[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks

Published: 01 September 2015 Publication History

Abstract

The RPL is a routing protocol for low-power and lossy networks. A malicious node can manipulate header options used by RPL to create topological inconsistencies, thereby causing denial of service attacks, reducing channel availability, increasing control message overhead, and increasing energy consumption at the targeted node and its neighborhood. RPL overcomes these topological inconsistencies via a fixed threshold, upon reaching which all subsequent packets with erroneous header options are ignored. However, this threshold value is arbitrarily chosen, and the performance can be improved by taking into account network characteristics. To address this, we present a mitigation strategy that allows nodes to dynamically adapt against a topological inconsistency attack based on the current network conditions. Results from our experiments show that our approach outperforms the fixed threshold and mitigates these attacks without significant overhead. Copyright © 2015John Wiley & Sons, Ltd.

References

[1]
TWinter, PThubert, ABrandt, JHui, RKelsey, PLevis, KPister, RStruik, JVasseur, and RAlexander. RPL: IPv6 routing protocol for low-power and lossy networks. In IETF RFC 6550, 2012
[2]
TPhinney, PThubert, and RAAssimiti. RPL applicability in industrial networks. IETF I-D <draft-ietf-roll-rpl-industrial-applicability-02&gt;2013.
[3]
ABrandt, EBaccelli, RCragie, and P&lt;familyNamePrefix&gt;van der&lt;/familyNamePrefix&gt;Stok. Applicability statement: the use of the RPL protocol suite in home automation and building control. IETF I-D <draft-ietf-roll-applicability-home-building-06&gt;2014.
[4]
DPopa, MGillmore, LToutain, JHui, RRuben, and KMonden. Applicability statement for the routing protocol for low power and lossy networks RPL in AMI networks. IETF I-D <draft-ietf-roll-applicability-ami-09&gt;2014.
[5]
SSeeber, ASehgal, BStelte, GDRodosek, and JSchönwälder. Towards a trust computing architecture for RPL in cyber physical systems, IFIP/IEEE International Conference on Network and Service Management CNSM, Zürich, Switzerland, 2013; pp.134-137.
[6]
ASehgal, VPerelman, SKuryla, and JSchönwälder, Management of resource constrained devices in the internet of things, IEEE Communications Magazine 2012; Volume 50 Issue 12: pp.144-149.
[7]
JHui, and JVasseur 2012, The routing protocol for low-power and lossy networks RPL option for carrying RPL information in data-plane datagrams. IETF RFC 6553.
[8]
HCLeligou, PTrakadas, SManiatis, PKarkazis, and TZahariadis, Combining trust with location information for routing in wireless sensor networks, Wireless Communications and Mobile Computing 2012; Volume 12 Issue 12: pp.1091-1103.
[9]
PKarkazis, PTrakadas, TZahariadis, AHatziefremidis, and HLeligou. RPL modeling in J-Sim platform. Ninth International Conference on Networked Sensing Systems INSS, Antwerp, Belgium, 2012. pp.1-2.
[10]
TTsao, RAlexander, MDohler, VDaza, ALozano, and MRichardson. A security threat analysis for routing protocol for low-power and lossy networks RPL. IETF I-D <draft-ietf-roll-security-threats-06&gt;2013.
[11]
ADvir, THolczer, and LButtyan. VeRA-version number and rank authentication in RPL. 8th IEEE International Conference on Mobile Adhoc and Sensor Systems MASS, Hangzhou, China, 2011; pp.709-714.
[12]
KChugh, LAboubaker, and JLoo. Case study of a black hole attack on LoWPAN-RPL. Proceedings of the Sixth International Conference on Emerging Security Information, Systems and Technologies SECURWARE, Rome, Italy, 2012; pp.709-714.
[13]
AMayzaud, ASehgal, RBadonnel, IChrisment, and JSchönwälder. A study of RPL DODAG version attacks. Proceedings of AIMS Conference, Brno, Czech Republic, 2014; pp.92-104.
[14]
KWeekly, and KPister. Evaluating sinkhole defense techniques in RPL networks. 20th IEEE International Conference on Network Protocols ICNP, Austin, TX, USA, 2012; pp.1-6.
[15]
ALe, JLoo, ALasebae, AVinel, YChen, and MChai, The impact of rank attack on network topology of routing protocol for low-power and lossy networks, IEEE Sensors Journal 2013; Volume 13 Issue 10: pp.3685-3692.
[16]
ASehgal, AMayzaud, RBadonnel, IChrisment, and JSchönwälder. Addressing DODAG inconsistency attacks in RPL networks. Proceedings of GIIS Conference, Montreal, Canada, 2014; pp.1-8.
[17]
PALevis, NPatel, DCuller, and SShenker. Trickle: a self regulating algorithm for code propagation and maintenance in wireless sensor networks. 1st Symposium on Networked Systems Design and Implementation NSDI, San Francisco, CA, USA, 2004; pp.15-28.
[18]
TClausen, and UHerberg. A comparative performance study of the routing protocols LOAD and RPL with bi-directional traffic in low-power and lossy networks LLN, Master's Thesis, Ecole Polytechnique, Centre de recherche INRIA Saclay, Orsay, France, 2011.
[19]
ADunkels, BGronvall, and TVoigt. Contiki-a lightweight and flexible operating system for tiny networked sensors. 29th Annual IEEE International Conference on Local Computer Networks LCN, Tampa, FL, USA, 2004; pp.455-462.
[20]
FOsterlind, ADunkels, JEriksson, NFinne, and TVoigt. Cross-level sensor network simulation with COOJA. 31st IEEE Conference on Local Computer Networks LCN, Tampa, FL, USA, 2006; pp.641-648.
[21]
SDawans, SDuquennoy, and OBonaventure. On link estimation in dense RPL deployments. 7th IEEE International Workshop on Practical Issues in Building Sensor Network Applications SenseApp, Clearwater, FL, 2012; pp.952-955.
[22]
ASChipcon, CC2420 2.4 GHz IEEE 802.15.4/ZigBee-ready RF transceiver, Oslo, Norway, 2004.
[23]
Texas Instruments, MSP430F1611 mixed signal controller datasheet, 2006.

Cited By

View all
  1. Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Networks
        Networks  Volume 25, Issue 5
        September 2015
        100 pages
        ISSN:0028-3045
        EISSN:1097-0037
        Issue’s Table of Contents

        Publisher

        Wiley-Interscience

        United States

        Publication History

        Published: 01 September 2015

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 05 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)LDES: detector design for version number attack detection using linear temporal logic based on discrete event systemInternational Journal of Information Security10.1007/s10207-023-00665-322:4(961-985)Online publication date: 1-Aug-2023
        • (2023)Security concerns over IoT routing using emerging technologiesTransactions on Emerging Telecommunications Technologies10.1002/ett.479834:7Online publication date: 11-Jul-2023
        • (2022)MFO-RPLComputer Standards & Interfaces10.1016/j.csi.2022.10362282:COnline publication date: 18-May-2022
        • (2021)A Review of Intrusion Detection Systems in RPL Routing Protocol Based on Machine Learning for Internet of Things ApplicationsWireless Communications & Mobile Computing10.1155/2021/84145032021Online publication date: 1-Jan-2021
        • (2021)AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of thingsThe Journal of Supercomputing10.1007/s11227-021-03833-177:12(13757-13787)Online publication date: 1-Dec-2021
        • (2020)CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysisTelecommunications Systems10.1007/s11235-020-00674-w75:1(43-61)Online publication date: 26-May-2020
        • (2019)Mitigation of DIS flooding attacks in RPL‐based 6LoWPAN networksTransactions on Emerging Telecommunications Technologies10.1002/ett.380231:2Online publication date: 13-Dec-2019
        • (2018)Survey on RPL enhancementsComputer Communications10.1016/j.comcom.2018.02.011120:C(10-21)Online publication date: 1-May-2018
        • (2018)A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power and Lossy NetworksWireless Personal Communications: An International Journal10.1007/s11277-017-5165-499:2(1035-1059)Online publication date: 1-Mar-2018
        • (2016)TRAIL: Topology Authentication in RPLProceedings of the 2016 International Conference on Embedded Wireless Systems and Networks10.5555/2893711.2893721(59-64)Online publication date: 15-Feb-2016

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media