Volume 13, Issue 2 (6-2021)                   itrc 2021, 13(2): 17-28 | Back to browse issues page

XML Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Jahantigh N J, Bakhtiyari Shahri A B S. Intrusion Detection System to Detect Insider Attack on RPL Routing Protocol Based on Destination Advertisement Object. itrc. 2021; 13 (2) :17-28
URL: http://ijict.itrc.ac.ir/article-1-481-en.html
1- Faculty of Electrical and Computer Engineering University of Sistan and Baluchestan Zahedan, Iran
2- Faculty of Electrical and Computer Engineering University of Sistan and Baluchestan Zahedan, Iran , bakhtiyari@ece.usb.ac.ir
Abstract:   (286 Views)
The increasing fascination with the Internet of Things has led to the extensive deployment of Low-power and Lossy Networks. IPv6 Routing Protocol over Low Power and Lossy Networks serves as the ideal routing protocol proposed by IETF for routing in IoT-LLNs. Routing attacks are one of the IoT challenges that can lead to network performance problems and often denial of service. The Destination Advertisement Object (DAO) insider attack is one of the most notable attacks in RPLs, and previous studies have not developed a complete method for its detection so as to separate the malicious node from the normal node. Using an anomaly-based intrusion detection system, this paper suggests three methods based on random, fixed, and dynamic threshold adjustment to prevent DAO insider attack and identify malicious nodes. The results showed that the proposed model has a detection rate of 100% and a very low rate of false alert.
Full-Text [PDF 878 kb]   (138 Downloads)    
Type of Study: Research | Subject: Network

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.