Sinkhole attack detection and avoidance mechanism for RPL in wireless sensor networks

被引:0
作者
Jamil A. [1 ]
Ali M.Q. [1 ]
Abd Alkhalec M.E. [1 ]
机构
[1] Universiti Tun Hussein Onn Malaysia, Malaysia
关键词
Cross-layer; RPL; Security; Sinkhole attack; Wireless sensor network;
D O I
10.33166/AETiC.2021.05.011
中图分类号
学科分类号
摘要
The security issue is one of the main problems in Wireless Sensor Network (WSN) and Internet of Things (IoTs). RPL (Routing protocol for low power and lossy networks) is a standard routing protocol for WSN, is not to be missed from being attacks. The performance of RPL is reduced significantly after being attacked. Sinkhole attack is one of the most common attacks to WSN and RPL, threatening the network capability by discarding packets and disrupting routing paths. Therefore, this paper proposes a new Secured-RPL routing protocol to detect and avoid sinkhole attacks in the network, which is called Cross Layers Secured RPL (CLS-RPL). This routing protocol is enhanced of the existing RPL routing protocol. CLS-RPL is a cross-layer routing protocol that uses information from the data link layer in its security mechanism. CLS-RPL uses a new technique and concept in detecting a sinkhole attack that is based on eave-listening (overhearing) that allows a child node to eave-listening its parent transmission. If the child node does not hear any transmission from its parent node after sending several packets, this means its parent node is a sinkhole attacker. Otherwise, if the node hears transmission from its parent node, this means that its parent node is legitimate and continues to send more packets. CLS-RPL implements a simple security mechanism that provides a high packet delivery ratio. The finding shows that CLS-RPL provides 52% improvement in terms of packet delivery ratio when compared to RPL protocol. © 2021 by the author(s).
引用
收藏
页码:94 / 101
页数:7
相关论文
共 13 条
[1]  
Khan M. M., Lodhi M. A., Rehman A., Khan A., Hussain F. B., Sink-to-Sink Coordination Framework using RPL: Routing Protocol for Low Power and Lossy Networks, Journal of Sensors, 2016, (2016)
[2]  
Chaudhari H. C., Kadam L. U., Wireless Sensor Networks: Security, Attacks and Challenges, International Journal of Networking, 1, 1, pp. 859-868, (2011)
[3]  
Janani P., Diniesh V. C., Jude M. J. A., Impact of Path Metrics on RPL’s Performance in Low Power and Lossy Networks, 2018 International Conference on Communication and Signal Processing (ICCSP), pp. 0835-0839, (2018)
[4]  
Ma G., Li X., Pei Q., Li Z., A Security Routing Protocol for Internet of Things Based on RPL, 2017 International Conference on Networking and Network Applications (NaNA), pp. 209-213, (2017)
[5]  
Abdullah I., Muntasir Rahman M., Chandra Roy M., Detecting Sinkhole Attacks in Wireless Sensor Network using Hop Count, International Journal of Computer Network and Information Security, 7, 3, pp. 50-56, (2015)
[6]  
Prajapati R., Manjhi N., Grid Base Cluster Approach for Detection of Sinkhole Attack in WSN, International Journal of Engineering and Computer Science, 5, 17571, pp. 17571-17576, (2016)
[7]  
Dvir A., Holczer T., Buttyan L., VeRA-Version Number and Rank Authentication in RPL, Proc. - 8th IEEE Int. Conf. Mob. Ad-hoc Sens. Syst. MASS 2011, pp. 709-714, (2011)
[8]  
Le A., Loo J., Chai K. K., Aiash M., A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology, Information, 7, 2, (2016)
[9]  
Sheela D., Kumar C. N., Mahadevan G., A Non Cryptographic Method of Sink Hole Attack Detection in Wireless Sensor Networks, IEEE-International Conference on Recent Trends in Information Technology (ICRTIT), pp. 527-532, (2011)
[10]  
Zhang Z., Liu S., Bai Y., Zheng Y., M Optimal Routes Hops Strategy: Detecting Sinkhole Attacks in Wireless Sensor Networks, Cluster Computing, 6, pp. 1-9, (2018)