Back close

Neighbor Attack Detection in Internet of Things

Publication Type : Conference Paper

Publisher : Advanced Computational and Communication Paradigms

Source : Advanced Computational and Communication Paradigms, Springer Singapore, Singapore (2018)

ISBN : 9789811082375

Campus : Coimbatore

School : School of Engineering

Center : TIFAC CORE in Cyber Security

Department : Computer Science

Year : 2018

Abstract : Internet of Things (IoT) hegemonies all other technological development the world has seen so far. 6LoWPAN is emerging as the next generation protocol of IoT. 6LoWPAN protocol enables the resource constrained embedded device to connect to the Internet through IPv6. Routing Protocol for Low Power and Lossy Networks (RPL) is specifically designed as a routing protocol for resource constrained device and it is adaptable with the 6LoWPAN. There are many attacks which make RPL insignificant to achieve its desired objectives. Neighbor attack is momentous and is capable of disrupting possible routing path. In this paper, we proposed intrusion detection system which can detect neighbor attack in RPL protocol and a secure root process to prevent the effect of attack on this protocol. The IDS is incorporated by considering location information and received signal strength to identify malicious node. We have also incorporated secure root process which can rectify disruption in routing path after detecting attacks. This method can act as an optimum method for resources constrained environment.

Cite this Research Publication : A. Thomas, Dr. Gireesh K. T., and Ashok Kumar Mohan, “Neighbor Attack Detection in Internet of Things”, in Advanced Computational and Communication Paradigms, Singapore, 2018.

Admissions Apply Now