• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > Çѱ¹Á¤º¸°úÇÐȸ Çмú´ëȸ > KSC 2018

KSC 2018

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) Detection of Selective Forwarding Attack in RPL-Based Internet of Things through Provenance
¿µ¹®Á¦¸ñ(English Title) Detection of Selective Forwarding Attack in RPL-Based Internet of Things through Provenance
ÀúÀÚ(Author) Sabah Suhail   Shashi Raj Pandey   Choong Seon Hong  
¿ø¹®¼ö·Ïó(Citation) VOL 45 NO. 02 PP. 0965 ~ 0967 (2018. 12)
Çѱ۳»¿ë
(Korean Abstract)
¿µ¹®³»¿ë
(English Abstract)
In the Internet of Things (IoT), resource-constrained things are connected to the Internet through IPv6 and 6LoWPAN networks. The Routing Protocol for Low-Power and Lossy Networks (RPL) has enabled such interconnection. However, the data transportation using RPL is vulnerable to various attacks due to the interconnection of unattended things with the untrusted Internet. For instance, the data generated by sensors are vulnerable to attacks (selective forwarding attack) and therefore, the error-free and reliable information cannot be assured in the decision-making process. Provenance can be used to keep track of data acquisition and data traversal. In this paper we use provenance to evaluate the performance of the network by computing packet delivery ratio (PDR) at each forwarding node in the packet path. Moreover, for investigating the faulty nodes, we maintain the count for received packets from respective child nodes in the routing table at each parent node. We have evaluated the proposed approach in terms of provenance size and provenance generation time.
Å°¿öµå(Keyword) IoT   Provenance   PDR   RPL   Selective forwarding attack   Anomaly-based detection   6LoWPAN  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå