论文标题
在IOT中增强路由安全性:在攻击下对RPL安全模式的性能评估
Enhancing Routing Security in IoT: Performance Evaluation of RPL Secure Mode under Attacks
论文作者
论文摘要
由于低功率和有损网络的路由协议(RPL)成为物联网(IoT)网络路由的标准,因此许多研究人员研究了该协议的安全方面。但是,尚无工作(据我们所知)调查了RPL标准中包含的安全机制的使用,主要是因为在任何IoT操作系统中尚无针对这些功能的实现。最近,针对Contiki操作系统(Perazzo等人)提出了RPL安全机制的部分实施,该机制为我们提供了检查RPL安全机制的机会。在本文中,我们研究了在常见路由攻击下使用RPL安全机制的影响和挑战。首先,在有或没有其安全机制的情况下,在四个路由攻击(黑洞,选择性前向,邻居和虫洞攻击)的情况下进行了比较。该比较是使用两个常用的无线电占用周期协议进行的。其次,基于此比较的观察结果,我们提出了两种可以减少此类攻击影响的技术,而没有增加RPL的安全机制。对这些技术的评估显示,除了虫洞攻击外,在调查的攻击下,RPL的性能提高了。
As the Routing Protocol for Low Power and Lossy Networks (RPL) became the standard for routing in the Internet of Things (IoT) networks, many researchers had investigated the security aspects of this protocol. However, no work (to the best of our knowledge) has investigated the use of the security mechanisms included in RPL standard, mainly because there was no implementation for these features in any IoT operating systems yet. A partial implementation of RPL security mechanisms was presented recently for the Contiki operating system (by Perazzo et al.), which provided us with an opportunity to examine RPL security mechanisms. In this paper, we investigate the effects and challenges of using RPL security mechanisms under common routing attacks. First, a comparison of RPL performance, with and without its security mechanisms, under four routing attacks (Blackhole, Selective-Forward, Neighbor, and Wormhole attacks) is conducted using several metrics (e.g., average data packet delivery rate, average data packet delay, average power consumption, etc.). This comparison is performed using two commonly used Radio Duty-Cycle protocols. Secondly, and based on the observations from this comparison, we propose two techniques that could reduce the effects of such attacks, without having added security mechanisms for RPL. An evaluation of these techniques shows improved performance of RPL under the investigated attacks, except for the Wormhole attack.