uu.seUppsala University Publications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Routing Attacks and Countermeasures in the RPL-Based Internet of Things
Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems.
2013 (English)In: International Journal of Distributed Sensor Networks, ISSN 1550-1329, E-ISSN 1550-1477, 794326- p.Article in journal (Refereed) Published
Abstract [en]

The Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol standardized for constrained environments such as 6LoWPAN networks. Providing security in IPv6/RPL connected 6LoWPANs is challenging because the devices are connected to the untrusted Internet and are resource constrained, the communication links are lossy, and the devices use a set of novel IoT technologies such as RPL, 6LoWPAN, and CoAP/CoAPs. In this paper we provide a comprehensive analysis of IoT technologies and their new security capabilities that can be exploited by attackers or IDSs. One of the major contributions in this paper is our implementation and demonstration of well-known routing attacks against 6LoWPAN networks running RPL as a routing protocol. We implement these attacks in the RPL implementation in the Contiki operating system and demonstrate these attacks in the Cooja simulator. Furthermore, we highlight novel security features in the IPv6 protocol and exemplify the use of these features for intrusion detection in the IoT by implementing a lightweight heartbeat protocol.

Place, publisher, year, edition, pages
2013. 794326- p.
National Category
Natural Sciences
Identifiers
URN: urn:nbn:se:uu:diva-208393DOI: 10.1155/2013/794326ISI: 000323960500001OAI: oai:DiVA.org:uu-208393DiVA: diva2:652146
Available from: 2013-09-30 Created: 2013-09-30 Last updated: 2017-12-06Bibliographically approved

Open Access in DiVA

fulltext(1793 kB)877 downloads
File information
File name FULLTEXT01.pdfFile size 1793 kBChecksum SHA-512
294721fe07d3ae759f1998923e500181f6ef846cdb2ad405f831bb5d48d5471634767318659795cf0d3ab0c0319edf6c6d2f5c94aeccce8d2c2c4b23a7401afa
Type fulltextMimetype application/pdf

Other links

Publisher's full text

Authority records BETA

Voigt, Thiemo

Search in DiVA

By author/editor
Voigt, Thiemo
By organisation
Computer Systems
In the same journal
International Journal of Distributed Sensor Networks
Natural Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 877 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 501 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf