Browse > Article
http://dx.doi.org/10.13089/JKIISC.2016.26.3.655

An Analysis of Detection of Malicious Packet Dropping and Detour Scheme in IoT based on IPv6  

Choi, Jaewoo (Information Security Lab, Graduate School of Information, Yonsei University)
Kwon, Taekyoung (Information Security Lab, Graduate School of Information, Yonsei University)
Abstract
In this paper, we propose new detection and detour methods against packet drop attacks for availability in the Internet of Things (IoT) based on the IEEE 802.15.4e and RPL protocol standards that employ IPv6. We consider the rank value of RPL and the consecutive packet drops to improve the detection metrics, and also take into account the use of both sibling and child nodes on a RPL routing path to construct the detour method. Our simulation results show that the proposed detection method is faster than the previous result, and the detour method improves the detour success rate.
Keywords
IoT; Packet drop detection; Detour algorithm;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Jung, C. Reinisch, and K. Wolfgang, "Integrating building automation systems and ipv6 in the internet of things," Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conf. IEEE, p. 683-688, Jun. 2012.
2 K. Balakrishnan, J. Deng, and P. K. Varshney, "Twoack: preventing selfishness in mobile ad hoc networks," Wireless communications and networking Conf. IEEE, Vol. 4, pp. 2137-2142, Mar. 2005.
3 K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehavior in manets," IEEE Trans. on Mobile Computing, Vol. 6, no. 5, pp. 536-550, May. 2007.   DOI
4 H. Miranda and L. Rodrigues, "Friends and foes: Preventing selfishness in open mobile ad hoc networks," in Proc. of Distributed Computing Systems Workshop IEEE, pp. 440-445, May. 2003.
5 C. Basile, Z. Kalbarczyk, and R. Iyer, "Inner-circle consistency for wireless ad hoc networks," IEEE Trans. on Mobile Computing, Vol. 6, no.1, pp. 39-55, Jan. 2007.   DOI
6 A. Nadeem and M. Howarth, "Adaptive intrusion detection & prevention of denial of service attacks in manets," in Proc. of the Wireless Communications and Mobile Computing ACM, pp. 926-930, Jun. 2009.
7 A. Nadeem and M. Howarth, "An intrusion detection & adaptive response mechanism for manets," Ad Hoc Networks, Vol. 13, pp. 368-380, Feb. 2014.   DOI
8 L. Sanchez-Casado, G. Macia-Fernandez, P. Garcia-Teodoro, and R. Magan-Carrion, "A model of data forwarding in manets for lightweight detection of malicious packet dropping," Computer Networks, Vol. 87, pp. 44-58, Jul. 2015.   DOI
9 F. Bai and H. Krishnan, "Reliability analysis of dsrc wireless communication for vehicle safety applications," in Proc. of Intelligent Transportation Systems IEEE, pp. 355-362, Sep. 2006.
10 K. Hong and L. Choi, "Dag-based multipath routing for mobile sensor networks," in Proc. of ICT Convergence, pp. 261-266, Sep. 2011.