Technical Papers Parallel Session-II: Wormhole attack detection in routing protocol for low power lossy networks

Abstract/Description

The next wave for internet is called Internet of things. With billions of things attached to internet through IP forms the complex heterogeneous network. Previously devices weren't connected to internet they don't pose a threat. But in today's world security challenges are present in smart devices due to lack of security features especially in Low Power Lossy Networks environment. One of the attacks for disrupting Routing Protocol (RPL) is Wormhole attack. We have proposed a scheme to detect and mitigate this attack based on two techniques using Area Border Router and Sensing Aware Nodes. The proposed scheme monitors the signal strength of nodes, if distance found greater than default distance attack is detected. Both techniques act as backup of each other such that if one method fails other will detect the attack. This scheme doesn't require excessive power or specialized hardware equipment which is quite useful in resource constrained environment.

Location

Theatre 2, Aman Tower

Session Theme

Technical Papers Parallel Session-II: Networks & Computer Security

Session Type

Parallel Technical Session

Session Chair

Dr. Jawwad Shamsi

Start Date

30-12-2017 3:00 PM

End Date

30-12-2017 3:20 PM

Share

COinS
 
Dec 30th, 3:00 PM Dec 30th, 3:20 PM

Technical Papers Parallel Session-II: Wormhole attack detection in routing protocol for low power lossy networks

Theatre 2, Aman Tower

The next wave for internet is called Internet of things. With billions of things attached to internet through IP forms the complex heterogeneous network. Previously devices weren't connected to internet they don't pose a threat. But in today's world security challenges are present in smart devices due to lack of security features especially in Low Power Lossy Networks environment. One of the attacks for disrupting Routing Protocol (RPL) is Wormhole attack. We have proposed a scheme to detect and mitigate this attack based on two techniques using Area Border Router and Sensing Aware Nodes. The proposed scheme monitors the signal strength of nodes, if distance found greater than default distance attack is detected. Both techniques act as backup of each other such that if one method fails other will detect the attack. This scheme doesn't require excessive power or specialized hardware equipment which is quite useful in resource constrained environment.