Á¤º¸°úÇÐȸ ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ ³í¹®Áö (KIISE Transactions on Computing Practices)
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
Provenance¸¦ »ç¿ëÇÑ RPL±â¹Ý »ç¹°ÀÎÅÍ³Ý »ó ¼±ÅÃÀû Æ÷¿öµù °ø°Ý °¨Áö |
¿µ¹®Á¦¸ñ(English Title) |
Using Provenance to Detect Selective Forwarding Attack in RPL-Based Internet of Things |
ÀúÀÚ(Author) |
»ç¹Ù ¼öÇÏÀÏ
»þ½Ã ¶óÁî Æǵ¥ÀÌ
È«Ãæ¼±
Sabah Suhail
Shashi Raj Pandey
Choong Seon Hong
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 26 NO. 01 PP. 0020 ~ 0025 (2020. 01) |
Çѱ۳»¿ë (Korean Abstract) |
Internet of Things (IoT)¿¡¼ ¸®¼Ò½º°¡ Á¦ÇÑµÈ »ç¹°µéÀº IPv6¿Í 6LoWPAN ³×Æ®¿öÅ©¸¦ ÅëÇØ ÀÎÅͳݿ¡ ¿¬°áµÉ ¼ö ÀÖ´Ù. ÀúÀü·Â ¼Õ½Ç ³×Æ®¿öÅ©¸¦ À§ÇÑ ¶ó¿ìÆà ÇÁ·ÎÅäÄÝ(RPL)Àº ±×·¯ÇÑ »óÈ£¿¬°áÀ» °¡´ÉÇÏ°Ô ÇÑ´Ù. ±×·¯³ª RPLÀ» »ç¿ëÇÏ´Â µ¥ÀÌÅÍ Àü¼ÛÀº ½Å·ÚÇÒ ¼ö ¾ø´Â ÀÎÅͳݰú ¹æÄ¡µÈ »ç¹°µéÀÇ »óÈ£ ¿¬°á ¶§¹®¿¡ ´Ù¾çÇÑ °ø°Ý¿¡ Ãë¾àÇÏ´Ù. ¿¹¸¦ µé¾î, ¼¾¼µé¿¡ ÀÇÇØ »ý¼ºµÇ´Â µ¥ÀÌÅÍ´Â ¼±ÅÃÀû Æ÷¿öµù °ø°Ý°ú °°Àº °ø°Ýµé¿¡ Ãë¾àÇÏ´Ù. µû¶ó¼ ¿À·ù°¡ ¾ø°í ½Å·Ú¼º ÀÖ´Â Á¤º¸ÀÇ °æ¿ì ÀÇ»ç°áÁ¤ °úÁ¤¿¡¼ º¸Àå µÉ ¼ö ¾ø´Ù. ¼Ò½º¿¡¼ ¸ñÀûÀ¸·Î µ¥ÀÌÅ͸¦ Àü¼ÛÇÏ´Â °úÁ¤ µ¿¾È, provenance´Â µ¥ÀÌÅÍ ¼öÁý ¹× µ¥ÀÌÅÍ Åë°ú¸¦ ÃßÀûÇϴµ¥ »ç¿ëµÉ ¼ö ÀÖ´Ù. º» ³í¹®¿¡¼´Â provenance¸¦ »ç¿ëÇÏ¿© ÆÐŶ °æ·ÎÀÇ °¢ Àü´Þ ³ëµå¿¡¼ ÆÐŶ Àü´Þ ºñÀ²(PDR)À» °è»êÇÏ¿© ³×Æ®¿öÅ© ¼º´ÉÀ» Æò°¡ÇÑ´Ù. ¶ÇÇÑ Àå¾Ö ³ëµå¸¦ ½Äº°Çϱâ À§ÇØ, ³×Æ®¿öÅ©¿¡ Âü¿©ÇÏ´Â °¢ ºÎ¸ð ³ëµåÀÇ ¶ó¿ìÆà Å×ÀÌºí¿¡¼ °¢ ÇÏÀ§ ³ëµå·ÎºÎÅÍ ¹ÞÀº ÆÐŶ ¼ö¸¦ À¯ÁöÇÑ´Ù. ¸¶Áö¸·À¸·Î º» ³í¹®Àº provenance Å©±â, »ý¼º½Ã°£ ¹× ¸Þ¸ð¸® ¼Òºñ Ãø¸é¿¡¼ RPL±â¹Ý IoT¿¡ ´ëÇÑ Á¦¾ÈµÈ Á¢±Ù ¹æ½ÄÀ» Æò°¡ÇÏ¿´´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
In the Internet of Things (IoT), resource-constrained things can connect to the Internet via IPv6 and 6LoWPAN networks. The Routing Protocol for Low-Power and Lossy Networks (RPL) has enabled such interconnection. However, the data transportation using RPL is vulnerable to various attacks due to the interaction between unattended things with the unreliable Internet. For instance, the data generated by sensors are vulnerable to attacks (for instance, selective forwarding attack). Therefore, error-free and reliable information cannot be assured in the decision-making process. During data transmission from source to destination, provenance can be used to track data acquisition and data traversal. In this paper, we use provenance to evaluate the network performance by computing the packet delivery ratio (PDR) at each forwarding node in the packet path. Furthermore, to identify the faulty nodes, we counted the packets received from the respective child nodes in the routing table at each parent node participating in the network. We have evaluated the proposed approach for RPL-based IoT in terms of provenance size, provenance generation time, and memory consumption.
|
Å°¿öµå(Keyword) |
IoT
Provenance
PDR
RPL
¼±ÅÃÀû Æ÷¿öµù °ø°Ý
ÀÌ»ó ±â¹Ý ŽÁö
6LoWPAN
anomaly-based detection
IoT
provenance
RPL
selective forwarding attack
6LoWPAN
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|