A Simple Approach for Mitigating a New Flooding Attack in RPL-Based IoT Networks

被引:0
作者
Rouissat, Mehdi [1 ]
Alsukayti, Ibrahim S. [2 ]
Belkheir, Mohammed [3 ]
Alreshoodi, Mohammed [4 ]
Mokaddem, Allel [3 ]
Ziani, Djamila [3 ]
机构
[1] Univ Abou Bekr Belkaid Tlemcen, Univ Ctr Nour Bachir El Bayadh, STIC Lab, Tilimsen 32000, Algeria
[2] Qassim Univ, Coll Comp, Dept Comp Sci, Buraydah 51452, Saudi Arabia
[3] Univ Ctr Nour Bachir El Bayadh, LIMA Lab, El Bayadh 32000, Algeria
[4] Qassim Univ, Appl Coll, Unit Sci Res, Buraydah 52571, Saudi Arabia
关键词
Internet of Things; Security; Floods; Routing; Performance evaluation; Topology; Routing protocols; Network topology; Energy efficiency; Standards; Internet of Things (IoT); wireless networks; network security; energy efficiency; VERSION NUMBER; LOW-POWER; SECURITY;
D O I
10.1109/ACCESS.2025.3525798
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing deployment of Internet of Things (IoT) devices in diverse daily-life smart applications makes the security of IoT networks a critical requirement. However, efficient support of network security remains challenging even for a standardized IoT network protocol such as the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). It incorporates limited protection from external security attacks but stays considerably vulnerable to internal routing attacks. The inherent design of RPL, particularly its topology establishment and maintenance mechanism, makes it easy to initiate more damaging attacks such as flooding attacks. Given the constrained characteristics of IoT devices, flooding IoT networks can easily lead to resource exhaustion and network performance degradation. This paper introduces a new variant of the flooding attack namely the Destination Advertisement Object Flooding (DAOF) attack. It is based on using routing communications, particularly the DAO messages, to disseminate unnecessary routing traffic which instigate excessive transmissions of control messages across the network. As demonstrated by the experimental results of this study, the DAOF attack can increase network overhead by more than 65% even in a relatively small-scale setup. Additionally, it can notably lead to high energy consumption with an average increase of 36% and low QoS performance with an average latency increase of 150%. For effective mitigation of the DAOF attack, a new lightweight solution based on a simple collaboration among RPL nodes is presented in this paper. It is referred to as DAOF-Secure RPL (DAOF-SRPL). It is based on simple in-protocol modifications to provide RPL with effective security support against the DAOF attack. In contrast to RPL in the attack scenarios, DAOF-SRPL achieved a reduction of over 80% in the total transmission rates of control messages. Meanwhile, it was able to maintain energy consumption and latency at minimal levels while preserving the same PDR results.
引用
收藏
页码:5342 / 5358
页数:17
相关论文
共 74 条
[31]  
Gnawali O., 2012, The Minimum Rank with Hysteresis Objective Function
[32]   ICRA: An Intelligent Clustering Routing Approach for UAV Ad Hoc Networks [J].
Guo, Jingjing ;
Gao, Huamin ;
Liu, Zhiquan ;
Huang, Feiran ;
Zhang, Junwei ;
Li, Xinghua ;
Ma, Jianfeng .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) :2447-2460
[33]   A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures [J].
Hassija, Vikas ;
Chamola, Vinay ;
Saxena, Vikas ;
Jain, Divyansh ;
Goyal, Pranav ;
Sikdar, Biplab .
IEEE ACCESS, 2019, 7 :82721-82743
[34]   A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives [J].
Hossain, Mahmud ;
Kayas, Golam ;
Hasan, Ragib ;
Skjellum, Anthony ;
Noor, Shahid ;
Islam, S. M. Riazul .
FUTURE INTERNET, 2024, 16 (02)
[35]   Future Industrial Applications: Exploring LPWAN-Driven IoT Protocols [J].
Islam, Mahbubul ;
Jamil, Hossain Md. Mubashshir ;
Pranto, Samiul Ahsan ;
Das, Rupak Kumar ;
Amin, Al ;
Khan, Arshia .
SENSORS, 2024, 24 (08)
[36]   A Review on the Security of IoT Networks: From Network Layer's Perspective [J].
Jahangeer, Asma ;
Bazai, Sibghat Ullah ;
Aslam, Saad ;
Marjan, Shah ;
Anas, Muhammad ;
Hashemi, Sayed Habibullah .
IEEE ACCESS, 2023, 11 :71073-71087
[37]  
JUCS J., 2023, Universal Comput.Sci., V29, P118, DOI [10.3897/jucs.85506.76A, DOI 10.3897/JUCS.85506.76A]
[38]   Effect of DIS Attack on 6TiSCH Network Formation [J].
Kalita, Alakesh ;
Brighente, Alessandro ;
Khatua, Manas ;
Conti, Mauro .
IEEE COMMUNICATIONS LETTERS, 2022, 26 (05) :1190-1193
[39]  
Kamaldeep M., Feature engineering and machinelearning framework for DDoS attack detection in the standardized Internetof Things
[40]  
Kupreev E., 2020, DDOS Rep