...
首页> 外文期刊>International journal of communication systems >RPL rank based-attack mitigation scheme in IoT environment
【24h】

RPL rank based-attack mitigation scheme in IoT environment

机译:RPL在物联网环境中基于攻击缓解方案

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Due to the new technologies of the Internet of Things (IoT), connected objects have become smart interactive devices. However, despite their imminent advantages, whether for the daily life of users or in professional contexts, and the various security solutions proposed in literature in particular, the security of IoT networks is still a paramount issue given to the amount of confidential data that circulates through these technologies. In other words, among the IoT protocols that suffer from security issues, routing protocol for low power and lossy networks (RPL) is considered to be one of the most widely used protocols in the deployment of constrained IoT networks with limited resources (storage and energy constraints for example). On this basis, this article investigates in the first part a security flaw in the RPL protocol by carrying out an attack against the rank value of the RPL in an IoT environment. In the second part, a mitigation scheme to avoid it using a trust threshold is proposed. The malicious behavior of the attack and the effectiveness of the proposed scheme were assessed by detailed simulations using the Cooja simulator, in terms of successful detection rate, average network hops and global energy consumption. To conclude, a fair comparison between the different simulation results has been adopted using the Friedman statistical test, and a discussion has been presented with some future works concerning security against rank attack.
机译:由于事物互联网(物联网)的新技术,连接的对象已成为智能交互设备。然而,尽管他们迫在眉睫的优势,无论是用于用户的日常生活还是在专业环境中,特别是文学中提出的各种安全解决方案,那么IOT网络的安全仍然是循环通行的机密数据量的最重要问题这些技术。换句话说,换句话说,在遭受安全问题的IOT协议中,低功耗和有损网络(RPL)的路由协议被认为是在具有有限资源的受限IOT网络部署中最广泛使用的协议之一(存储和能量例如约束)。在此基础上,本文通过在IOT环境中对RPL的级别进行攻击来调查RPL议定书中的安全漏洞。在第二部分中,提出了一种避免使用信任阈值的缓解方案。通过使用Cooja模拟器的详细模拟,在成功的检测率,平均网络跳跃和全球能量消耗方面,通过详细模拟评估攻击的恶意行为和所提出的计划的有效性。为了得出结论,采用弗里德曼统计检验采用了不同仿真结果与不同仿真结果的公平比较,并讨论了一些未来关于对抗攻击的安全的作品。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号