HaKAN-6T: Hybrid algorithm for DIS attack detection and mitigation using CoJP in RPL-based 6TiSCH networks

被引:0
作者
Aydin, Hakan [1 ]
Aydin, Burak [1 ]
Gormus, Sedat [1 ]
机构
[1] Karadeniz Tech Univ, Dept Comp Engn, TR-61080 Trabzon, Turkiye
关键词
6TiSCH; DIS flooding attack; Increased and decreased rank attack; Industrial Internet of Things; RPL; Constrained Join Protocol; ROUTING PROTOCOL; INTERNET; THINGS; SECURITY; SCHEME;
D O I
10.1016/j.compeleceng.2025.110362
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things relies on robust networking protocols like the Routing Protocol for Low-Power and Lossy Networks (RPL) to enable efficient communication in resource-constrained environments, particularly in 6TiSCH networks combining IEEE 802.15.4e TSCH with IPv6. However, RPL remains vulnerable to control message attacks, such as DIS flooding and rank manipulation, which degrade network stability, increase energy consumption, and disrupt performance. To address these challenges, this study introduces HaKAN-6T, a hybrid security framework designed to enhance RPL-based 6TiSCH networks through integrated detection and mitigation mechanisms. HaKAN-6T combines the Constrained Join Protocol (CoJP) for secure device authentication with a Network Analyzer for real-time anomaly detection. CoJP ensures only authorized devices join the network, preventing unauthorized access, while the Network Analyzer monitors node behavior to identify attacks like DIS flooding, increased rank, and decreased rank attacks. The performance of HaKAN-6T is evaluated through extensive simulations in grid and random topologies with 30 and 40 nodes, measuring key metrics such as packet delivery ratio (PDR), end-to-end delay (E2ED), control packet overhead, average power consumption (APC), processing overhead, and average detection latency. The results demonstrate that HaKAN-6T significantly mitigates the impact of DIS flooding attacks, reducing control packet overhead by up to 28.5% and improving PDR from 82.7% to 88.45% in 30-node scenarios. Against increased rank attacks, it minimizes E2ED, reducing delays by 19.3% while maintaining a stable network topology. For decreased rank attacks, it prevents excessive topology changes and lowers APC by up to 10.5%, enhancing energy efficiency.
引用
收藏
页数:31
相关论文
共 58 条
  • [1] A secure routing protocol for low power and lossy networks based 6LoWPAN networks to mitigate DIS flooding attacks
    Abhinaya, E. V.
    Sudhakar, B.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
  • [2] Abraham AL, 2023, 2023 IEEE N KARN SUB, P1, DOI [10.1109/NKCon59507.2023.10396137, DOI 10.1109/NKCON59507.2023.10396137]
  • [3] DETONAR: Detection of Routing Attacks in RPL-Based IoT
    Agiollo, Andrea
    Conti, Mauro
    Kaliyar, Pallavi
    Lin, Tsung-Nan
    Pajola, Luca
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 1178 - 1190
  • [4] SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things
    Airehrour, David
    Gutierrez, Jairo A.
    Ray, Sayan Kumar
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 860 - 876
  • [5] Secure routing for internet of things: A survey
    Airehrour, David
    Gutierrez, Jairo
    Ray, Sayan Kumar
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 : 198 - 213
  • [6] A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things
    Al-Amiedy, Taief Alaa
    Anbar, Mohammed
    Belaton, Bahari
    Bahashwan, Abdullah Ahmed
    Hasbullah, Iznan Husainy
    Aladaileh, Mohammad Adnan
    AL Mukhaini, Ghada
    [J]. INTERNET OF THINGS, 2023, 22
  • [7] Albinali H, 2024, P 7 INT C FUT NETW D, P641, DOI [10.1145/3644713.3644809, DOI 10.1145/3644713.3644809]
  • [8] RPL-based attack detection approaches in IoT networks: review and taxonomy
    Alfriehat, Nadia
    Anbar, Mohammed
    Aladaileh, Mohammed
    Hasbullah, Iznan
    Shurbaji, Tamarah A.
    Karuppayah, Shankar
    Almomani, Ammar
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (09)
  • [9] Proposing a Secure RPL based Internet of Things Routing Protocol: A Review
    Almusaylim, Zahrah A.
    Alhumam, Abdulaziz
    Jhanjhi, N. Z.
    [J]. AD HOC NETWORKS, 2020, 101
  • [10] RPL-Based IoT Networks under Simple and Complex Routing Security Attacks: An Experimental Study
    Alsukayti, Ibrahim S.
    Alreshoodi, Mohammed
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (08):