RPL Authenticated Mode Evaluation: Authenticated Key Exchange and Network Behavioral

Arif Burak Ordu, Mehmet Bayar, Berna Ors

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) is a standardized routing protocol that can organize thousands of resource constraint routers. Although it is an indispensable protocol with its energy-efficient, scalable, and autonomous structure, it is vulnerable to numerous attacks with its sensitive data and mechanisms. In this paper, we intensely analyzed the standard statements of the authenticated security mode of RPL and designed a comprehensive authenticated key establishment scheme extending the BKE (Bilateral Key Exchange). We formally verified our scheme using the Scyther tool. This study will help researchers contribute more to the authenticated security mode of RPL.

Original languageEnglish
Title of host publicationICUFN 2022 - 13th International Conference on Ubiquitous and Future Networks
PublisherIEEE Computer Society
Pages167-173
Number of pages7
ISBN (Electronic)9781665485500
DOIs
Publication statusPublished - 2022
Event13th International Conference on Ubiquitous and Future Networks, ICUFN 2022 - Virtual, Barcelona, Spain
Duration: 5 Jul 20228 Jul 2022

Publication series

NameInternational Conference on Ubiquitous and Future Networks, ICUFN
Volume2022-July
ISSN (Print)2165-8528
ISSN (Electronic)2165-8536

Conference

Conference13th International Conference on Ubiquitous and Future Networks, ICUFN 2022
Country/TerritorySpain
CityVirtual, Barcelona
Period5/07/228/07/22

Bibliographical note

Publisher Copyright:
© 2022 IEEE.

Keywords

  • 6LoW-PAN
  • authentication
  • IoT
  • RPL
  • security
  • standard

Fingerprint

Dive into the research topics of 'RPL Authenticated Mode Evaluation: Authenticated Key Exchange and Network Behavioral'. Together they form a unique fingerprint.

Cite this