Abstract:
Internet of Things (IoT) is defined as the inter-connectivity of interrelated computing
devices, mechanical and digital machines, smart objects, animals and/or people through
the internet. Each "thing" is provided a unique identifier (UID) and the ability to transfer
data automatically over a network. If IoT devices have not been well protected, allowing
them to connect to the internet opens them up to a number of serious vulnerabilities. In
addition to their connectivity to the internet, due to the limitations of resources
communication range, processing capability & battery power, IoT devices are vulnerable
to many types of attacks at different layers. IoT network layer uses Routing Protocol for
Low Power and Lossy Network (RPL), which is designed for tiny devices with limited
resources. However, this protocol is exposed to a large variety of attacks, which can
significantly affect the network resources and its performance. Hello Flooding is one of the
known RPL based IoT networks attacks. In this paper we implemented RPL based Hello
Flooding attack early detection, which is efficient for resource constrained IoT devices
using DIO interval minimum parameter. We used the default DIO interval minimum value
as a threshold. The algorithm successfully detected the malicious packet and rejected it.
The efficiency of the result was evaluated by average power consumption, which is taken
from three scenario: (1) Simulation without any attack, (2) Simulation with attack and (3)
Simulation with attack detection algorithm.