About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Towards new e-Infrastructure and e-Services for Developing Countries. 15th International Conference, AFRICOMM 2023, Bobo-Dioulasso, Burkina Faso, November 23–25, 2023, Proceedings, Part I

Research Article

Blackhole Attack Detection and Countermeasure Solution in RPL

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-81570-6_19,
        author={Fati\'{e} Daoud Idriss Si\^{e}ba and Hamadoun Tall and Amado Illy and Tiguiane Y\^{e}l\^{e}mou},
        title={Blackhole Attack Detection and Countermeasure Solution in RPL},
        proceedings={Towards new e-Infrastructure and e-Services for Developing Countries. 15th International Conference, AFRICOMM 2023, Bobo-Dioulasso, Burkina Faso, November 23--25, 2023, Proceedings, Part I},
        proceedings_a={AFRICOMM},
        year={2025},
        month={2},
        keywords={blackhole attack RPL},
        doi={10.1007/978-3-031-81570-6_19}
    }
    
  • Fatiè Daoud Idriss Siéba
    Hamadoun Tall
    Amado Illy
    Tiguiane Yélémou
    Year: 2025
    Blackhole Attack Detection and Countermeasure Solution in RPL
    AFRICOMM
    Springer
    DOI: 10.1007/978-3-031-81570-6_19
Fatiè Daoud Idriss Siéba, Hamadoun Tall, Amado Illy, Tiguiane Yélémou,*
    *Contact email: tyelemou@gmail.com

    Abstract

    The Routing Protocol for Low-power and lossy networks (RPL) is proposed by the Routing Over Low-power and Lossy Networks (ROLL) team to meet the routing requirements of the Internet of Things. Since its introduction into our daily lives, the Internet of Things (IoT) has led to a considerable increase in the number of devices used for this purpose. Unfortunately, this increase has been accompanied by the emergence of a number of attacks affecting this equipment and network operation. The RPL protocol, for example, is subject to a blackhole attack aimed at isolating part of the network. Effective solutions are struggling to emerge due to the resource constraints of the connected objects used in these networks. In this paper, we present a lightweight and effective method for detecting blackhole attacks by the victim node itself, and propose countermeasures.

    Keywords
    blackhole attack RPL
    Published
    2025-02-12
    Appears in
    SpringerLink
    http://dx.doi.org/10.1007/978-3-031-81570-6_19
    Copyright © 2023–2025 ICST
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL