Font Size: a A A

Research And Implementation Of Security Routing Protocol For Internet Of Things Based On RPL

Posted on:2018-12-08Degree:MasterType:Thesis
Country:ChinaCandidate:X LiFull Text:PDF
GTID:2348330518498961Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of communication technology and communication means in recent years,people are no longer limited in the communication between people.They hope to realize the interconnection between people and things as well as the things and things.Then the concept of Internet of Things(Io T)has been proposed.In the Internet of Things,everything in the world is connected to the Internet.They communicate with each other and exchange data.The intelligent devices in Io T have the characteristic of huge-numbered,handoff-intensive,resource-constrained and so on.In order to guarantee the efficiency and safety of the network,making it connect to the traditional network successfully,we need to design the professional routing protocol.For those reasons,the IETF specifically designs a lightweight IPv6 network routing protocol for the Io T—RPL(Routing Protocol for low power Lossy network).RPL can make full use of the energy of intelligent devices and compute the resource to build the flexible topological structure.But the RPL hopes to keep the safety of the network through the route repair mechanism,so it doesn’t consider the security problem when building the net.When the net is attacked,it’s hard to respond promptly.So we need to consider the security problem of RPL routing protocol deeply.In this paper,on the study of the process of building network,we analyze the performance of RPL routing protocol under different routing attacks.Then based on the performance of RPL,we make improvements in the secure aspects and propose the new secure routing protocol.Finally we implement the code and make performance verification.The main work of this paper is what follows:1.This paper studies the development of security routing protocols for Io T.Because of the constrained resource and complex deployment environment,the secure problems come from every aspects.Compared with the traditional network,Io T is more vulnerable to attack.On the basis of safety analysis,the paper summarizes the major factors that the security routing protocol need to consider.2.This paper studies the RPL routing protocol.We study the process of networking,data routing,route maintenance,safety strategies and so on.We specify the RPL’s topology after networking and the technology about RPL networking.The paper studies the type of attacks,simulates the common routing attacks,tests the performance of RPL after attacks,and clarifies the existing security threats of the RPL problem.3.This paper proposes a RPL-based Secure Routing Protocol(M-RPL)for the performance of RPL under attacks.In order to resist common route attacks,the security routing protocol divides the existing topology of the RPL protocol into a hierarchical clustering network model and ensures the arrival rate of the data by establishing a multi-path cross-cluster.4.Set up one piece of hardware and software testing platform.We use the 6Lo WPAN technology and Contiki operating system to form the hardware and software platform.The software platform integrates the smart u IP protocol stack and provides the upper and lower communication interface for RPL.The hardware platform is transplanted with the CC2530 chip produced by Texas Instruments.We transplant the Contiki system to the hardware platform to build the testing platform.Finally we test the network topology,multi-path data communication and attack defense of the M-RPL network.
Keywords/Search Tags:IoT, Security Routing, Resource Constrained, Routing Attack, RPL
PDF Full Text Request
Related items