论文标题
负责人:低间接头排名攻击检测确保基于RPL的物联网
LEADER: Low Overhead Rank Attack Detection for Securing RPL based IoT
论文作者
论文摘要
最近,研究人员在低功率和有损网络(RPL)的路由协议中发现了一些安全漏洞,其中哪个排名攻击是通过创建假拓扑来对网络造成不利影响的主要攻击。为了解决这一问题,我们建议在物联网中使用的非存储RPL模式的低空排名攻击检测方案,以应对等级攻击的增加和减少。因此,我们已经修改了面向RPL目标的定向无环图(DODAG)形成算法,以检测拓扑形成和维护期间的等级攻击。该算法的分布式模块在所有参与的节点中运行,而集中模块则在水槽中运行。与许多现有方案不同,我们没有发送其他控制消息,而是通过简单地修改DAO控制消息来制作该方案。此外,使用轻型消息身份验证代码(HMAC-LOCHA)用于验证节点和接收器之间交换的控制消息的完整性和真实性。提出的方案的正确性是通过使用多个测试案例方案的具体证明来确定的。最后,在理论上和通过基于Contiki的Cooja Simulator中的模拟评估了所提出的方案的性能。理论评估证明了该方案的能源效率。仿真结果表明,就检测准确性,假阳性或负率和能耗而言,我们的方案优于最先进的排名攻击检测方案,同时还保持可接受的网络性能,例如提高检测潜伏期和PAR数据包的交付率。
In recent times researchers have found several security vulnerabilities in the Routing Protocol for Low power and Lossy network (RPL), amongst which rank attack is a predominant one causing detrimental effects on the network by creating a fake topology. To address this concern, we propose a low-overhead rank attack detection scheme for non-storing mode of RPL used in IoT to deal with both increased and decreased rank attacks. Accordingly, we have modified the RPL Destination Oriented Directed Acyclic Graph (DODAG) formation algorithm to detect rank attacks during topology formation and maintenance. The distributed module of the algorithm runs in all the participating nodes whereas the centralized module runs in the sink. Unlike many existing schemes, instead of sending additional control message, we make the scheme low-overhead by simply modifying the DAO control message. Additionally, a lightweight Message Authentication Code (HMAC-LOCHA) is used to verify the integrity and authenticity of the control messages exchanged between nodes and the sink. The correctness of the proposed scheme is established through a concrete proof using multiple test case scenarios. Finally, the performance of the proposed scheme is evaluated both theoretically and through simulation in Contiki-based Cooja simulator. Theoretical evaluation proves the energy efficiency of the scheme. Simulation results show that our scheme outperforms over a state-of-the-art rank attack detection scheme in terms of detection accuracy, false positive or negative rate and energy consumption while also keeping acceptable network performance such as improved detection latency and at par packet delivery ratio.