Loading...
Please wait, while we are loading the content...
Similar Documents
Security Threats in the Internet of Things: RPL's Attacks and Countermeasures
| Content Provider | Semantic Scholar |
|---|---|
| Author | Medjek, Faiza Tandjaoui, Djamel Romdhani, Imed Djedjig, Nabil |
| Copyright Year | 2018 |
| Abstract | In the internet of things (IoT) vision, people, systems, and objects with sensing and/or actuating capabilities communicate to monitor and control the physical world. Nowadays, the IoT concept has attracted significant attention from different application domain such as healthcare and smart homes. Indeed, self-organization and self-configuration are key characteristics of IoT given that IoT represents a pervasive environment where objects are resource-constrained and communication technologies are very ubiquitous. These characteristics in addition to the vulnerability of objects themselves and of the communication channels make IoT more susceptible to malicious attacks. In this context, a deep analysis of IoT security breach and vulnerabilities is necessary. This chapter presents IoT requirements and existing threats as well as security protocols and mechanisms. It specifically analyzes existing and new threats against the IoT's routing protocol (the routing protocol for low-power and lossy networks: RPL) and presents intrusion detection solutions (IDS) to counter RPL attacks. Security Threats in the Internet of Things: RPL's Attacks and Countermeasures |
| Starting Page | 147 |
| Ending Page | 178 |
| Page Count | 32 |
| File Format | PDF HTM / HTML |
| DOI | 10.4018/978-1-5225-5736-4.ch008 |
| Alternate Webpage(s) | https://www.igi-global.com/viewtitlesample.aspx?id=203786&ptid=192029&t=security+threats+in+the+internet+of+things:+rpl's+attacks+and+countermeasures |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |