DC FieldValueLanguage
dc.contributor.authorPerrey, Heiner-
dc.contributor.authorLandsmann, Martin-
dc.contributor.authorUgus, Osman-
dc.contributor.authorWählisch, Matthias-
dc.contributor.authorSchmidt, Thomas C.-
dc.date.accessioned2020-08-26T12:20:40Z-
dc.date.available2020-08-26T12:20:40Z-
dc.date.issued2016-
dc.identifier.isbn978-0-9949886-0-7en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12738/4088-
dc.description.abstractThe IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was recently introduced as the new routing standard for the Internet of Things. Although RPL defines basic security modes, it remains vulnerable to topological attacks which facilitate blackholing, interception, and resource exhaustion. We are concerned with analyzing the corresponding threats and protecting future RPL deployments from such attacks. Our contributions are twofold. First, we analyze the state of the art, in particular the protective scheme VeRA and present two new rank order attacks as well as extensions to mitigate them. Second, we derive and evaluate TRAIL, a generic scheme for topology authentication in RPL. TRAIL solely relies on the basic assumptions of RPL that (1) the root node serves as a trust anchor and (2) each node interconnects to the root as part of a hierarchy. Using proper reachability tests, TRAIL scalably and reliably identifies any topological attacker without strong cryptographic efforts.en
dc.language.isoenen_US
dc.publisherJunction Publishingen_US
dc.subjectIoTen_US
dc.subjectrouting securityen_US
dc.subjectmobile securityen_US
dc.subjectperformanceen_US
dc.subject.ddc004: Informatiken_US
dc.titleTRAIL: Topology Authentication in RPLen
dc.typeinProceedingsen_US
dc.relation.conferenceInternational Conference on Embedded Wireless Systems and Networks 2016en_US
dc.description.versionPeerRevieweden_US
local.contributorPerson.editorRömer, Kay-
local.contributorPerson.editorLangendoen, Koen-
local.contributorPerson.editorVoigt, Thiemo-
tuhh.container.endpage64en_US
tuhh.container.startpage59en_US
tuhh.oai.showtrueen_US
tuhh.publication.instituteDepartment Informatiken_US
tuhh.publication.instituteFakultät Technik und Informatiken_US
tuhh.publisher.doi10.48550/arXiv.1312.0984-
tuhh.publisher.urlhttps://dl.acm.org/doi/10.5555/2893711.2893721-
tuhh.relation.ispartofseriesProceedings of the 2016 International Conference on Embedded Wireless Systems and Networksen_US
tuhh.type.opusInProceedings (Aufsatz / Paper einer Konferenz etc.)-
dc.type.casraiConference Paper-
dc.type.dinicontributionToPeriodical-
dc.type.drivercontributionToPeriodical-
dc.type.statusinfo:eu-repo/semantics/publishedVersionen_US
dcterms.DCMITypeText-
local.comment.externalPreprint: https://doi.org/10.48550/arXiv.1312.0984. Verlagsversion: https://dl.acm.org/doi/10.5555/2893711.2893721.en_US
item.languageiso639-1en-
item.fulltextNo Fulltext-
item.creatorGNDPerrey, Heiner-
item.creatorGNDLandsmann, Martin-
item.creatorGNDUgus, Osman-
item.creatorGNDWählisch, Matthias-
item.creatorGNDSchmidt, Thomas C.-
item.tuhhseriesidProceedings of the 2016 International Conference on Embedded Wireless Systems and Networks-
item.openairetypeinProceedings-
item.grantfulltextnone-
item.creatorOrcidPerrey, Heiner-
item.creatorOrcidLandsmann, Martin-
item.creatorOrcidUgus, Osman-
item.creatorOrcidWählisch, Matthias-
item.creatorOrcidSchmidt, Thomas C.-
item.seriesrefProceedings of the 2016 International Conference on Embedded Wireless Systems and Networks-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_5794-
crisitem.author.deptDepartment Informatik-
crisitem.author.orcid0000-0002-0956-7885-
crisitem.author.parentorgFakultät Technik und Informatik-
Appears in Collections:Publications without full text
Show simple item record

Page view(s)

107
checked on Jan 13, 2025

Google ScholarTM

Check

HAW Katalog

Check

Add Files to Item

Note about this record


Items in REPOSIT are protected by copyright, with all rights reserved, unless otherwise indicated.