Study of Security Mechanisms and Simulation Analysis of Packet Drop in RPL in Low Power Lossy Networks

Nikita Malik, Prakash Rao Ragiri, Aarti Jain
{"title":"Study of Security Mechanisms and Simulation Analysis of Packet Drop in RPL in Low Power Lossy Networks","authors":"Nikita Malik, Prakash Rao Ragiri, Aarti Jain","doi":"10.14257/IJFGCN.2018.11.5.05","DOIUrl":null,"url":null,"abstract":"A large number of small sensor nodes or motes can be randomly distributed in any environment. These nodes communicate with each other over a low power wireless communication medium since they are severely restricted in their resources. Owing to these constraints, nodes in low power and lossy networks (LLNs) need to collaborate in order to establish a multi-hop network in which data is transmitted over several nodes to reach the sink node(s). Such communications over the radio environment are prone to various attacks, such as the RPL (Routing Protocol for Low Power and Lossy Networks) Packet Drop attack, which participates in the routing process to accept packets from the neighboring motes, only to drop them instead of forwarding in the route to the destination. Such an attack is generally hard to detect and to provide defenses against. In this paper, through simulations on Contiki’s network simulator COOJA, the impact of RPL Packet Drop attack on Contiki RPL is observed for performance based on average power consumption, received packet count, expected transmission count and hop count. Based on the results, several security schemes to tackle RPL in LLN have been studied.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Future Generation Communication and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/IJFGCN.2018.11.5.05","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

A large number of small sensor nodes or motes can be randomly distributed in any environment. These nodes communicate with each other over a low power wireless communication medium since they are severely restricted in their resources. Owing to these constraints, nodes in low power and lossy networks (LLNs) need to collaborate in order to establish a multi-hop network in which data is transmitted over several nodes to reach the sink node(s). Such communications over the radio environment are prone to various attacks, such as the RPL (Routing Protocol for Low Power and Lossy Networks) Packet Drop attack, which participates in the routing process to accept packets from the neighboring motes, only to drop them instead of forwarding in the route to the destination. Such an attack is generally hard to detect and to provide defenses against. In this paper, through simulations on Contiki’s network simulator COOJA, the impact of RPL Packet Drop attack on Contiki RPL is observed for performance based on average power consumption, received packet count, expected transmission count and hop count. Based on the results, several security schemes to tackle RPL in LLN have been studied.
低功耗网络中RPL安全机制研究及丢包仿真分析
在任何环境中都可以随机分布大量的小传感器节点或微点。由于这些节点的资源受到严格限制,因此它们通过低功率无线通信介质相互通信。由于这些限制,低功耗和有损网络(lln)中的节点需要协作以建立一个多跳网络,其中数据通过多个节点传输以到达汇聚节点。这种无线环境下的通信容易受到各种攻击,例如RPL (Routing Protocol for Low Power and Lossy Networks)丢包攻击(Packet Drop attack,低功耗网络路由协议),这种攻击是指在路由过程中接受来自相邻节点的报文,而不是在到达目的地的路由中转发这些报文。这种攻击通常很难检测到,也很难提供防御。本文通过在Contiki的网络模拟器COOJA上进行仿真,从平均功耗、接收包数、期望传输数和跳数四个方面观察RPL丢包攻击对Contiki RPL性能的影响。在此基础上,研究了几种解决LLN中RPL的安全方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
期刊介绍: The topics covered by IJFGCN include the following:- -Communication Basic and Infrastructure: *Algorithms, Architecture, and Infrastructures *Communication protocols *Communication Systems *Telecommunications *Transmission TechniquesEtc. -Networks Basic and Management: *Network Management Techniques *Network Modeling and Simulation *Network Systems and Devices *Networks Security, Encryption and Cryptography *Wireless Networks, Ad-Hoc and Sensor Networks *Etc. -Multimedia Application: *Digital Rights Management *Documents Monetization and Interpretation *Management and Diffusion of Multimedia Applications *Multimedia Data Base *Etc. -Image, Video, Signal and Information Processing: *Analysis and Processing *Compression and Coding *Information Fusion *Rationing Methods and Data mining *Etc.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信