z-logo
open-access-imgOpen Access
A Trust-based Defence Scheme for Mitigating Blackhole and Selective Forwarding Attacks in the RPL Routing Protocol
Author(s) -
David Airehrour,
Jairo Guttierrez,
Sayan Kumar Ray
Publication year - 2018
Publication title -
journal of telecommunications and the digital economy
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.202
H-Index - 6
ISSN - 2203-1693
DOI - 10.18080/jtde.v6n1.138
Subject(s) - testbed , routing protocol , computer science , computer network , protocol (science) , routing (electronic design automation) , enhanced interior gateway routing protocol , ip forwarding , zone routing protocol , wireless routing protocol , distributed computing , link state routing protocol , medicine , alternative medicine , pathology
The routing protocol for low-power and lossy networks (RPL) has gained prominence as the standard IoT routing protocol. However, it faces like many other routing protocols diverse attacks. Many studies have been proposed to secure the RPL protocol, and simulation studies have been put forward as the main research method, while testbed experiments, though an authentic research and testing method, have been ignored. Although testbed experiments and simulation studies have their strengths and limitations, testbed techniques could be used as a verifiable validation method for simulation studies. This study is a follow up research work to validate our simulation study, which addressed Blackhole attacks in the RPL routing protocol. In addition, Selective Forwarding attacks are also addressed. It implements a testbed while embedding our Trust-based RPL protocol and the standard RPL protocol in a smart environment configuration. Based on the test experiments, we provide a proof-of-concept of the validity of our claim that our Trust-based RPL protocol provides a comprehensive defence (simulation and testbed) against Blackhole and Selective Forwarding attacks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here