DocumentCode :
694639
Title :
Topology Authentication in RPL
Author :
Landsmann, Martin ; Wahlisch, Matthias ; Schmidt, Ted
Author_Institution :
Heiner Perrey, Osman Ugus HAW Hamburg, Hamburg, Germany
fYear :
2013
fDate :
14-19 April 2013
Firstpage :
73
Lastpage :
74
Abstract :
The Routing Protocol for Low-Power and Lossy Networks (RPL) is a proposed standard by the Internet Engineering Task Force (IETF). Although RPL defines basic security modes, it is still subject to topology attacks. VeRA is an authentication scheme which protects against attacks, based on the version number and rank. This work presents two rank attacks which are not mitigated by VeRA. In the first attack, the adversary can decrease its rank arbitrarily. Hence, it can impersonate even the root node. In the second attack, the adversary can decrease its rank to that of any node within its access range. We present an enhancement of VeRA to mitigate the first attack. Additionally, a basic approach for mitigating the second attack is introduced.
Keywords :
authorisation; data protection; message authentication; routing protocols; IETF; Internet Engineering Task Force; RPL; VeRA; access range; attack mitigation; attacks protection; low-power and lossy networks; rank attacks; routing protocol; security modes; topology attacks; topology authentication; Authentication; Ciphers; Encryption; Routing protocols; Topology;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Communications Workshops (INFOCOM WKSHPS), 2013 IEEE Conference on
Conference_Location :
Turin
Print_ISBN :
978-1-4799-0055-8
Type :
conf
DOI :
10.1109/INFCOMW.2013.6970745
Filename :
6970745
Link To Document :
بازگشت