ZONE BASED OPTIMAL SELECTIVE FORWARDING (ZBOSF) ROUTING PROTOCOL FOR MANET

2017 ◽  
Vol 73 (12) ◽  
Author(s):  
G. T. Chavan ◽  
Vemuru Srikanth
Author(s):  
David Airehrour ◽  
Jairo Guttierrez ◽  
Sayan Kumar Ray

The routing protocol for low-power and lossy networks (RPL) has gained prominence as the standard IoT routing protocol. However, it faces like many other routing protocols diverse attacks. Many studies have been proposed to secure the RPL protocol, and simulation studies have been put forward as the main research method, while testbed experiments, though an authentic research and testing method, have been ignored. Although testbed experiments and simulation studies have their strengths and limitations, testbed techniques could be used as a verifiable validation method for simulation studies. This study is a follow up research work to validate our simulation study, which addressed Blackhole attacks in the RPL routing protocol. In addition, Selective Forwarding attacks are also addressed. It implements a testbed while embedding our Trust-based RPL protocol and the standard RPL protocol in a smart environment configuration. Based on the test experiments, we provide a proof-of-concept of the validity of our claim that our Trust-based RPL protocol provides a comprehensive defence (simulation and testbed) against Blackhole and Selective Forwarding attacks.


2020 ◽  
Vol 10 (18) ◽  
pp. 6472
Author(s):  
Karen Avila ◽  
Daladier Jabba ◽  
Javier Gomez

The Internet of things (IoT) is a concept that has gained traction over the last decade. IoT networks have evolved around the wireless sensor network (WSN), and the following research looks at relevant IoT concepts and the different security issues that occur specifically at the network layer. This analysis is performed using a structured literature review (SLR). This form of bibliographic review has been a trend in recent years. Its strength is the performance of a bibliometric analysis that allows studying both trends in the line of research that you want to address and the relevant authors. This SLR reviews 53 proposals between 2011 and 2020, whose contribution is to mitigate attacks in the RPL (Routing Protocol for Low-Power and Lossy Networks) protocol. The revised proposals emerged after selecting keywords and databases in which to apply the search. Initially, approximately 380 research works appeared, for which it was necessary to continue using filters to refine the proposals to be included. After reading titles and abstracts, 53 papers were finally selected. In addition to analyzing the attacks mitigated in the RPL protocol, it is intended to identify the trend by which these attacks are reduced, as a result of the review, nine attacks have been found: rank, blackhole, selective forwarding, wormhole, DODAG (Destination-Oriented Directed Acyclic Graph) version number, DAO (Destination Advertisement Object) inconsistency, DIO (DODAG Information Object) suppression, Sybil, and sinkhole. Each of the 53 proposals analyzed in this review has an associated mitigation strategy, these strategies have been categorized into four groups, based on authentication or cryptography, based on network monitoring, based on secure parent node selection and other. According to the results, the authors’ primary mitigation strategy is based on network monitoring, with 30%. This review also identifies the principal authors and countries that need the development of this line of research.


2019 ◽  
Vol 8 (S3) ◽  
pp. 100-104
Author(s):  
Vikram Neerugatti ◽  
A. Rama Mohan Reddy

Internet of Things (IoT) is the advanced technology, were the constrained nodes/things (all the objects around us such as chair, home, car, keys, etc.) will be connected to the internet to form a network, for sharing and monitoring the data, remotely. RPL (IPv6 Routing Protocol for Low Power and Lossy networks) is a routing protocol particularly designed for the constrained (low powered, low computation, less size, etc.) networks with the protocol 6LoWPAN (IPv6 Low Powered wireless Personal Area Networks). Due to the constrained behaviour of the RPL protocol, it will leads to many RPL routing attacks such as Sinkhole, Black hole, Wormhole, Selective forwarding, rank attacks, etc. This paper was focused on the Wormhole attack. The Wormhole attack will select the packets from one location and drops those packets in some other location (malicious) by forming the Tunnelling. To detect this attack here proposed and implemented a novel approach called (ADWA). Acknowledgement based technique for detection of the wormhole attack in RPL based Internet of Things networks. This approach was shown efficient results with the Telosb sky emulator nodes in the Contiki Cooja simulator, in terms of the Packet delivery ratio, delay and detection of wormhole attack.


2018 ◽  
Vol 14 (05) ◽  
pp. 70
Author(s):  
Yun Ji

<span style="font-family: 'Times New Roman',serif; font-size: 10pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: DE; mso-ansi-language: EN-GB; mso-bidi-language: AR-SA;" lang="EN-GB">Due to low communication costs and convenient deployment, wireless sensor network has been widely applied in various fields. However, it still has some problems in the defence against selective forwarding attacks. To address these problems, this paper proposes a model against selective forwarding attacks, which is built on the threshold secret sharing mechanism and adopts the individualized path routing protocol. Through simulation test, this paper studies the effects of attack intensity on the successful transmission rate and communication load under the same network deployment and communication topology but at different node densities and average neighbourhood degrees. The results show that this model can effectively defend against forwarding attacks, also saves communication resource, offering a technical reference for similar studies.</span>


Author(s):  
David Airehrour ◽  
Jairo A. Gutierrez ◽  
Sayan Kumar Ray

This research addresses blackhole and selective forwarding routing attacks, which are fundamental security attacks on the routing of data in IoT networks. Most IoT devices today, from medical devices to connected vehicles and even smart buildings, have the capability of communicating wirelessly with one another. Although, consumers are progressively embracing the concept of connected devices, recent studies indicate that security is not high on the priority list of manufacturers especially in the way these IoT devices route and communicate data amongst themselves. Thus, it leaves the door wide open to attacks and compromises. In this study, a trust-based routing Protocol for Low-Power and Lossy Networks addressing blackhole and selective forwarding attacks is proposed. We show that our proposed protocol is not only secure from blackhole and selective forwarding attacks, but also does not impose undue overheads on network traffic.


Author(s):  
David Airehrour ◽  
Jairo Guttierrez ◽  
Sayan Kumar Ray

The routing protocol for low-power and lossy networks (RPL) has gained prominence as the standard IoT routing protocol. However, it faces like many other routing protocols diverse attacks. Many studies have been proposed to secure the RPL protocol, and simulation studies have been put forward as the main research method, while testbed experiments, though an authentic research and testing method, have been ignored. Although testbed experiments and simulation studies have their strengths and limitations, testbed techniques could be used as a verifiable validation method for simulation studies. This study is a follow up research work to validate our simulation study, which addressed Blackhole attacks in the RPL routing protocol. In addition, Selective Forwarding attacks are also addressed. It implements a testbed while embedding our Trust-based RPL protocol and the standard RPL protocol in a smart environment configuration. Based on the test experiments, we provide a proof-of-concept of the validity of our claim that our Trust-based RPL protocol provides a comprehensive defence (simulation and testbed) against Blackhole and Selective Forwarding attacks.


Author(s):  
David Airehrour ◽  
Jairo A. Gutierrez ◽  
Sayan Kumar Ray

This research addresses blackhole and selective forwarding routing attacks, which are fundamental security attacks on the routing of data in IoT networks. Most IoT devices today, from medical devices to connected vehicles and even smart buildings, have the capability of communicating wirelessly with one another. Although, consumers are progressively embracing the concept of connected devices, recent studies indicate that security is not high on the priority list of manufacturers especially in the way these IoT devices route and communicate data amongst themselves. Thus, it leaves the door wide open to attacks and compromises. In this study, a trust-based routing Protocol for Low-Power and Lossy Networks addressing blackhole and selective forwarding attacks is proposed. We show that our proposed protocol is not only secure from blackhole and selective forwarding attacks, but also does not impose undue overheads on network traffic.


Sign in / Sign up

Export Citation Format

Share Document