ÇѱÛÁ¦¸ñ(Korean Title) |
Detection of Selective Forwarding Attack in RPL-Based Internet of Things through Provenance |
¿µ¹®Á¦¸ñ(English Title) |
Detection of Selective Forwarding Attack in RPL-Based Internet of Things through Provenance |
ÀúÀÚ(Author) |
Sabah Suhail
Shashi Raj Pandey
Choong Seon Hong
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 45 NO. 02 PP. 0965 ~ 0967 (2018. 12) |
Çѱ۳»¿ë (Korean Abstract) |
|
¿µ¹®³»¿ë (English Abstract) |
In the Internet of Things (IoT), resource-constrained things are connected to the Internet through IPv6 and 6LoWPAN networks. The Routing Protocol for Low-Power and Lossy Networks (RPL) has enabled such interconnection. However, the data transportation using RPL is vulnerable to various attacks due to the interconnection of unattended things with the untrusted Internet. For instance, the data generated by sensors are vulnerable to attacks (selective forwarding attack) and therefore, the error-free and reliable information cannot be assured in the decision-making process. Provenance can be used to keep track of data acquisition and data traversal. In this paper we use provenance to evaluate the performance of the network by computing packet delivery ratio (PDR) at each forwarding node in the packet path. Moreover, for investigating the faulty nodes, we maintain the count for received packets from respective child nodes in the routing table at each parent node. We have evaluated the proposed approach in terms of provenance size and provenance generation time. |
Å°¿öµå(Keyword) |
IoT
Provenance
PDR
RPL
Selective forwarding attack
Anomaly-based detection
6LoWPAN
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|