Abstract
The concept of Internet of Things involves the deployment of Low power and Lossy Networks (LLN) allowing communications amongst pervasive devices such as embedded sensors. A dedicated routing protocol called RPL has been designed to consider the constraints of these LLN networks. However, the RPL protocol remains exposed to many security attacks that can be very costly in time and energy. In this paper, we propose to exploit risk management methods and techniques to evaluate the potentiality of attacks and to dynamically reduce the exposure of the RPL protocol while minimizing resources consumption.
References
Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J., Alexander, R.: RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. Request for Comments 6550 (Proposed Standard). IETF (2012)
Tsao, T., Alexander, R., Dohler, M., Daza, V., Lozano, A.: Security Framework for Routing over Low power and Lossy Networks, IETF Requirement Draft for Routing over Low power and Lossy Networks (ROLL) (2012) (work in progress)
Gaddour, O., Koubâa, A.: RPL in a Nutshell: a Survey. Elsevier Journal Computer Networks (2012)
Boumessouer, M., Chrisment, I., Frikha, M.: Analysis of Vulnerabilities and Attacks in the RPL Routing Protocol, in French, Master Thesis Report, Supcom Engineering School (July 2012)
NIST: An Introduction to Computer Security: The NIST Handbook (1995)
Dabbebi, O., Badonnel, R., Festor, O.: Managing Risks at Runtime in VoIP Networks and Services. In: Stiller, B., De Turck, F. (eds.) AIMS 2010. LNCS, vol. 6155, pp. 89–92. Springer, Heidelberg (2010)
Bedford, T., Cooke, R.: Probabilistic Risk Analysis: Foundations and Methods. Cambridge University Press (2001)
Gehani, A., Kedem, G.: RheoStat: Real-Time Risk Management. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 296–314. Springer, Heidelberg (2004)
Xie, W., Goyal, M., Hosseini, H., Martocci, J., Bashir, Y., Baccelli, E., Durresi, A.: Routing Loops in DAG-Based Low Power and Lossy Networks. In: Proc. of the 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010. IEEE Computer Society, Washington (2010)
Bartolozzi, L., Pecorella, T., Fantacci, R.: ns-3 RPL Module: IPv6 Routing Protocol for Low Power and Lossy Networks. In: Proc. of the 5th International Conference on Simulation Tools and Techniques, SIMUTOOLS 2012 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Mayzaud, A., Badonnel, R., Chrisment, I. (2013). Monitoring and Security for the Internet of Things. In: Doyen, G., Waldburger, M., Čeleda, P., Sperotto, A., Stiller, B. (eds) Emerging Management Mechanisms for the Future Internet. AIMS 2013. Lecture Notes in Computer Science, vol 7943. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38998-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-38998-6_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38997-9
Online ISBN: 978-3-642-38998-6
eBook Packages: Computer ScienceComputer Science (R0)