Visible to the public A L-IDS against Dropping Attack to Secure and Improve RPL Performance in WSN Aided IoT

TitleA L-IDS against Dropping Attack to Secure and Improve RPL Performance in WSN Aided IoT
Publication TypeConference Paper
Year of Publication2020
AuthorsSoni, G., Sudhakar, R.
Conference Name2020 7th International Conference on Signal Processing and Integrated Networks (SPIN)
Date PublishedFeb. 2020
ISBN Number978-1-7281-5475-6
KeywordsBlack hole attackers, Blackhole attack, composability, computer network security, count data, data packets, destination data delivery, exchange data routing, expected IDS, IDS, Internet of Things, IoT, IP networks, L-IDs, L-IDS procedure, LHV value, Link Hop Value-based Intrusion Detection System, network performance, network reliability, Peer-to-peer computing, pubcrawl, resilience, Resiliency, Routing, routing loops, Routing Protocol, Routing protocols, RPL performance, RPL Routing, RPL routing security scheme, security, sensor devices, sensor nodes, telecommunication network topology, wireless link, Wireless sensor networks, WSN

In the Internet of Things (IoT), it is feasible to interconnect networks of different devices and all these different devices, such as smartphones, sensor devices, and vehicles, are controlled according to a particular user. These different devices are delivered and accept the information on the network. This thing is to motivate us to do work on IoT and the devices used are sensor nodes. The validation of data delivery completely depends on the checks of count data forwarding in each node. In this research, we propose the Link Hop Value-based Intrusion Detection System (L-IDS) against the blackhole attack in the IoT with the assist of WSN. The sensor nodes are connected to other nodes through the wireless link and exchange data routing, as well as data packets. The LHV value is identified as the attacker's presence by integrating the data delivery in each hop. The LHV is always equivalent to the Actual Value (AV). The RPL routing protocol is used IPv6 to address the concept of routing. The Routing procedure is interrupted by an attacker by creating routing loops. The performance of the proposed L-IDS is compared to the RPL routing security scheme based on existing trust. The proposed L-IDS procedure is validating the presence of the attacker at every source to destination data delivery. and also disables the presence of the attacker in the network. Network performance provides better results in the existence of a security scheme and also fully represents the inoperative presence of black hole attackers in the network. Performance metrics show better results in the presence of expected IDS and improve network reliability.

Citation Keysoni_l-ids_2020