Skip to main content

Research Repository

Advanced Search

Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things

Semedo, Felisberto; Moradpoor, Naghmeh; Rafiq, Majid

Authors

Felisberto Semedo

Majid Rafiq



Abstract

The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Positioning devices (GPS) and Local Area Network (LAN) interfaces. Security is by far one of the biggest challenges in IoT networks. This includes secure routing which involves the secure creation of traffic routes and secure transmission of routed packets from a source to a destination. The Routing Protocol for Low-power and Lossy network (RPL) is one of the popular IoT's routing protocol that supports IPv6 communication. However, it suffers from having a basic system for supporting secure routing procedure which makes the RPL vulnerable to many attacks. This includes rank attack manipulation. Objective Function (OF) is one of the extreme importance features of RPL which influences an IoT network in terms of routing strategies as well as network topology. However, current literature lacks study of vulnerability analysis of OFs. Therefore, this paper aims to investigate the vulnerability assessment of OF of RPL protocol. For this, we focus on the rank attack manipulation and two popular OFs: Objective Function Zero (OF0) and the Minimum Rank with Hysteresis Objective Function (MRHOF). CCS CONCEPTS • Security and privacy → Intrusion/anomaly detection and malware mitigation → Intrusion detection systems

Presentation Conference Type Conference Paper (Published)
Conference Name 11th International Conference On Security Of Information and Networks
Start Date Sep 10, 2018
End Date Sep 12, 2018
Acceptance Date Jul 19, 2018
Publication Date Sep 10, 2018
Deposit Date Aug 2, 2018
Publicly Available Date Aug 2, 2018
Publisher Association for Computing Machinery (ACM)
Book Title SIN '18 Proceedings of the 11th International Conference on Security of Information and Networks
ISBN 9781450366083
DOI https://doi.org/10.1145/3264437.3264438
Keywords IoT; LLN; RPL; OF; Internal Threat; Rank Attack Manipulation
Public URL http://researchrepository.napier.ac.uk/Output/1257036

Files

Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things (361 Kb)
PDF

Copyright Statement
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org.









You might also like



Downloadable Citations