Abstract
This article deals with a prime security attack -blackhole attack in Internet of Things networks that uses the RPL in the network layer for routing of data packets. Latest studies indicate that the security has not been given a bigger priority among manufacturers thereby providing a window of opportunity for attacks to creep into a network. A trust-based mechanism is built over the RPL protocol specifically tackle the blackhole attacks. The Cooja simulator based on Contiki OS was used for experimental analysis and the proposed scheme yields better security when the participating nodes were exposed to the blackhole attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ericsson: More than 50 Billion Connected Devices: Driving Forces, 2011, 2 December 2014. http://www.akos-rs.si/files/Telekomunikacije/Digitalna_agenda/Internetni_protokol_Ipv6/More-than-50-billion-connected-devices.pdf
Ivana, T., McCann, J.A.: A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet Things J. (2017). https://doi.org/10.1109/jiot.2017.2749883
Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 42, 120–134 (2014)
Kabilan, K., Bhalaji, N., Selvaraj, C., Kumaar, M., Karthikeyan, P.T.R.: Performance analysis of IoT protocol under different mobility models. Comput. Electr. Eng. 72, 154–168 (2018)
Wallgren, L., Raza, S., Voigt, T.: Routing attacks and countermeasures in the RPL-based Internet of Things. Int. J. Distrib. Sens. Netw. 2013, 11 (2013)
Seeber, S., Sehgaly, A., Stelte, B., Rodosek, G.D., Schönwäldery, J.: Towards a trust computing architecture for RPL in cyber physical systems
Dhakne, A.R., Chatu, P.N.: TCNPR: trust calculation based on nodes properties and recommendations for intrusion detection in wireless sensor network. IJCSNS Int. J. Comput. Sci. Netw. Secur. 16, 1 (2016)
Chugh, K., Aboubaker, L., Loo, J.: Case study of a black hole attack on LoWPAN-RPL. In: Proceedings of the Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), Rome, Italy, August 2012, pp. 157–162 (2012)
Weekly, K., Pister, K.: Evaluating sinkhole defense techniques in RPL networks. In: 2012 20th IEEE International Conference on Network Protocols (ICNP), pp. 1–6 (2012)
Bhalaji, N., Kanakeri, A.V., Chaitanya, K.P., Shanmugam, A.: Trust based strategy to resist collaborative blackhole attack in MANET. Int. J. Inf. Process. Manag. 70, 465–474 (2010)
Ali, H.: Swedish Institute of Computer Science, “A Performance Evaluation of RPL in Contiki” (2012)
Thingsquare: Contiki: The Open Source OS for the Internet of Things, June 2016. http://www.contiki-os.org/download.html
Vasseur, J.P., Kim, M., Pister, K., Dejean, N., Elster, S.A.S., Barthel, D.: Routing metrics used for path calculation in low power and lossy networks, 1 March 2011
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bhalaji, N., Hariharasudan, K.S., Aashika, K. (2020). A Trust Based Mechanism to Combat Blackhole Attack in RPL Protocol. In: Gunjan, V., Garcia Diaz, V., Cardona, M., Solanki, V., Sunitha, K. (eds) ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management. ICICCT 2019. Springer, Singapore. https://doi.org/10.1007/978-981-13-8461-5_51
Download citation
DOI: https://doi.org/10.1007/978-981-13-8461-5_51
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-8460-8
Online ISBN: 978-981-13-8461-5
eBook Packages: EngineeringEngineering (R0)