A Study on Detection and Detour Methods against Packet Dropping Attacks in IPv6-based IoT

Sooyeon Shin1, Seulgi Kim1, Jaewoo Choi2, and Taekyoung Kwon1+
 

1Yonsei University, Seoul, 03722, Republic of Korea

shinsy80@gmail.com, ksg0131@yonsei.ac.kr, taekyoung@yonsei.ac.kr

2Korea Internet & Security Agency, Seoul, 05717, Republic of Korea

jw.choi@kisa.or.kr

 

Abstract

In this paper, we propose new detection and detour methods against packet drop attacks for availability in the Internet of Things (IoT) based on the IEEE 802.15.4e and RPL protocol standards that employ IPv6. We consider the rank value of RPL and the consecutive packet drops to improve the detection metrics, and also take into account the use of both sibling and child nodes on a RPL routing path to construct the detour method. Our simulation results show that the proposed detection method is faster than the previous results, and the detour method improves the detour success rate.

Keywords: Internet of Things, Malicious Packet Dropping Detection, Detour method, IPv6, RPL

 

+: Corresponding author: Taekyoung Kwon
Graduate School of Information, Yonsei University, 50 Yonsei-ro Seodaemun-gu, Seoul, 03722,

Republic of Korea, Tel: +82-2-2123-4523

IT Convergence Practice (INPRA), Vol. 4, No. 3, pp. 20-27, September 2016 [pdf]