Research Output

A Trust-based Intrusion Detection System for Mobile RPL Based Networks

  Successful deployment of Low power and Lossy
Networks (LLNs) requires self-organising, self-configuring, security,
and mobility support. However, these characteristics can be
exploited to perform security attacks against the Routing Protocol
for Low-Power and Lossy Networks (RPL). In this paper, we
address the lack of strong identity and security mechanisms in
RPL. We first demonstrate by simulation the impact of Sybil-
Mobile attack, namely SybM, on RPL with respect to control
overhead, packet delivery and energy consumption. Then, we
introduce a new Intrusion Detection System (IDS) scheme for
RPL, named Trust-based IDS (T-IDS). T-IDS is a distributed,
cooperative and hierarchical trust-based IDS, which can detect
novel intrusions by comparing network behaviour deviations.
In T-IDS, each node is considered as monitoring node and
collaborates with his peers to detect intrusions and report them to
a 6LoWPAN Border Router (6BR). In our solution, we introduced
a new timer and minor extensions to RPL messages format to
deal with mobility, identity and multicast issues. In addition, each
node is equipped with a Trusted Platform Module co-processor
to handle identification and off-load security related computation
and storage.

  • Date:

    28 April 2017

  • Publication Status:


  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    005.8 Data security

  • Funders:

    Edinburgh Napier Funded


Faiza, M., Tandjaoui, D., Romdhani, I. & Nabil, D. (in press). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)ISBN unknown



RPL security, Sybil attack, Routing security, Intrusion Detection System, IoT

Monthly Views:

Available Documents

  • pdf

    A Trust-based Intrusion Detection System for Mobile RPL Based Networks

    Number of Downloads in the past year: 5

    © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

  • Downloadable citations