3.8 Proceedings Paper

ML-based NIDS to secure RPL from Routing Attacks

出版社

IEEE
DOI: 10.1109/CCWC51732.2021.9375844

关键词

IoT; 6LoWPAN; LLNs; RPL; NIDS for RPL

向作者/读者索取更多资源

The resource-constrained nature of low power and lossy networks devices makes it difficult to implement efficient security mechanisms to defend against RPL routing attacks. Existing security functions within RPL are not sufficient in preventing a wide range of routing attacks, and optional security schemes can defend against external attacks but not internal attacks. Lack of mechanisms to verify the integrity of control messages further increases the threat level of RPL against routing attacks. Researchers have suggested various security mechanisms to mitigate these risks, but further exploration and enhancement are needed to improve RPL's overall security.
Low power and lossy networks (LLNs) devices resource-constrained nature make it difficult to implement security mechanisms to defend against RPL routing attacks. RPLs inbuilt security functions are not efficient in preventing a wide majority of routing attacks. RPLs optional security schemes can defend against external attacks, but cannot mitigate internal attacks. Moreover, RPL does not have any mechanism to verify the integrity of control messages used to keep topology updated and route the traffic. All these factors play a major role in increasing the RPLs threat level against routing attacks. In this paper, a comparative literature review of various researchers suggesting security mechanisms to mitigate security attacks aimed at RPL has been performed and methods have been contrasted.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

3.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据