JOURNAL BROWSE
Search
Advanced SearchSearch Tips
An Analysis of Detection of Malicious Packet Dropping and Detour Scheme in IoT based on IPv6
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
An Analysis of Detection of Malicious Packet Dropping and Detour Scheme in IoT based on IPv6
Choi, Jaewoo; Kwon, Taekyoung;
  PDF(new window)
 Abstract
In this paper, we propose new detection and detour methods against packet drop attacks for availability in the Internet of Things (IoT) based on the IEEE 802.15.4e and RPL protocol standards that employ IPv6. We consider the rank value of RPL and the consecutive packet drops to improve the detection metrics, and also take into account the use of both sibling and child nodes on a RPL routing path to construct the detour method. Our simulation results show that the proposed detection method is faster than the previous result, and the detour method improves the detour success rate.
 Keywords
IoT;Packet drop detection;Detour algorithm;
 Language
Korean
 Cited by
 References
1.
M. Jung, C. Reinisch, and K. Wolfgang, "Integrating building automation systems and ipv6 in the internet of things," Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conf. IEEE, p. 683-688, Jun. 2012.

2.
K. Balakrishnan, J. Deng, and P. K. Varshney, "Twoack: preventing selfishness in mobile ad hoc networks," Wireless communications and networking Conf. IEEE, Vol. 4, pp. 2137-2142, Mar. 2005.

3.
K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehavior in manets," IEEE Trans. on Mobile Computing, Vol. 6, no. 5, pp. 536-550, May. 2007. crossref(new window)

4.
H. Miranda and L. Rodrigues, "Friends and foes: Preventing selfishness in open mobile ad hoc networks," in Proc. of Distributed Computing Systems Workshop IEEE, pp. 440-445, May. 2003.

5.
C. Basile, Z. Kalbarczyk, and R. Iyer, "Inner-circle consistency for wireless ad hoc networks," IEEE Trans. on Mobile Computing, Vol. 6, no.1, pp. 39-55, Jan. 2007. crossref(new window)

6.
A. Nadeem and M. Howarth, "Adaptive intrusion detection & prevention of denial of service attacks in manets," in Proc. of the Wireless Communications and Mobile Computing ACM, pp. 926-930, Jun. 2009.

7.
A. Nadeem and M. Howarth, "An intrusion detection & adaptive response mechanism for manets," Ad Hoc Networks, Vol. 13, pp. 368-380, Feb. 2014. crossref(new window)

8.
L. Sanchez-Casado, G. Macia-Fernandez, P. Garcia-Teodoro, and R. Magan-Carrion, "A model of data forwarding in manets for lightweight detection of malicious packet dropping," Computer Networks, Vol. 87, pp. 44-58, Jul. 2015. crossref(new window)

9.
F. Bai and H. Krishnan, "Reliability analysis of dsrc wireless communication for vehicle safety applications," in Proc. of Intelligent Transportation Systems IEEE, pp. 355-362, Sep. 2006.

10.
K. Hong and L. Choi, "Dag-based multipath routing for mobile sensor networks," in Proc. of ICT Convergence, pp. 261-266, Sep. 2011.