Research Output

Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things

  The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Positioning devices (GPS) and Local Area Network (LAN) interfaces. Security is by far one of the biggest challenges in IoT networks. This includes secure routing which involves the secure creation of traffic routes and secure transmission of routed packets from a source to a destination. The Routing Protocol for Low-power and Lossy network (RPL) is one of the popular IoT's routing protocol that supports IPv6 communication. However, it suffers from having a basic system for supporting secure routing procedure which makes the RPL vulnerable to many attacks. This includes rank attack manipulation. Objective Function (OF) is one of the extreme importance features of RPL which influences an IoT network in terms of routing strategies as well as network topology. However, current literature lacks study of vulnerability analysis of OFs. Therefore, this paper aims to investigate the vulnerability assessment of OF of RPL protocol. For this, we focus on the rank attack manipulation and two popular OFs: Objective Function Zero (OF0) and the Minimum Rank with Hysteresis Objective Function (MRHOF). CCS CONCEPTS • Security and privacy → Intrusion/anomaly detection and malware mitigation → Intrusion detection systems

  • Date:

    10 September 2018

  • Publication Status:

    Published

  • Publisher

    Association for Computing Machinery

  • DOI:

    10.1145/3264437.3264438

  • Library of Congress:

    QA76 Computer software

  • Dewey Decimal Classification:

    004 Data processing & computer science

  • Funders:

    Edinburgh Napier Funded

Citation

Semedo, F., Moradpoor, N., & Rafiq, M. (2018). Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. In SIN '18 Proceedings of the 11th International Conference on Security of Information and Networksdoi:10.1145/3264437.3264438

Authors

Keywords

IoT; LLN; RPL; OF; Internal Threat; Rank Attack Manipulation

Monthly Views:

Available Documents

  • pdf

    Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things

    352KB
    Number of Downloads in the past year: 16

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org.

  • Downloadable citations

    HTML BIB RTF