Securing RPL-Based Networks Against Version Number and Rank Attacks

被引:0
作者
Khalfoune, Alaa Eddine [1 ,2 ]
Beghdad, Rachid [1 ,2 ]
机构
[1] Univ Bejaia, Fac Sci Exactes, Dept Informat, Bejaia, Algeria
[2] Univ Batna 2, Fac Math & Informat, Lab LAMIE, Batna, Algeria
关键词
Internet of things; LLN; Routing protocol for low power and lossy networks; Security; Blocking techniques; ROUTING PROTOCOL; LOW-POWER; INTERNET;
D O I
10.18267/j.aip.234
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The increasing reliance on Low-power and Lossy Networks (LLN) in the Internet of Things (IoT) and their vulnerability to various attacks have made their protection necessary. Most of the proposed approaches to protecting such networks neither support scalability nor are lightweight enough to be incorporated into these constrained networks. In this paper, we present a lightweight approach to protecting LLN networks from rank and version number attacks. The proposal relies on light exchanged messages between the network nodes and the root and network nodes themselves. Successive comparison processes are used to detect the attack while two blocking techniques are introduced against malicious nodes. Simulations demonstrated the effectiveness of the approach, outperforming similar approaches such as Sink-Based Intrusion Detection Systems (SBIDS), Secure Routing Protocol (SRPL) for LLN, the Machine-Learning Technique based on K-Nearest Neighbour (MLTKNN), secure trust-aware Routing Protocol for Low Power and Lossy Networks (SecTrust) and Shield in terms of appropriate parameters, without causing extra charges on the network.
引用
收藏
页码:340 / 358
页数:19
相关论文
共 22 条
[1]   A Distributed and Cooperative Verification Mechanism to Defend against DODAG Version Number Attack in RPL [J].
Ahmed, Firoz ;
Ko, Young-Bae .
PECCS: PROCEEDINGS OF THE 6TH INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND EMBEDDED COMPUTING AND COMMUNICATION SYSTEMS, 2016, :55-62
[2]   SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things [J].
Airehrour, David ;
Gutierrez, Jairo A. ;
Ray, Sayan Kumar .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 :860-876
[3]   A Lightweight Scheme for Mitigating RPL Version Number Attacks in IoT Networks [J].
Alsukayti, Ibrahim S. ;
Singh, Aman .
IEEE ACCESS, 2022, 10 :111115-111133
[4]  
Alzubaidi M., 2018, Journal of Communication, V13, P198
[5]   The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks [J].
Anhtuan Le ;
Loo, Jonathan ;
Lasebae, Aboubaker ;
Vinel, Alexey ;
Chen, Yue ;
Chai, Michael .
IEEE SENSORS JOURNAL, 2013, 13 (10) :3685-3692
[6]  
[Anonymous], 2015, Int. J. Comput. Appl.
[7]   Analysis of the RPL Version Number Attack with Multiple Attackers [J].
Aris, Ahmet ;
Oktug, Sema F. .
2020 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2020), 2020,
[8]   New lightweight mitigation techniques for RPL version number attacks [J].
Aris, Ahmet ;
Yalcin, Siddika Berna Ors ;
Oktug, Sema F. .
AD HOC NETWORKS, 2019, 85 :81-91
[9]  
Aris A, 2016, IEEE IFIP NETW OPER, P776, DOI 10.1109/NOMS.2016.7502897
[10]  
Glissa G, 2016, IEEE GLOB COMM CONF