A Lightweight Solution for Detecting the Worst Parent Attack in RPL-based IoT Networks

被引:0
作者
Abid, Meriem [1 ]
Alem, Mohammed [2 ]
机构
[1] Univ Mostaganem Abdelhamid Ibn Badis, Comp Sci & New Technol Lab CSTL, Mostaganem, Algeria
[2] SONATRACH Natl State Owned Oil & Gas Co Algeria, Algiers, Algeria
关键词
IoT; LLN; RPL; security; attack; worst parent; increased rank; decreased rank; ROUTING PROTOCOL; LOW-POWER; INTERNET; THINGS;
D O I
10.32908/ahswn.v59.11207
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) is specifically designed to meet the requirements of Low-Power and Lossy networks. RPL operates within a hierarchical topology, where each node relies upon its preferred parent to route sensed data, often employing the Minimum Rank Hysteresis Objective Function to select the optimal routing path. The worst parent attack exploits this process by maliciously selecting the least suitable parent to route messages. Despite the detrimental consequences of this attack, it has received limited attention. This paper proposes a novel and lightweight detection method that monitors nodes behaviour against the worst parent attackers. Experimental results demonstrate that our solution achieves high detection ratio and accuracy in identifying malicious nodes, with minimal false positives. Moreover, the approach imposes low overhead, enhancing its feasibility for resource-constrained IoT devices. Besides, our approach shows promising results also in detecting increased and decreased rank attacks.
引用
收藏
页码:213 / 241
页数:29
相关论文
共 41 条
  • [1] Abid M., 2021, 2021 INT C NETW ADV, P1
  • [2] DETONAR: Detection of Routing Attacks in RPL-Based IoT
    Agiollo, Andrea
    Conti, Mauro
    Kaliyar, Pallavi
    Lin, Tsung-Nan
    Pajola, Luca
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 1178 - 1190
  • [3] SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things
    Airehrour, David
    Gutierrez, Jairo A.
    Ray, Sayan Kumar
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 860 - 876
  • [4] A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things
    Al-Amiedy, Taief Alaa
    Anbar, Mohammed
    Belaton, Bahari
    Bahashwan, Abdullah Ahmed
    Hasbullah, Iznan Husainy
    Aladaileh, Mohammad Adnan
    AL Mukhaini, Ghada
    [J]. INTERNET OF THINGS, 2023, 22
  • [5] Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP
    Almusaylim, Zahrah A.
    Jhanjhi, N. Z.
    Alhumam, Abdulaziz
    [J]. SENSORS, 2020, 20 (21) : 1 - 25
  • [6] Proposing a Secure RPL based Internet of Things Routing Protocol: A Review
    Almusaylim, Zahrah A.
    Alhumam, Abdulaziz
    Jhanjhi, N. Z.
    [J]. AD HOC NETWORKS, 2020, 101
  • [7] Althubaity A, 2017, IEEE INT C EMERG
  • [8] The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks
    Anhtuan Le
    Loo, Jonathan
    Lasebae, Aboubaker
    Vinel, Alexey
    Chen, Yue
    Chai, Michael
    [J]. IEEE SENSORS JOURNAL, 2013, 13 (10) : 3685 - 3692
  • [9] Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach
    Bostani, Hamid
    Sheikhan, Mansour
    [J]. COMPUTER COMMUNICATIONS, 2017, 98 : 52 - 71
  • [10] Chui M., 2021, The Internet of Things: Catching up to an Accelerating Opportunity