3.8 Proceedings Paper

ML-based NIDS to secure RPL from Routing Attacks

Publisher

IEEE
DOI: 10.1109/CCWC51732.2021.9375844

Keywords

IoT; 6LoWPAN; LLNs; RPL; NIDS for RPL

Ask authors/readers for more resources

The resource-constrained nature of low power and lossy networks devices makes it difficult to implement efficient security mechanisms to defend against RPL routing attacks. Existing security functions within RPL are not sufficient in preventing a wide range of routing attacks, and optional security schemes can defend against external attacks but not internal attacks. Lack of mechanisms to verify the integrity of control messages further increases the threat level of RPL against routing attacks. Researchers have suggested various security mechanisms to mitigate these risks, but further exploration and enhancement are needed to improve RPL's overall security.
Low power and lossy networks (LLNs) devices resource-constrained nature make it difficult to implement security mechanisms to defend against RPL routing attacks. RPLs inbuilt security functions are not efficient in preventing a wide majority of routing attacks. RPLs optional security schemes can defend against external attacks, but cannot mitigate internal attacks. Moreover, RPL does not have any mechanism to verify the integrity of control messages used to keep topology updated and route the traffic. All these factors play a major role in increasing the RPLs threat level against routing attacks. In this paper, a comparative literature review of various researchers suggesting security mechanisms to mitigate security attacks aimed at RPL has been performed and methods have been contrasted.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available