A Secure RPL Rank Computation and Distribution Mechanism for Preventing Sinkhole Attack in IoT-based Systems

Alekha Kumar Mishra, Deepak Puthal, Asis Kumar Tripathy

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Abstract

    The sinkhole attack detection mechanisms that have been reported till date are distributed in nature. Defending a sinkhole attack requires protecting the act of forging the rank computation task. This paper propose a secure centralized mechanism to ensure protection of rank computation process against sinkhole nodes in the IoT-Based Systems. The expectation maximization algorithm is used to optimally cluster the nodes into a group bearing the same rank. The distribution of ranks to the nodes is protected by the signature of the sink. The experimental results show that the optimal rank computation is secure against sinkhole nodes, however requires additional network communication between nodes and the sink node.

    Original languageBritish English
    Title of host publicationIEEE INFOCOM 2023 - Conference on Computer Communications Workshops, INFOCOM WKSHPS 2023
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    ISBN (Electronic)9781665494274
    DOIs
    StatePublished - 2023
    Event2023 IEEE INFOCOM Conference on Computer Communications Workshops, INFOCOM WKSHPS 2023 - Hoboken, United States
    Duration: 20 May 2023 → …

    Publication series

    NameIEEE INFOCOM 2023 - Conference on Computer Communications Workshops, INFOCOM WKSHPS 2023

    Conference

    Conference2023 IEEE INFOCOM Conference on Computer Communications Workshops, INFOCOM WKSHPS 2023
    Country/TerritoryUnited States
    CityHoboken
    Period20/05/23 → …

    Keywords

    • centralized clustering-based rank computation
    • expectation maximization
    • IoT
    • RPL
    • sinkhole attack

    Fingerprint

    Dive into the research topics of 'A Secure RPL Rank Computation and Distribution Mechanism for Preventing Sinkhole Attack in IoT-based Systems'. Together they form a unique fingerprint.

    Cite this