TRAIL: Topology Authentication in RPL

@inproceedings{Perrey2016TRAILTA,
  title={TRAIL: Topology Authentication in RPL},
  author={Heiner Perrey and Martin Landsmann and Osman Ugus and Thomas C. Schmidt and Matthias W{\"a}hlisch},
  booktitle={EWSN},
  year={2016}
}
The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was recently introduced as the new routing standard for the Internet of Things. Although RPL defines basic security modes, it remains vulnerable to topological attacks which facilitate blackholing, interception, and resource exhaustion. We are concerned with analyzing the corresponding threats and protecting future RPL deployments from such attacks. In this paper, we derive and evaluate TRAIL, a generic scheme for topology… CONTINUE READING
Highly Cited
This paper has 31 citations. REVIEW CITATIONS
Related Discussions
This paper has been referenced on Twitter 1 time. VIEW TWEETS

Citations

Publications citing this paper.
Showing 1-10 of 20 extracted citations

Secure routing for internet of things: A survey

J. Network and Computer Applications • 2016
View 5 Excerpts
Highly Influenced

A comparative study on RPL attacks and security solutions

2017 International Conference on Intelligent Computing and Control (I2C2) • 2017
View 10 Excerpts
Highly Influenced

Review on mechanisms for detecting sinkhole attacks on RPLs

2017 8th International Conference on Information Technology (ICIT) • 2017
View 6 Excerpts
Highly Influenced

A survey: Attacks on RPL and 6LoWPAN in IoT

2015 International Conference on Pervasive Computing (ICPC) • 2015
View 7 Excerpts
Highly Influenced

Implementation of a wormhole attack against a rpl network: Challenges and effects

2018 14th Annual Conference on Wireless On-demand Network Systems and Services (WONS) • 2018
View 1 Excerpt

Secure Routing for MANET Connected Internet of Things Systems

2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud) • 2018

ARM: A hybrid specification-based intrusion detection system for rank attacks in 6TiSCH networks

2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) • 2017
View 2 Excerpts

References

Publications referenced by this paper.
Showing 1-10 of 18 references

VeRA - Version Number and Rank Authentication in RPL

2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems • 2011
View 11 Excerpts
Highly Influenced

Concept and Design of the Hybrid Distributed Embedded Systems Testbed

Mesut Güne
2008
View 4 Excerpts
Highly Influenced

RIOT OS: Towards an OS for the Internet of Things

2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) • 2013
View 1 Excerpt

Similar Papers

Loading similar papers…