Title: svBLOCK: mitigating black hole attack in low-power and lossy networks

Authors: Sonxay Luangoudom; Duc Tran; Tuyen Nguyen; Hai Anh Tran; Giang Nguyen; Quoc Trung Ha

Addresses: Bach Khoa Cybersecurity Centre, Hanoi University of Science and Technology (HUST), Hanoi, 100000, Vietnam ' Bach Khoa Cybersecurity Centre, Hanoi University of Science and Technology (HUST), Hanoi, 100000, Vietnam ' Bach Khoa Cybersecurity Centre, Hanoi University of Science and Technology (HUST), Hanoi, 100000, Vietnam ' School of Information and Communication Technology, Hanoi University of Science and Technology (HUST), Hanoi, 100000, Vietnam ' School of Information and Communication Technology, Hanoi University of Science and Technology (HUST), Hanoi, 100000, Vietnam ' School of Information and Communication Technology, Hanoi University of Science and Technology (HUST), Hanoi, 100000, Vietnam

Abstract: The black hole is one of the well-known attacks that occur in Low power and Lossy Networks (LLNs). This paper presents a novel svBLOCK scheme to handle the black hole problem. svBLOCK is based on SVELTE, a real-time intrusion detection system (IDS) for the Internet of Things to reconstruct the destination oriented directed acyclic graph (DODAG) and validate the node availability. It is also equipped with mechanisms to provide authenticity over its control messages and isolate black holes from the LLNs. svBLOCK is implemented in Contiki OS and is evaluated under various attack scenarios. It demonstrates to achieve 98.5% true positive rate (TPR) at a false negative rate of 3.7%, while improving the packet delivery rate (PDR) by up to 47% with respect to the original SVELTE.

Keywords: IoT; internet of things; IPv6; 6LoWPAN; LLN; RPL; internal threats; network security; black hole attack; authenticated encryption.

DOI: 10.1504/IJSNET.2020.104923

International Journal of Sensor Networks, 2020 Vol.32 No.2, pp.77 - 86

Received: 18 Jul 2019
Accepted: 02 Aug 2019

Published online: 06 Feb 2020 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article