Print Email Facebook Twitter RPL Attack Analysis: Evaluation of a Cryptography-Based Sybil Defence in IEEE 802.15.4 Title RPL Attack Analysis: Evaluation of a Cryptography-Based Sybil Defence in IEEE 802.15.4 Author Stenhuis, Ruben (TU Delft Electrical Engineering, Mathematics and Computer Science) Contributor Lal, C. (mentor) Conti, M. (mentor) Pintea, S. (graduation committee) Degree granting institution Delft University of Technology Programme Computer Science and Engineering Project CSE3000 Research Project Date 2021-07-02 Abstract While the Routing Protocol for Low Power and Lossy Networks (RPL) is built to support the constraints of low-powered devices, it struggles to meet the standards in security. Generally, low-powered devices are challenged with limited cryptography, tough key management, and interoperability issues. Despite these concerns, security is not only deficient for RPL, but proposed mitigations appear untouched as well. This paper therefore contributes a lightweight cryptosystem. It questions and justifies its virtue in a twofold. First, we illustrate the importance of this mitigation with an impactful Sybil attack that enables malicious routing on root level. Second, we construct an attack pattern model and life-cycle to demonstrate the operational capabilities and objectives of the adversary for Internet of Things (IoT) generic attack patterns. The cryptosystem divides IEEE 802.15.4 networks into isolated clusters with key derivation functions. Because the key derivation function adopts spectrum resource measurements, the proposal includes a cooperative defence to validate these measurements of joining nodes. To avoid overhead, the mitigation operates on symmetric-key cryptography, piggybacked cluster identifiers, and Maximum Transmission Unit (MTU) requests to the trusted party that stores encrypted identity keys of member nodes. This mitigation, when combined with the efficient routing of RPL, enables a broad application for smart low-power constrained devices in a scalable IoT network while it protects against Sybil attacks and eavesdropping. Subject RPLIoTRPL AttacksIoT SecurityRouting AttacksSecurity Analysis To reference this document use: http://resolver.tudelft.nl/uuid:f5d8204a-5dec-4a54-a152-e345bb04cc85 Part of collection Student theses Document type bachelor thesis Rights © 2021 Ruben Stenhuis Files PDF Ruben_Stenhuis_Full_Draft_FINAL.pdf 428.92 KB Close viewer /islandora/object/uuid:f5d8204a-5dec-4a54-a152-e345bb04cc85/datastream/OBJ/view