Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Intrusion Detection in the RPL-connected 6LoWPAN Networks
RISE, Swedish ICT, SICS, Security Lab.ORCID iD: 0000-0001-8192-0893
RISE, Swedish ICT, SICS, Computer Systems Laboratory.ORCID iD: 0000-0002-2586-8573
2017 (English)In: IoTPTS '17: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Securit, ACM Press, 2017, 31-38 p.Conference paper, Published paper (Refereed)
Abstract [en]

The interconnectivity of 6LoWPAN networks with the Internet raises serious security concerns, as constrained 6LoWPAN devices are accessible anywhere from the untrusted global Internet. Also, 6LoWPAN devices are mostly deployed in unattended environments, hence easy to capture and clone. Despite that state of the art crypto solutions provide information security, IPv6 enabled smart objects are vulnerable to attacks from outside and inside 6LoWPAN networks that are aimed to disrupt networks. This paper attempts to identify intrusions aimed to disrupt the Routing Protocol for Low-Power and Lossy Networks (RPL).In order to improve the security within 6LoWPAN networks, we extend SVELTE, an intrusion detection system for the Internet of Things, with an intrusion detection module that uses the ETX (Expected Transmissions) metric. In RPL, ETX is a link reliability metric and monitoring the ETX value can prevent an intruder from actively engaging 6LoWPAN nodes in malicious activities. We also propose geographic hints to identify malicious nodes that conduct attacks against ETX-based networks. We implement these extensions in the Contiki OS and evaluate them using the Cooja simulator.

Place, publisher, year, edition, pages
ACM Press, 2017. 31-38 p.
National Category
Computer Science
Identifiers
URN: urn:nbn:se:ri:diva-30108DOI: 10.1145/3055245.3055252OAI: oai:DiVA.org:ri-30108DiVA: diva2:1128036
Conference
ACM 3rd International Workshop on IoT Privacy, Trust, and Security (IoTPTS 2017), co-located with the ACM Asia Conference on Computer and Communications Security (AsiaCCS'17), Abu Dhabi, United Arab Emirates, April 2, 2017
Available from: 2017-07-21 Created: 2017-07-21 Last updated: 2017-07-21Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full text

Search in DiVA

By author/editor
Raza, ShahidVoigt, Thiemo
By organisation
Security LabComputer Systems Laboratory
Computer Science

Search outside of DiVA

GoogleGoogle Scholar

Altmetric score

CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
v. 2.27.0