Exploring and mitigating hybrid rank attack in RPL-based IoT networks

被引:1
作者
Rouissat, Mehdi [1 ,2 ]
Belkehir, Mohammed [3 ]
Mokaddem, Allel [3 ]
Bouziani, Merahi [4 ]
Alsukayti, Ibrahim Sulaiman [5 ]
机构
[1] Univ Ctr Nour Bachir, El Bayadh, Algeria
[2] Univ Abou Bekr Belkaid Tlemcen, STIC Lab, Tilimsen, Algeria
[3] Univ Ctr Nour Bachir, LIMA Lab, El Bayadh 32000, Algeria
[4] Univ Djillali Liabes Sidi Bel Abbes, LTTNS Labortory, Sidi Bel Abbes, Algeria
[5] Qassim Univ, Coll Comp, Dept Comp Sci, Buraydah 51452, Saudi Arabia
来源
JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS | 2024年 / 75卷 / 03期
关键词
RPL; IoT; rank attack; security; Contiki; cooja; VERSION NUMBER ATTACKS;
D O I
10.2478/jee-2024-0025
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Despite the widespread adoption of the Routing Protocol for Low-power and Lossy Networks (RPL) in IoT environments, its inherent limitations in addressing security vulnerabilities have left IoT networks vulnerable to ongoing attacks. This paper introduces a novel intrusion detection system tailored specifically for IoT networks, with a focus on mitigating attacks at the network's edge. The study presents the Hybrid Rank Attack (HRA), a sophisticated threat exploiting RPL vulnerabilities by alternately advertising decreased and increased rank values in control messages. Extensive experimentation evaluates the detrimental effects of HRA on critical network metrics including exchanged messages, energy consumption, PDR, latency, and memory footprint. Additionally, a lightweight and distributed countermeasure algorithm is proposed to effectively mitigate the impact of HRA. Simulation-based evaluations demonstrate significant reductions in control overhead (68.7%) and energy consumption (61.83%), with minimal additional RAM utilization (1.05%). This lightweight solution enhances the resilience of RPL-based IoT networks against HRA threats.
引用
收藏
页码:204 / 213
页数:10
相关论文
共 25 条
  • [1] Albreem M., 2017, 2022 INT C COMP TECH, DOI [10.1109/ICCTech55650.2022.00017, DOI 10.1109/ICCTECH55650.2022.00017]
  • [2] Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy
    Alfriehat, Nadia A.
    Anbar, Mohammed
    Karuppayah, Shankar
    Rihan, Shaza Dawood Ahmed
    Alabsi, Basim Ahmad
    Momani, Alaa M.
    [J]. IEEE ACCESS, 2024, 12 : 31136 - 31158
  • [3] A Survey on Routing Solutions for Low-Power and Lossy Networks: Toward a Reliable Path-Finding Approach
    Almutairi, Hanin
    Zhang, Ning
    [J]. NETWORK, 2024, 4 (01): : 1 - 32
  • [4] Toward an understanding of recent developments in RPL routing
    Alsukayti, Ibrahim S.
    Alreshoodi, Mohammed
    [J]. IET NETWORKS, 2019, 8 (06) : 356 - 366
  • [5] EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things
    Bang, A. O.
    Rao, Udai Pratap
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (01) : 642 - 665
  • [6] RPL rank based-attack mitigation scheme in IoT environment
    Boudouaia, Mohammed Amine
    Abouaissa, Abdelhafid
    Ali-Pacha, Adda
    Benayache, Ayoub
    Lorenz, Pascal
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (13)
  • [7] Unleashing the Power of IoT: A Comprehensive Review of IoT Applications and Future Prospects in Healthcare, Agriculture, Smart Homes, Smart Cities, and Industry 4.0
    Chataut, Robin
    Phoummalayvane, Alex
    Akl, Robert
    [J]. SENSORS, 2023, 23 (16)
  • [8] Choukri W., 2020, 2020 INT C INN INT I
  • [9] El Hajjar A., 2023, Wireless Networks, P1, DOI [10.1007/978-3-031-33631-71, DOI 10.1007/978-3-031-33631-71]
  • [10] A Survey on IoT-Edge-Cloud Continuum Systems: Status, Challenges, Use Cases, and Open Issues
    Gkonis, Panagiotis
    Giannopoulos, Anastasios
    Trakadas, Panagiotis
    Masip-Bruin, Xavi
    D'Andria, Francesco
    [J]. FUTURE INTERNET, 2023, 15 (12)