2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems 2011
DOI: 10.1109/mass.2011.76
|View full text |Cite
|
Sign up to set email alerts
|

VeRA - Version Number and Rank Authentication in RPL

Abstract: Abstract-Designing a routing protocol for large low-power and lossy networks (LLNs), consisting of thousands of constrained nodes and unreliable links, presents new challenges. The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL), have been developed by the IETF ROLL Working Group as a preferred routing protocol to provide IPv6 routing functionality in LLNs. RPL provides path diversity by building and maintaining directed acyclic graphs (DAG) rooted at one (or more) gateway. However, an adversary t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
119
0
2

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 192 publications
(121 citation statements)
references
References 19 publications
0
119
0
2
Order By: Relevance
“…On the other side, in the case of rank attack an adversary can attract the large traffic by advertising false rank value, so non-optimal routes might be established. Solutions to address this problem are given in [60] and [61].…”
Section: B Security and Attacks In Rplmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other side, in the case of rank attack an adversary can attract the large traffic by advertising false rank value, so non-optimal routes might be established. Solutions to address this problem are given in [60] and [61].…”
Section: B Security and Attacks In Rplmentioning
confidence: 99%
“…Separate keys for network segments [48] PS The solution was not implemented/simulated yet; Merkel trees authentication [54] PS Node uses a key to encrypt its messages; High jitter and E2E delay until tree has been established; Graph theoretic approach [55] PS Cryptographic techniques based on local broadcast keys; Low overhead, no synchronization needed; Sybil attack, Clone ID Distributed hash tables (DHT) to store the graphical location of nodes [48], [56] PS Problem in how to securely verify the node location; Might not scale well with large networks; DAG/DAO inconsistency attack Limit the rate of tickle timer resets [57] PS Threshold value is fixed, no network or node characteristics are taken into account; Adaptive threshold [58] PS Takes into account the network characteristics; Dynamic approach [59] PS Improved version as node specific parameters are used; Rank attack VeRa [60] PS Authentication mechanism based on hash operations; Low time overhead, but still vulnerable to rank attacks by forgery and replay; TRAIL [61] PS Improvement of VeRa, requires almost no cryptography, but shows dependency on network sizes; choose to selectively forward data or drop all received packets. In both scenarios the network operation would be disturbed.…”
Section: Psmentioning
confidence: 99%
“…In this section, readers can find the studies which either propose a security solution or mitigate the effect of the attacks. Dvir et al proposed VeRA [16], a security solution for the crucial version number and rank parameters carried in DIO messages in 2011. Their solution makes use of hash chains and message authentication codes in order to securely exchange these RPL parameters in DIO messages.…”
Section: Mitigation Systems and Protocol Security Solutions For Intermentioning
confidence: 99%
“…Version number attacks have also been suggested previously [12,13], but their effects have not been analyzed to understand whether it would be prudent to mitigate such attacks or not. The Version Number and Rank Authentication (VeRA) [13] approach provides integrity of version numbers and ranks advertised in control messages via hash and signature operations.…”
Section: Related Workmentioning
confidence: 99%
“…The Version Number and Rank Authentication (VeRA) [13] approach provides integrity of version numbers and ranks advertised in control messages via hash and signature operations. Their approach is not only shown to be faulty by the authors of [14], but another mechanism called TRAIL that uses the root as a trust anchor and monotonically increases node ranks is also proposed by them.…”
Section: Related Workmentioning
confidence: 99%