首页> 外文会议>IEEE Global Communications Conference >Secure Routing in IoT: Evaluation of RPL's Secure Mode under Attacks
【24h】

Secure Routing in IoT: Evaluation of RPL's Secure Mode under Attacks

机译:物联网中的安全路由:受到攻击时对RPL安全模式的评估

获取原文

摘要

As the Routing Protocol for Low Power and Lossy Networks (RPL) became the standard for routing in the Internet of Things (IoT) networks, many researchers had investigated the security aspects of this protocol. However, no work (to the best of our knowledge) has investigated the use of the security mechanisms included in the protocol’s standard, due to the fact that there was no implementation for these features in any IoT operating system yet. A partial implementation of RPL’s security mechanisms was presented recently for Contiki operating system (by Perazzo et al.), which provided us with the opportunity to examine RPL’s security mechanisms. In this paper, we investigate the effects and challenges of using RPL’s security mechanisms under common routing attacks. First, a comparison of RPL’s performance, with and without its security mechanisms, under three routing attacks (Blackhole, Selective-Forward, and Neighbor attacks) is conducted using several metrics (e.g., average data packet delivery rate, average data packet delay, average power consumption... etc.) Based on the observations from this comparison, we come up with few suggestions that could reduce the effects of such attacks, without having added security mechanisms for RPL.
机译:随着低功率有损网络的路由协议(RPL)成为物联网(IoT)网络中路由的标准,许多研究人员已经研究了该协议的安全性。然而,由于没有任何物联网操作系统中的这些功能的实现,(据我们所知)尚未研究该协议标准中包含的安全性机制的使用。最近针对Contiki操作系统提出了RPL安全机制的部分实现(由Perazzo等人提供),这为我们提供了检查RPL安全机制的机会。在本文中,我们研究了在常见路由攻击下使用RPL安全机制的影响和挑战。首先,使用几种指标(例如,平均数据包传输率,平均数据包)对三种路由攻击(Blackhole,Selective-Forward和Neighbor攻击)下具有和不具有其安全性机制的RPL性能进行比较。延迟,平均功耗等)。基于此比较的观察结果,我们提出了一些建议,这些建议可以减少此类攻击的影响,而无需增加RPL的安全性机制。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号