Learn More
This paper focuses on the security aspect of RPL (Routing Protocol for Low-power and lossy network) by introducing a new type of threat – the topology attack, which changes the node operation for breaking the optimised network topology, and designing a specification-based IDS for detecting it. We present two novel RPL attacks of this type: the rank attack(More)
Deriving value judgements about threat rankings for large and entangled systems, such as those of urban smart grids, is a challenging task. Suitable approaches should account for multiple threat events posed by different classes of attackers who target system components. Given the complexity of the task, a suitable level of guidance for ranking more(More)
Routing Protocol for Low Power and Lossy network (RPL) is the underlying routing protocol of 6LoWPAN standard to enable the integration of Wireless Sensor Network on the Internet. Security is an essential requirement for the protocol/standard to be public accepted. One major security issue of RPL is the non-tamper resistant nature of the wireless sensor(More)
Routing Protocol for Low power and Lossy network (RPL) topology attacks can downgrade the network performance significantly by disrupting the optimal protocol structure. To detect such threats, we propose a RPL-specification, obtained by a semi-auto profiling technique that constructs a high-level abstract of operations through network simulation traces, to(More)
Recent years have seen a number of cyber attacks targeting Industrial Control Systems (ICSs). Reports detailing the findings from such attacks vary in detail. Handson experimental research is, therefore, required to better understand and explore security challenges in ICSs. However, real-world production systems are often offlimits due to the potential(More)
Wireless adhoc network is autonomous and infrastructure less network. Wireless ad hoc network is particularly vulnerable due to its primary characteristics, like open medium, dynamic topology, distributed cooperation, and capability constraint. Routing plays an important role in the security of the entire network. Secure transmission of information in(More)
  • 1