Mitigating Suppression Attack in Multicast Protocol for Low Power and Lossy Networks

Cong Pu, Xitong Zhou, Sunho Lim

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

With increasingly prevalent wireless sensors and devices, low power and lossy networks (LLNs) play an essential role in the realization of ubiquitous computing and communication infrastructure, which in turn, leads to enhanced data accessibility and availability. A multicast protocol for LLNs, also referred to as MPL, has been standardized to provide both efficient and reliable communication. Due to the shared wireless medium, lack of tamper resistance, and inherent resource constraints, MPLbased LLNs are vulnerable to various Denial-of-Service attacks. In this paper, we propose a heuristic-based detection scheme, called HED, against the suppression attack in MPL-based LLNs, where a malicious node multicasts a series of spoof data messages with continuous sequence numbers to prevent normal nodes from accepting valid data messages and cause them to delete cached data messages. The simulation results show that the proposed scheme is a viable approach against suppression attack.

Original languageEnglish
Title of host publication43rd IEEE Conference on Local Computer Networks, LCN 2018
PublisherIEEE Computer Society
Pages251-254
Number of pages4
ISBN (Electronic)9781538644133
DOIs
StatePublished - Feb 8 2019
Event43rd IEEE Conference on Local Computer Networks, LCN 2018 - Chicago, United States
Duration: Oct 1 2018Oct 4 2018

Publication series

NameProceedings - Conference on Local Computer Networks, LCN
Volume2018-October

Conference

Conference43rd IEEE Conference on Local Computer Networks, LCN 2018
CountryUnited States
CityChicago
Period10/1/1810/4/18

Keywords

  • Denial-of-Service attack
  • low power and lossy networks
  • multicast protocol
  • suppression attack

Fingerprint Dive into the research topics of 'Mitigating Suppression Attack in Multicast Protocol for Low Power and Lossy Networks'. Together they form a unique fingerprint.

Cite this