Securing the Internet of Things (IoT) environment is a challenge owing to the constituent resource-constrained Low Power and Lossy Networks (LLNs). The large scale and constrained nature of IoT-LLNs pose specific routing requirements fulfilled by the IPv6 Routing Protocol for Low Power and Lossy Network (RPL). However, recent attacks in the IoT environment demonstrate that malicious nodes instigate several attacks by exploiting the underlying routing protocol’s vulnerabilities. Such routing attacks degrade network performance, deplete the constrained network resources, and disrupt data traffic. The workshop aims to introduce the audience to the problem of security threats posed by routing attacks in the IoT environment. The workshop will demonstrate how attackers can exploit vulnerabilities of the underlying routing protocols to instigate several attacks in the IoT environment. The workshop also aims to introduce the audience to technology and frameworks that can predict routing attack scenarios in real-time and identify the attack sources to secure the IoT environment.
Motivation and Objectives
Security, privacy, and trust management are critical to IoT’s success and to reap the benefits that IoT brings to organizations, businesses, enterprises in particular, and our day-to-day life in general. With recent reports of IoT attacks using simple home routers and IoT devices, it is evident that vulnerabilities of routing protocols in IoT are alarming. Such attacks often lead to Distributed Denial of Service, degrading network performance and depleting the constrained network resources. In this workshop, we intend to explain the problem of routing attacks in the IoT environment. We will touch upon various routing protocols that can be used in the IoT environment. However, we will lay specific focus on the IPv6 Routing Protocols for Low Power and Lossy Networks (RPL). The workshop will introduce the problem of routing security in the IoT environment along three different dimensions, namely, vulnerability assessment, development of attack detection mechanisms, and enhancing the efficiency of the routing process to reduce the security risk associated.
The main objectives of the workshop are as follows
- To brief upon ways in which one can explore the vulnerabilities of routing protocol. To demonstrate the use of tools like Attack graph and Mind Map for analyzing collaborative attacks scenarios.
- To introduce various statistical techniques, machine learning, and deep learning algorithms to devise mechanisms capable of efficiently analyzing the health of the IoT network.
- To present ways in which security mechanisms can use blockchain technology and smart contract in reducing the risk associated with routing attacks.
- To introduce the concept of incrementally developing a holistic framework for routing security in the IoT environment.
- Dr. Rashmi Sahay, Assistant Professor and Coordinator, Dept. of Computer Science and Engineering, IcfaiTech (Faculty of Science and Technology), IFHE, Hyderabad.
- Prof G. Geethakumari, Associate Professor and the Head of Department, Dept. of Computer Science and Information Systems, BITS Pilani, Hyderabad Campus.