Niranjan M MFollow


Multiple companies have developed Field Area Network (FAN) solution for Industrial IoT (IIoT), which is evolving from smart metering (electricity, gas, water) to smart cities. The wireless mesh FAN deployment consists of many Endpoints and tens of Border Routers. Routing Protocol for Low Power and Lossy Networks (LLN) (RPL) [RFC6550] is used in wireless mesh FAN deployments, it is a flexible and open standard. The RPL is a generic Distance Vector protocol that is well suited for low energy Internet of Things (IoT) networks. But it is vulnerable to several forms of attacks such as Physical and Cyber-attacks (eavesdropping, spoofing, false data injection, replay attacks etc.,). The classical approach to mitigate above attacks is to use cryptographic methods to provide authentication, integrity and confidentiality to the information exchanged during the topology discovery and route setup. However, these cryptographic methods are not sufficient to provide trustworthiness between Endpoint and Border Router in FAN deployment. If any of the Endpoint (EP) or Border Router is compromised, i.e., it is no longer a trusted entity, which could pose any of the above attacks listed and can leads to non-secure path (route) selection. The techniques presented herein define method to RPL protocol used in FAN for providing Proof of Integrity during Topology Discovery (RPL) and Route Setup (DAO/P-DAO) messages exchanged between Endpoint and Border Router. Topology discovery and Route setup messages between Endpoints and Border Routers are extended with extensions that carry Proof of Integrity and intent to validate Proof of Integrity.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.