Home
Author Guide
Editor Guide
Reviewer Guide
Special Issues
Special Issue Introduction
Special Issues List
Topics
Published Issues
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2010
2009
2008
2007
2006
journal menu
Aims and Scope
Editorial Board
Indexing Service
Article Processing Charge
Open Access Policy
Publication Ethics
Digital Preservation Policy
Editorial Process
Subscription
Contact Us
General Information
ISSN:
1796-2021 (Online); 2374-4367 (Print)
Abbreviated Title:
J. Commun.
Frequency:
Monthly
DOI:
10.12720/jcm
Abstracting/Indexing:
Scopus
;
DBLP
;
CrossRef
,
EBSCO
,
Google Scholar
;
CNKI,
etc.
E-mail questions
or comments to
editor@jocm.us
Acceptance Rate:
27%
APC:
800 USD
Average Days to Accept:
88 days
3.4
2023
CiteScore
51st percentile
Powered by
Article Metrics in Dimensions
Editor-in-Chief
Prof. Maode Ma
College of Engineering, Qatar University, Doha, Qatar
I'm very happy and honored to take on the position of editor-in-chief of JCM, which is a high-quality journal with potential and I'll try my every effort to bring JCM to a next level...
[Read More]
What's New
2024-10-16
Vol. 19, No. 10 has been published online!
2024-08-20
Vol. 19, No. 8 has been published online!
2024-07-22
Vol. 19, No. 7 has been published online!
Home
>
Published Issues
>
2018
>
Volume 13, No. 5, May 2018
>
Hybrid Monitoring Technique for Detecting Abnormal Behaviour in RPL-Based Network
Mahmood Alzubaidi, Mohammed Anbar, Yung-Wey Chong, and Shadi Al-Sarawi
National Advanced IPv6 Center Universiti Sains Malaysia, 11800 USM, Penang, Malaysia
Abstract—Internet Protocol version 6 (IPv6) over Low Power Wireless Personal Area Networks (6LoWPAN) is extensively used in Wireless Sensor Networks (WSNs) due to its ability to transmit IPv6 packet with low bandwidth and limited resources. 6LoWPAN has several operations in each layer. Most existing security challenges are focused on the network layer, which is represented by its routing protocol for low- power and lossy network (RPL). The 6LoWPAN with its Routing Protocol (RPL) usually uses nodes that have constrained resources (memory, power, processor). In addition, RPL messages are exchanged among network nodes without using any message authentication mechanism. Therefore, the RPL exposes to various attacks that may lead to network disrupt. A sinkhole attack is one of the attacks that is utilizing the vulnerabilities in RPL and attract considerable traffic by advertising falsified information data that change the routing preference for other nodes. This paper intents to propose a hybrid monitoring technique for detecting abnormal behaviour in RPL -based network. The proposed technique is evaluated using Cooja simulator in term of power consumption and detection accuracy. Also, the proposed technique was compared with other popular detection mechanisms.
Index Terms—Internet of things, intrusion detection system, sinkhole attack, WSN, RPL, 6LoWPAN
Cite: Mahmood Alzubaidi, Mohammed Anbar, Yung-Wey Chong, and Shadi Al-Sarawi, "Hybrid Monitoring Technique for Detecting Abnormal Behaviour in RPL-Based Network," Journal of Communications, vol. 13, no. 5, pp. 198-208, 2018. Doi: 10.12720/jcm.13.5.198-208.
1-SA1028-JCM
PREVIOUS PAPER
First page
NEXT PAPER
Future Controller Design and Implementation Trends in Software Defined Networking