Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Intrusion Detection in the RPL-connected 6LoWPAN Networks
Ericsson AB, Sweden.
RISE - Research Institutes of Sweden, ICT, SICS. (Security Lab)ORCID iD: 0000-0001-8192-0893
RISE - Research Institutes of Sweden, ICT, SICS. (Computer Systems Laboratory)ORCID iD: 0000-0002-2586-8573
2017 (English)In: IoTPTS '17: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Securit, ACM Press, 2017, p. 31-38Conference paper, Published paper (Refereed)
Abstract [en]

The interconnectivity of 6LoWPAN networks with the Internet raises serious security concerns, as constrained 6LoWPAN devices are accessible anywhere from the untrusted global Internet. Also, 6LoWPAN devices are mostly deployed in unattended environments, hence easy to capture and clone. Despite that state of the art crypto solutions provide information security, IPv6 enabled smart objects are vulnerable to attacks from outside and inside 6LoWPAN networks that are aimed to disrupt networks. This paper attempts to identify intrusions aimed to disrupt the Routing Protocol for Low-Power and Lossy Networks (RPL).In order to improve the security within 6LoWPAN networks, we extend SVELTE, an intrusion detection system for the Internet of Things, with an intrusion detection module that uses the ETX (Expected Transmissions) metric. In RPL, ETX is a link reliability metric and monitoring the ETX value can prevent an intruder from actively engaging 6LoWPAN nodes in malicious activities. We also propose geographic hints to identify malicious nodes that conduct attacks against ETX-based networks. We implement these extensions in the Contiki OS and evaluate them using the Cooja simulator.

Place, publisher, year, edition, pages
ACM Press, 2017. p. 31-38
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:ri:diva-30108DOI: 10.1145/3055245.3055252Scopus ID: 2-s2.0-85022190788OAI: oai:DiVA.org:ri-30108DiVA, id: diva2:1128036
Conference
ACM 3rd International Workshop on IoT Privacy, Trust, and Security (IoTPTS 2017), co-located with the ACM Asia Conference on Computer and Communications Security (AsiaCCS'17), Abu Dhabi, United Arab Emirates, April 2, 2017
Available from: 2017-07-21 Created: 2017-07-21 Last updated: 2023-06-08Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Raza, ShahidVoigt, Thiemo

Search in DiVA

By author/editor
Raza, ShahidVoigt, Thiemo
By organisation
SICS
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 94 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf