Impact Analysis of Rank Attack on RPL-Based 6LoWPAN Networks in Internet of Things and Aftermaths

被引:12
作者
Bang, Ankur [1 ]
Rao, Udai Pratap [2 ]
机构
[1] Ctr Dev Adv Comp C DAC, Cross Rd 9, Mumbai 400049, Maharashtra, India
[2] Sardar Vallabhbhai Natl Inst Technol SVNIT, Comp Sci & Engn Dept, Surat Dumas Rd, Surat 395007, Gujarat, India
关键词
RPL; Internet of Things; Rank attack; 6LoWPAN; LLN; Routing; Impact analysis; INTRUSION DETECTION; LOW-POWER; SYSTEM;
D O I
10.1007/s13369-022-07342-y
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Routing protocol for low power and lossy networks (RPL) serves the routing process in Internet Protocol version 6 over low-power wireless personal area network protocol stack. RPL protocol is deployed on sensor nodes and is vulnerable to many attacks due to the resource-constrained and non-tamper-resistant nature of these nodes. Many attacks on RPL-based networks can be carried out by an attacker using either an insider or an outsider attack method. The concerns associated with the RPL protocol regarding security and privacy may restrict its global adaption. Therefore, it is necessary to conduct a thorough investigation of RPL-specific attacks and their effects on the underlying network. To this end, our work provides a detailed investigation of the rank attack, a type of denial-of-service attack and its effect on the RPL network. We made an in-depth experimental study on four different RPL network topologies and analysed the impact of rank attack. To analyse the effect of rank attack, we use both grid and random variants of the network topologies. Based on the location of the sink node, we classify the grid topology as grid corner and grid centre, whereas, based on mobility, we classify the random topology as random topology with static nodes and random topology with mobile nodes. Under the attack scenario, the average number of packets received in grid topology with sink node at centre degrades by 10%. For grid topology having the sink node at the corner, the average number of packets received degraded by 13.44%. The percentage degradation of the average number of packets received at the sink node with random topology is nearly 8%. Random topology with mobile nodes has 7.4% lesser number of packets received at the sink node. Next, the value of average inter-packet time with random mobile topology has the highest increase of about 19% under attack. At the same time, we notice an increase in average inter-packet time of about 6.4% with random topology, 3.7% with grid topology having the sink node at the corner, and 0.7% with grid topology having the sink node at the centre. Further, when the rank attack is mounted, we notice a hike of 24% in message count with random mobile and 28% with grid corner topology. Moreover, both random topology and grid topology with sink at the centre have a hike of about 13% in message count. Furthermore, when average power consumption is considered under attack scenario, random topology with mobile nodes and grid topology with the sink node placed at the corner demonstrate an increase of 11% under attack. At the same time, random and grid topologies with the sink node at the centre have a rise of nearly 2% as compared to normal RPL. The results of our experiments show that the rank attack considerably degrades network performance in terms of packets received at the sink node, inter-packet time, control message count, and average power consumption. Further, our investigation also confirms that the position of the attacker node in the network topology has a significant impact on the effect of the rank attack. Furthermore, we also suggest some potential solutions to mitigate this attack.
引用
收藏
页码:2489 / 2505
页数:17
相关论文
共 58 条
[1]  
Almusaylim Z.A., 2020, Detection and mitigation of RPL rank and version number attacks in smart Internet of things
[2]   The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks [J].
Anhtuan Le ;
Loo, Jonathan ;
Lasebae, Aboubaker ;
Vinel, Alexey ;
Chen, Yue ;
Chai, Michael .
IEEE SENSORS JOURNAL, 2013, 13 (10) :3685-3692
[3]  
[Anonymous], 2010, document RFC 5867
[4]  
[Anonymous], 2012, RFC 6552
[5]  
[Anonymous], 2015, TECH REP
[6]  
Aris A., 2018, SECURITY INTERNET TH
[7]  
Aris A, 2015, SIG PROCESS COMMUN, P903, DOI 10.1109/SIU.2015.7129976
[8]   EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things [J].
Bang, A. O. ;
Rao, Udai Pratap .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (01) :642-665
[9]   A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case [J].
Bang, A. O. ;
Rao, Udai Pratap .
JOURNAL OF SUPERCOMPUTING, 2021, 77 (12) :13703-13738
[10]  
Bang A.O., 2021, P 2 INT C SMART EN C, P719, DOI DOI 10.1007/978-981-15-6707-0_70