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7098056$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Heurtefeux, Karel</creatorcontrib><creatorcontrib>Erdene-Ochir, Ochirkhand</creatorcontrib><creatorcontrib>Mohsin, Nasreen</creatorcontrib><creatorcontrib>Menouar, Hamid</creatorcontrib><title>Enhancing RPL Resilience Against Routing Layer Insider Attacks</title><title>2015 IEEE 29th International Conference on Advanced Information Networking and Applications</title><addtitle>AINA</addtitle><description>To gather and transmit data, low cost wireless devices are often deployed in open, unattended and possibly hostile environment, making them particularly vulnerable to physical attacks. Resilience is needed to mitigate such inherent vulnerabilities and risks related to security and reliability. In this paper, Routing Protocol for Low-Power and Lossy Networks (RPL) is studied in presence of packet dropping malicious compromised nodes. Random behavior and data replication have been introduced to RPL to enhance its resilience against such insider attacks. The classical RPL and its resilient variants have been analyzed through Cooja simulations and hardware emulation. Resilient techniques introduced to RPL have enhanced significantly the resilience against attacks providing route diversification to exploit the redundant topology created by wireless communications. In particular, the proposed resilient RPL exhibits better performance in terms of delivery ratio (up to 40%), fairness and connectivity while staying energy efficient.</description><subject>Computer information security</subject><subject>Computer networks</subject><subject>Conferences</subject><subject>Energy consumption</subject><subject>Hardware</subject><subject>Resilience</subject><subject>Routing</subject><subject>Routing (telecommunications)</subject><subject>Routing protocols</subject><subject>RPL</subject><subject>Security</subject><subject>Simulation</subject><subject>Wireless communication</subject><subject>Wireless Network</subject><subject>Wireless sensor networks</subject><issn>1550-445X</issn><issn>2332-5658</issn><isbn>147997904X</isbn><isbn>1479979058</isbn><isbn>9781479979059</isbn><isbn>9781479979042</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2015</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjjtPwzAUhQ0CibYwMrFkZEm5flw_FqSoKlApAlSB1C1yHacYUrfE6dB_TxDoDN9wPh0dQq4pTCkFc1csnospA4pTpugJGVOhjFEGxOqUjBjnLEeJ-oyMKCLkQuDqgoxT-gTgUigckft5_LDRhbjJlq9ltvQptMFH57NiY0NMfbbcHfrfurRH32WLmEI9sOh7677SJTlvbJv81T8n5P1h_jZ7ysuXx8WsKPPAQPc51tgIzTkwLZwUFBug3lkBONyzEtDVWq4NqLX0jR1sYKI2THtqNZUK-YTc_u3uu933wae-2obkfNva6HeHVFGpUXMYMqg3f2rw3lf7Lmxtd6wUGA0o-Q-LElV5</recordid><startdate>20150301</startdate><enddate>20150301</enddate><creator>Heurtefeux, Karel</creator><creator>Erdene-Ochir, Ochirkhand</creator><creator>Mohsin, Nasreen</creator><creator>Menouar, Hamid</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20150301</creationdate><title>Enhancing RPL Resilience Against Routing Layer Insider Attacks</title><author>Heurtefeux, Karel ; Erdene-Ochir, Ochirkhand ; Mohsin, Nasreen ; Menouar, Hamid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i208t-5d5f48330284c6415f01eca405565a605cd86b907b6efa5d5024d928e1a816753</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Computer information security</topic><topic>Computer networks</topic><topic>Conferences</topic><topic>Energy consumption</topic><topic>Hardware</topic><topic>Resilience</topic><topic>Routing</topic><topic>Routing (telecommunications)</topic><topic>Routing protocols</topic><topic>RPL</topic><topic>Security</topic><topic>Simulation</topic><topic>Wireless communication</topic><topic>Wireless Network</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Heurtefeux, Karel</creatorcontrib><creatorcontrib>Erdene-Ochir, Ochirkhand</creatorcontrib><creatorcontrib>Mohsin, Nasreen</creatorcontrib><creatorcontrib>Menouar, Hamid</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library Online</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Heurtefeux, Karel</au><au>Erdene-Ochir, Ochirkhand</au><au>Mohsin, Nasreen</au><au>Menouar, Hamid</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Enhancing RPL Resilience Against Routing Layer Insider Attacks</atitle><btitle>2015 IEEE 29th International Conference on Advanced Information Networking and Applications</btitle><stitle>AINA</stitle><date>2015-03-01</date><risdate>2015</risdate><spage>802</spage><epage>807</epage><pages>802-807</pages><issn>1550-445X</issn><eissn>2332-5658</eissn><eisbn>147997904X</eisbn><eisbn>1479979058</eisbn><eisbn>9781479979059</eisbn><eisbn>9781479979042</eisbn><coden>IEEPAD</coden><abstract>To gather and transmit data, low cost wireless devices are often deployed in open, unattended and possibly hostile environment, making them particularly vulnerable to physical attacks. Resilience is needed to mitigate such inherent vulnerabilities and risks related to security and reliability. In this paper, Routing Protocol for Low-Power and Lossy Networks (RPL) is studied in presence of packet dropping malicious compromised nodes. Random behavior and data replication have been introduced to RPL to enhance its resilience against such insider attacks. The classical RPL and its resilient variants have been analyzed through Cooja simulations and hardware emulation. Resilient techniques introduced to RPL have enhanced significantly the resilience against attacks providing route diversification to exploit the redundant topology created by wireless communications. In particular, the proposed resilient RPL exhibits better performance in terms of delivery ratio (up to 40%), fairness and connectivity while staying energy efficient.</abstract><pub>IEEE</pub><doi>10.1109/AINA.2015.271</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1550-445X
ispartof 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, 2015, p.802-807
issn 1550-445X
2332-5658
language eng
recordid cdi_ieee_primary_7098056
source IEEE Xplore All Conference Series
subjects Computer information security
Computer networks
Conferences
Energy consumption
Hardware
Resilience
Routing
Routing (telecommunications)
Routing protocols
RPL
Security
Simulation
Wireless communication
Wireless Network
Wireless sensor networks
title Enhancing RPL Resilience Against Routing Layer Insider Attacks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T08%3A19%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Enhancing%20RPL%20Resilience%20Against%20Routing%20Layer%20Insider%20Attacks&rft.btitle=2015%20IEEE%2029th%20International%20Conference%20on%20Advanced%20Information%20Networking%20and%20Applications&rft.au=Heurtefeux,%20Karel&rft.date=2015-03-01&rft.spage=802&rft.epage=807&rft.pages=802-807&rft.issn=1550-445X&rft.eissn=2332-5658&rft.coden=IEEPAD&rft_id=info:doi/10.1109/AINA.2015.271&rft.eisbn=147997904X&rft.eisbn_list=1479979058&rft.eisbn_list=9781479979059&rft.eisbn_list=9781479979042&rft_dat=%3Cproquest_CHZPO%3E1685830303%3C/proquest_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i208t-5d5f48330284c6415f01eca405565a605cd86b907b6efa5d5024d928e1a816753%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1685830303&rft_id=info:pmid/&rft_ieee_id=7098056&rfr_iscdi=true