MDPI Contact

MDPI AG
St. Alban-Anlage 66,
4052 Basel, Switzerland
Support contact
Tel. +41 61 683 77 34
Fax: +41 61 302 89 18

For more contact information, see here.

Advanced Search

You can use * to search for partial matches.

Search Results

1 article matched your search query. Search Parameters:
Authors = Kok Keong Chai

Matches by word:

KOK (108) , KEONG (17) , CHAI (176)

View options
order results:
result details:
results per page:
Articles per page View Sort by
Displaying article 1-50 on page 1 of 1.
Export citation of selected articles as:
Open AccessArticle A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology
Information 2016, 7(2), 25; doi:10.3390/info7020025
Received: 1 March 2016 / Revised: 15 April 2016 / Accepted: 5 May 2016 / Published: 12 May 2016
Cited by 2 | Viewed by 684 | PDF Full-text (1597 KB) | HTML Full-text | XML Full-text
Abstract
Routing Protocol for Low power and Lossy network (RPL) topology attacks can downgrade the network performance significantly by disrupting the optimal protocol structure. To detect such threats, we propose a RPL-specification, obtained by a semi-auto profiling technique that constructs a high-level abstract of
[...] Read more.
Routing Protocol for Low power and Lossy network (RPL) topology attacks can downgrade the network performance significantly by disrupting the optimal protocol structure. To detect such threats, we propose a RPL-specification, obtained by a semi-auto profiling technique that constructs a high-level abstract of operations through network simulation traces, to use as reference for verifying the node behaviors. This specification, including all the legitimate protocol states and transitions with corresponding statistics, will be implemented as a set of rules in the intrusion detection agents, in the form of the cluster heads propagated to monitor the whole network. In order to save resources, we set the cluster members to report related information about itself and other neighbors to the cluster head instead of making the head overhearing all the communication. As a result, information about a cluster member will be reported by different neighbors, which allow the cluster head to do cross-check. We propose to record the sequence in RPL Information Object (DIO) and Information Solicitation (DIS) messages to eliminate the synchronized issue created by the delay in transmitting the report, in which the cluster head only does cross-check on information that come from sources with the same sequence. Simulation results show that the proposed Intrusion Detection System (IDS) has a high accuracy rate in detecting RPL topology attacks, while only creating insignificant overhead (about 6.3%) that enable its scalability in large-scale network. Full article
(This article belongs to the Special Issue Preserving Privacy and Security in IoT)
Figures

Figure 1

Years

Subjects

Refine Subjects

Journals

Refine Journals

Article Types

Refine Types

Countries

Refine Countries
Back to Top