Title :
Evaluating sinkhole defense techniques in RPL networks
Author :
Weekly, Kevin ; Pister, Kris
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Univ. of California Berkeley, Berkeley, CA, USA
fDate :
Oct. 30 2012-Nov. 2 2012
Abstract :
In this work, we present the results of a study on the detrimental effects of sinkhole attacks on Wireless Sensor Networks (WSNs) which employ the Routing Protocol for LLNs (Low-power and Lossy Networks). A sinkhole is a compromised node which attempts to capture traffic with the intent to drop messages, thus degrading the end-to-end delivery performance, that is, reducing the number of messages successfully delivered to their destination. The mechanism by which the sinkhole captures traffic is by advertising an attractive route to its neighbors. We evaluate two countermeasures addressing the sinkhole problem: a parent fail-over and a rank authentication technique. We show via simulation that while each technique, applied alone, does not work all that well, the combination of the two techniques significantly improves the performance of a network under attack. We also demonstrate that, with the defenses described, increasing the density of the network can combat a penetration of sinkholes nodes, without needing to identify the sinkholes.
Keywords :
routing protocols; wireless sensor networks; RPL network; WSN; detrimental effect; end-to-end delivery performance; lossy network; low-power network; parent fail-over technique; rank authentication technique; routing protocol; sinkhole defense technique; wireless sensor network; Authentication; Noise; Routing; Routing protocols; Uncertainty; Wireless sensor networks; Ad hoc networks; Communication system security; Routing protocols;
Conference_Titel :
Network Protocols (ICNP), 2012 20th IEEE International Conference on
Conference_Location :
Austin, TX
Print_ISBN :
978-1-4673-2445-8
Electronic_ISBN :
978-1-4673-2446-5
DOI :
10.1109/ICNP.2012.6459948