Loading

A Novel Method for Secure RPL for Resource Based attacks in Internet of Things
P.Silpa Chaitanya1, B.Renuka Devi2, K.Siva Kumar3

1P.Silpa Chaitanya, Asst.professor, Department of Computer Science and Engineering, Vignan’s Nirula Institute of Technology Science and Women, AP, India.
2Dr.B.Renuka Devi, Professor, Department of Computer Science and Engineering, Vignan’s Nirula Institute of Technology Science and Women, AP, India.
3K.Siva Kumar, Assoc.professor, Department of Computer Science and Engineering, Vignan’s Nirula Institute of Technology Science and Women, AP, India.

Manuscript received on November 14, 2019. | Revised Manuscript received on 20 November, 2019. | Manuscript published on December 10, 2019. | PP: 4984-4989 | Volume-9 Issue-2, December 2019. | Retrieval Number: B9074129219/2019©BEIESP | DOI: 10.35940/ijitee.B9074.129219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The Routing protocol for low power lossy networks (RPL) was evolved by IETF by considering various conditions of constrained networks. This protocol was aimed in order to encourage several routing topologies known DODAGs which were built under different objective functions to improve the routing using different routing measures. There were billions of devices which were connected all over the world because of which the security is the major concern of routing in IoT devices, where different attacks takes place during the routing. Variety of attacks happens while routing, some on network topology others on network traffic and some other attacks on network resources. This paper studies about resource based attacks which targets at consuming the energy of node, memory, processing power by making malicious nodes to perform unnecessary processing actions and these attacks also effect the network availability and reduce the lifetime of the topology. This paper introduces an allied nodes follow up technique where some allied nodes are staked in the DODAG topology in order to detect the resource based attacks in RPL like version number, neighbour, worst parent, rank attacks. These allied nodes follow up and monitors each and every node and based on proposed constraints not only detects these resource attacks in RPL and also updates the information to the root node about malicious node in order to eradicate it from DODAG. The performance of proposed model was compared with previous attack detection models regarding to the measures like packet delivery ratio, end to end delay and throughput. 
Keywords: RPL, DODAG, Allied Node, Resource Attacks
Scope of the Article: Internet of Things