Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Routing Attacks and Countermeasures in the RPL-based Internet of Things
RISE, Swedish ICT, SICS.
RISE, Swedish ICT, SICS, Security Lab.ORCID iD: 0000-0001-8192-0893
RISE, Swedish ICT, SICS, Computer Systems Laboratory. Uppsala University, Sweden.ORCID iD: 0000-0002-2586-8573
2013 (English)In: International Journal of Distributed Sensor Networks, ISSN 1550-1329, E-ISSN 1550-1477, article id 794326Article in journal (Refereed) Published
Abstract [en]

The Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol standardized for constrained environments such as 6LoWPAN networks. Providing security in IPv6/RPL connected 6LoWPANs is challenging be- cause the devices are connected to the untrusted Internet, are resource constrained, the communica- tion links are lossy, and the devices use a set of novel IoT technologies such as RPL, 6LoWPAN, and CoAP/CoAPs. In this paper we provide a comprehensive analysis of IoT technologies and their new security capabilities that can be exploited by attackers or IDSs. One of the major contributions in this paper is our implementation and demonstration of well-known routing attacks against 6LoWPAN networks running RPL as a routing protocol. We implement these attacks in the RPL imple- mentation in the Contiki operating system and demonstrate these attacks in the Cooja simulator. Furthermore, we highlight novel security features in the IPv6 protocol and exemplify the use of these features for intrusion detection in the IoT, by implementing a lightweight heartbeat protocol.

Place, publisher, year, edition, pages
Hindawi Publishing Corporation , 2013, 10. article id 794326
Keywords [en]
Security, Routing, RPL, Internet of Things, Attacks
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:ri:diva-24200DOI: 10.1155/2013/794326Scopus ID: 2-s2.0-84884229742OAI: oai:DiVA.org:ri-24200DiVA, id: diva2:1043280
Projects
CALIPSOCNSPromosAvailable from: 2016-10-31 Created: 2016-10-31 Last updated: 2023-06-08Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Raza, ShahidVoigt, Thiemo

Search in DiVA

By author/editor
Raza, ShahidVoigt, Thiemo
By organisation
SICSSecurity LabComputer Systems Laboratory
In the same journal
International Journal of Distributed Sensor Networks
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 145 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf