Design Of Intrusion Detection System For Dos Attack In 6lowpan And RPL Based IoT Network
Snehal Deshmukh-Bhosale1, S. S. Sonavane2
1Ms. Snehal Deshmukh-Bhosale, Research Scholar, Raisoni College of Engg. And Management, Pune, Asst. Professor, RMD Sinhgad School of Engg, Warje, Pune., India.
2Dr. S. S. Sonavane, Dean R&D and Professor (E&TC), Indira College of Engineering & Management, Parandwadi, Pune, , Maharashtra, India
Manuscript received on 28 August 2019. | Revised Manuscript received on 02 September 2019. | Manuscript published on 30 September 2019. | PP: 3840-3844 | Volume-8 Issue-11, September 2019. | Retrieval Number: K22880981119/2019©BEIESP | DOI: 10.35940/ijitee.K2288.0981119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Internet of Things (IoT) is a network spread globally and accommodates maximum things under it. All these things are connected globally using IPv6 protocol which satisfies the need of connecting maximum devices by supporting 2^128 addresses. Because of heavy-weight nature of IPv6 protocol, a compressed version of it known as IPv6 Low Power Personal Area Network (6LoWPAN) protocol is used for a resource-constrained network that communicates over low power and lossy links. In IoT, devices are resource-constrained in terms of low battery power, less processing power, less transceiver power, etc. Also these devices are directly connected to insecure internet hence it is very challenging to maintain security in IoT network. In this paper, we have discussed various attacks on 6LoWPAN and RPL network along with countermeasures to reduce the attacks. DoS attack is one of the severe attacks in IoT which has various patterns of execution. Out of various attacks we have designed Intrusion Detection System (IDS) for Denial of Service (DOS) attack detection using Contiki OS and Cooja simulator.
Keywords: IoT, 6LoWPAN, RPL, Contiki, Cooja, IDS, DoS Attack
Scope of the Article: Internet of Things (IoT) & IoE & Edge Computing