• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö > Á¤º¸°úÇÐȸ ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ ³í¹®Áö (KIISE Transactions on Computing Practices)

Á¤º¸°úÇÐȸ ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ ³í¹®Áö (KIISE Transactions on Computing Practices)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) Provenance¸¦ »ç¿ëÇÑ RPL±â¹Ý »ç¹°ÀÎÅÍ³Ý »ó ¼±ÅÃÀû Æ÷¿öµù °ø°Ý °¨Áö
¿µ¹®Á¦¸ñ(English Title) Using Provenance to Detect Selective Forwarding Attack in RPL-Based Internet of Things
ÀúÀÚ(Author) »ç¹Ù ¼öÇÏÀÏ   »þ½Ã ¶óÁî Æǵ¥ÀÌ   È«Ãæ¼±   Sabah Suhail   Shashi Raj Pandey   Choong Seon Hong  
¿ø¹®¼ö·Ïó(Citation) VOL 26 NO. 01 PP. 0020 ~ 0025 (2020. 01)
Çѱ۳»¿ë
(Korean Abstract)
Internet of Things (IoT)¿¡¼­ ¸®¼Ò½º°¡ Á¦ÇÑµÈ »ç¹°µéÀº IPv6¿Í 6LoWPAN ³×Æ®¿öÅ©¸¦ ÅëÇØ ÀÎÅͳݿ¡ ¿¬°áµÉ ¼ö ÀÖ´Ù. ÀúÀü·Â ¼Õ½Ç ³×Æ®¿öÅ©¸¦ À§ÇÑ ¶ó¿ìÆà ÇÁ·ÎÅäÄÝ(RPL)Àº ±×·¯ÇÑ »óÈ£¿¬°áÀ» °¡´ÉÇÏ°Ô ÇÑ´Ù. ±×·¯³ª RPLÀ» »ç¿ëÇÏ´Â µ¥ÀÌÅÍ Àü¼ÛÀº ½Å·ÚÇÒ ¼ö ¾ø´Â ÀÎÅͳݰú ¹æÄ¡µÈ »ç¹°µéÀÇ »óÈ£ ¿¬°á ¶§¹®¿¡ ´Ù¾çÇÑ °ø°Ý¿¡ Ãë¾àÇÏ´Ù. ¿¹¸¦ µé¾î, ¼¾¼­µé¿¡ ÀÇÇØ »ý¼ºµÇ´Â µ¥ÀÌÅÍ´Â ¼±ÅÃÀû Æ÷¿öµù °ø°Ý°ú °°Àº °ø°Ýµé¿¡ Ãë¾àÇÏ´Ù. µû¶ó¼­ ¿À·ù°¡ ¾ø°í ½Å·Ú¼º ÀÖ´Â Á¤º¸ÀÇ °æ¿ì ÀÇ»ç°áÁ¤ °úÁ¤¿¡¼­ º¸Àå µÉ ¼ö ¾ø´Ù. ¼Ò½º¿¡¼­ ¸ñÀûÀ¸·Î µ¥ÀÌÅ͸¦ Àü¼ÛÇÏ´Â °úÁ¤ µ¿¾È, provenance´Â µ¥ÀÌÅÍ ¼öÁý ¹× µ¥ÀÌÅÍ Åë°ú¸¦ ÃßÀûÇϴµ¥ »ç¿ëµÉ ¼ö ÀÖ´Ù. º» ³í¹®¿¡¼­´Â provenance¸¦ »ç¿ëÇÏ¿© ÆÐŶ °æ·ÎÀÇ °¢ Àü´Þ ³ëµå¿¡¼­ ÆÐŶ Àü´Þ ºñÀ²(PDR)À» °è»êÇÏ¿© ³×Æ®¿öÅ© ¼º´ÉÀ» Æò°¡ÇÑ´Ù. ¶ÇÇÑ Àå¾Ö ³ëµå¸¦ ½Äº°Çϱâ À§ÇØ, ³×Æ®¿öÅ©¿¡ Âü¿©ÇÏ´Â °¢ ºÎ¸ð ³ëµåÀÇ ¶ó¿ìÆà Å×ÀÌºí¿¡¼­ °¢ ÇÏÀ§ ³ëµå·ÎºÎÅÍ ¹ÞÀº ÆÐŶ ¼ö¸¦ À¯ÁöÇÑ´Ù. ¸¶Áö¸·À¸·Î º» ³í¹®Àº provenance Å©±â, »ý¼º½Ã°£ ¹× ¸Þ¸ð¸® ¼Òºñ Ãø¸é¿¡¼­ RPL±â¹Ý IoT¿¡ ´ëÇÑ Á¦¾ÈµÈ Á¢±Ù ¹æ½ÄÀ» Æò°¡ÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
In the Internet of Things (IoT), resource-constrained things can connect to the Internet via IPv6 and 6LoWPAN networks. The Routing Protocol for Low-Power and Lossy Networks (RPL) has enabled such interconnection. However, the data transportation using RPL is vulnerable to various attacks due to the interaction between unattended things with the unreliable Internet. For instance, the data generated by sensors are vulnerable to attacks (for instance, selective forwarding attack). Therefore, error-free and reliable information cannot be assured in the decision-making process. During data transmission from source to destination, provenance can be used to track data acquisition and data traversal. In this paper, we use provenance to evaluate the network performance by computing the packet delivery ratio (PDR) at each forwarding node in the packet path. Furthermore, to identify the faulty nodes, we counted the packets received from the respective child nodes in the routing table at each parent node participating in the network. We have evaluated the proposed approach for RPL-based IoT in terms of provenance size, provenance generation time, and memory consumption.
Å°¿öµå(Keyword) IoT   Provenance   PDR   RPL   ¼±ÅÃÀû Æ÷¿öµù °ø°Ý   ÀÌ»ó ±â¹Ý ŽÁö   6LoWPAN   anomaly-based detection   IoT   provenance   RPL   selective forwarding attack   6LoWPAN  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå