Attacks in RPL and Detection Technique used for Internet of Things
M.V.R Jyothisree1, S. Sreekanth2
1M.V.R Jyothisree, Computer Science Department, Research Scholar, Rayalaseema University, Kurnool, Andhra Pradesh, India.
2Dr. S. Sreekanth, Dept. CSE, JNTU A / SITAMS, Ananthapur, Andhra Pradesh, India.

Manuscript received on 05 April 2019 | Revised Manuscript received on 10 May 2019 | Manuscript published on 30 May 2019 | PP: 1876-1879 | Volume-8 Issue-1, May 2019 | Retrieval Number: A1257058119/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In IoT, the devices are connected through the Internet and controlled from any remote areas. Before the advent of IoT, the interaction between the users was only through the internet. By 2020 there will be 75.4 billion devices interconnected through the internet. Machine-to-machine (M2M) interaction is achieved by sending and receiving the information, such as room temperature, humidity etc. IoT can be viewed as heterogeneous networks that bring some security challenges like network privacy problems, confidentiality, integrity and availability. In IoT, we have Routing Protocol for Low-Power and Lossy networks (RPL). RPL is a light-weight protocol which has a good routing functionality, context aware and it supports dynamic topology but has only the basic security functionality. This paper elaborates on attacks in Routing Protocol for Low Power and Lossy networks (RPL) and its implementation using Cooja simulation methodologyand in Contiki operating system. Blackhole and version number attack are the most vulnerable security attacks based on routing of data in IoT networks. We proposed a common prevention technique to overcome those attacks based on the measurements of throughput, packet delay and packet delivery ratio values. The results show that our proposed detection technique is very secure from both the attacks. This technique can be used in real time applications like smart living, smart mobility and smart environment etc.
Index Terms: Internet of Things, RPL, M2M, RPL security, Low Power and Lossy Networks, Confidentiality, integrity, availability, Attacks, Contiki OS / Cooja Simulator.

Scope of the Article:
Internet of Things