Computer Systems & Telematics Embedded Sensor Boards

Abstract

Heiner Perrey, Martin Landsmann, Osman Ugus, Matthias Wählisch, Thomas C. Schmidt,
TRAIL: Topology Authentication in RPL,
In: Proc. of ACM International Conference on Embedded Wireless Systems and Networks (EWSN), pp. 59--64, New York, NY, USA:ACM, 2016.
[pdf][BibTeX][abstract]

Abstract: The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was recently introduced as the new routing standard for the Internet of Things. Although RPL defines basic security modes, it remains vulnerable to topological attacks which facilitate blackholing, interception, and resource exhaustion. We are concerned with analyzing the corresponding threats and protecting future RPL deployments from such attacks. In this paper, we derive and evaluate TRAIL, a generic scheme for topology authentication in RPL. TRAIL solely relies on the basic assumptions of RPL that (1) the root node serves as a trust anchor and (2) each node interconnects to the root as part of a hierarchy. Using proper reachability tests, TRAIL scalably and reliably identifies any topological attacker with little cryptographic efforts.

Themes: Network Security, Mobile Ad Hoc Networking, Internet of Things

 


This page generated by bibTOhtml on Fr 21. Jul 21:10:11 CEST 2023