A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology

被引:134
作者
Le, Anhtuan [1 ]
Loo, Jonathan [2 ]
Chai, Kok Keong [1 ]
Aiash, Mahdi [2 ]
机构
[1] Queen Mary Univ London, Sch Elect Engn & Comp Sci, London E1 4NS, England
[2] Middlesex Univ, Sch Sci & Technol, London NW4 4BT, England
关键词
6LoWPAN; RPL; internal threats; topology attacks; specification-based; IDS;
D O I
10.3390/info7020025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Routing Protocol for Low power and Lossy network (RPL) topology attacks can downgrade the network performance significantly by disrupting the optimal protocol structure. To detect such threats, we propose a RPL-specification, obtained by a semi-auto profiling technique that constructs a high-level abstract of operations through network simulation traces, to use as reference for verifying the node behaviors. This specification, including all the legitimate protocol states and transitions with corresponding statistics, will be implemented as a set of rules in the intrusion detection agents, in the form of the cluster heads propagated to monitor the whole network. In order to save resources, we set the cluster members to report related information about itself and other neighbors to the cluster head instead of making the head overhearing all the communication. As a result, information about a cluster member will be reported by different neighbors, which allow the cluster head to do cross-check. We propose to record the sequence in RPL Information Object (DIO) and Information Solicitation (DIS) messages to eliminate the synchronized issue created by the delay in transmitting the report, in which the cluster head only does cross-check on information that come from sources with the same sequence. Simulation results show that the proposed Intrusion Detection System (IDS) has a high accuracy rate in detecting RPL topology attacks, while only creating insignificant overhead (about 6.3%) that enable its scalability in large-scale network.
引用
收藏
页数:19
相关论文
共 15 条
  • [1] The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks
    Anhtuan Le
    Loo, Jonathan
    Lasebae, Aboubaker
    Vinel, Alexey
    Chen, Yue
    Chai, Michael
    [J]. IEEE SENSORS JOURNAL, 2013, 13 (10) : 3685 - 3692
  • [2] A View of Cloud Computing
    Armbrust, Michael
    Fox, Armando
    Griffith, Rean
    Joseph, Anthony D.
    Katz, Randy
    Konwinski, Andy
    Lee, Gunho
    Patterson, David
    Rabkin, Ariel
    Stoica, Ion
    Zaharia, Matei
    [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (04) : 50 - 58
  • [3] Jun Tang, 2013, 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, Physical and Social Computing (CPSCom), P591, DOI 10.1109/GreenCom-iThings-CPSCom.2013.111
  • [4] Le Anhtuan, 2013, 2013 IEEE Symposium on Computers and Communications (ISCC), P000789, DOI 10.1109/ISCC.2013.6755045
  • [5] Le A, 2011, P 2011 IFIP WIR DAYS, P1, DOI DOI 10.1109/WD.2011.6098218
  • [6] 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach
    Le, Anhtuan
    Loo, Jonathan
    Lasebae, Aboubaker
    Aiash, Mahdi
    Luo, Yuan
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (09) : 1189 - 1212
  • [7] Matsunaga T, 2014, 2014 11TH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATIONS SYSTEMS (ISWCS), P427, DOI 10.1109/ISWCS.2014.6933391
  • [8] Mitrokotsa A, 2008, CRYPTOL INF SEC SER, V1, P251
  • [9] Panos C, 2010, P INT C SEC CRYPT SE, P1
  • [10] SVELTE: Real-time intrusion detection in the Internet of Things
    Raza, Shahid
    Wallgren, Linus
    Voigt, Thiemo
    [J]. AD HOC NETWORKS, 2013, 11 (08) : 2661 - 2674