(Downloads - 0)
For more info about our services contact : help@bestpfe.com
Table of contents
1 Introduction
1.1 Context
1.1.1 The Internet of Things
1.1.2 Low Power Lossy Networks and Routing Protocols
1.2 Problem Statement
1.2.1 Security Issues
1.2.2 Addressed Challenges
1.3 Overview of Contributions
2 Routing and Monitoring in RPL-based Internet of Things
2.1 Introduction
2.2 The RPL Protocol
2.2.1 RPL Control Messages
2.2.2 DODAG Building and Maintenance
2.2.3 Loops, Inconsistencies and Repairs
2.2.4 Protocol Security
2.3 Monitoring RPL-based Internet of Things
2.3.1 Active Monitoring
2.3.2 Passive Monitoring
2.3.3 Comparison and Limits
2.4 Conclusions
3 Taxonomy of Attacks in RPL Networks
3.1 Introduction
3.2 Attacks against Resources
3.2.1 Direct Attacks
3.2.2 Indirect Attacks
3.2.3 Analysis
3.3 Attacks on Topology
3.3.1 Sub-optimization Attacks
3.3.2 Isolation Attacks
3.3.3 Analysis
3.4 Attacks on Trac
3.4.1 Eavesdropping Attacks
3.4.2 Misappropriation Attacks
3.4.3 Analysis
3.5 Conclusions
4 Impact Assessment of RPL Attacks
4.1 Introduction
4.2 The DAG Inconsistency Attack
4.2.1 Attack Description
4.2.2 Simulation Setup
4.2.3 Impact Quantication
4.3 The Version Number Attack
4.3.1 Attack Description
4.3.2 Simulation Setup
4.3.3 Impact Quantication
4.4 Conclusions
5 Local Strategy for Addressing DAG Inconsistency Attack
5.1 Introduction
5.2 DAG Inconsistency Attack Mitigation
5.2.1 Default Mitigation
5.2.2 Adaptive Mitigation
5.2.3 Dynamic Mitigation
5.3 Mitigation Evaluation
5.3.1 Simulation Setup
5.3.2 Mitigation Performance
5.3.3 Conguration Parameters Impact
5.3.4 Resource Consumption
5.4 Conclusions
6 Security-oriented Distributed Monitoring Architecture
6.1 Introduction
6.2 Proposed Architecture
6.2.1 Overview and Components
6.2.2 RPL-based Mechanisms
6.3 Monitoring Node Placement Formalization
6.4 Detection Modules
6.4.1 DAG Inconsistency Attack
6.4.2 Version Number Attack
6.5 Conclusions
7 Architecture Evaluation
7.1 Introduction
7.2 Overhearing Evaluation
7.2.1 Simulation Setup
7.2.2 Performance Analysis
7.2.3 Cost Analysis
7.3 Detection Modules Evaluation
7.3.1 DAG Inconsistency Attack
7.3.2 Version Number Attack
7.4 Scalability Evaluation
7.5 Conclusions
8 General Conclusions
8.1 Achievements
8.2 Perspectives
Publications
Résumé de la thèse en français
1 Introduction
2 Protocole de routage RPL
3 Taxonomie des attaques contre le protocole RPL
4 Analyse d’attaques visant le protocole RPL
4.1 Attaque d’incohérence DAG
4.2 Attaque sur le numéro de version
5 Détection locale d’attaques d’incohérence DAG
6 Architecture de supervision distribuée pour la sécurité
7 Évaluation de l’architecture
8 Conclusions
Bibliography



