Mitigating Denial of Service Attacks in RPL-Based IoT Environments: Trust-Based Approach

被引:12
作者
Azzedin, Farag [1 ]
机构
[1] King Fahd Univ Petr & Minerals, Interdisciplinary Res Ctr Intelligent Secure Syst, Informat & Comp Sci Dept, Dhahran 31261, Saudi Arabia
关键词
Internet of Things; Security; Routing protocols; Topology; Linear programming; Trusted computing; Denial-of-service attack; Data integrity; Energy management; Attacks; hello flooding; IoT; power drain; RPL; trust; version number modification; ROUTING PROTOCOL; INTERNET; THINGS; LIGHTWEIGHT; NETWORKS; SECURITY; CONTIKI;
D O I
10.1109/ACCESS.2023.3331030
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In domains such as telehealth, intelligent transportation, and autonomous agriculture, ensuring secure routing of collected and exchanged data is paramount. Since its inception, there have been many research challenges for the RPL routing protocol that operates in resource-constrained environments and utilizes battery-powered IoT devices. Hence, researchers have focused on this crucial challenge by advising solutions to mitigate attacks that deplete nodes' energy and hence create energy gaps in the network. In this article, we study the impact of two energy exhaustion attacks (hello flooding and version number modification) on the RPL protocol and we present a novel mitigation solution based on behavioural trust. We present an in-depth study of the impact on radio energy consumption of the hello flooding and version number modification attacks in RPL as the number of network nodes increases. We showed that the impact of the former is localized to nodes in the vicinity of the attacker while the latter has a global impact that extends to the entire network. The obtained results from our simulations show that version number modification attack in particular has devastating impact on the network. We also propose a trust-based solution to mitigate these attacks and demonstrate its effectiveness. Accordingly, we conduct comparative study of these attacks and empirically investigate their impact on network performance by running extensive evaluation experiments. Our findings verify the effectiveness of our proposed trust system in mitigating both attacks.
引用
收藏
页码:129077 / 129089
页数:13
相关论文
共 72 条
[1]   IoT trust and reputation: a survey and taxonomy [J].
Aaqib, Muhammad ;
Ali, Aftab ;
Chen, Liming ;
Nibouche, Omar .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01)
[2]   Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID [J].
Abosata, Nasr ;
Al-Rubaye, Saba ;
Inalhan, Gokhan .
SENSORS, 2023, 23 (01)
[3]   SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things [J].
Airehrour, David ;
Gutierrez, Jairo A. ;
Ray, Sayan Kumar .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 :860-876
[4]   A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things [J].
Al-Amiedy, Taief Alaa ;
Anbar, Mohammed ;
Belaton, Bahari ;
Bahashwan, Abdullah Ahmed ;
Hasbullah, Iznan Husainy ;
Aladaileh, Mohammad Adnan ;
AL Mukhaini, Ghada .
INTERNET OF THINGS, 2023, 22
[5]   Semantics-based privacy by design for Internet of Things applications [J].
Alkhariji, Lamya ;
De, Suparna ;
Rana, Omer ;
Perera, Charith .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 138 :280-295
[6]  
Alohali B. A., 2018, P 11 INT S COMM SYST, P1
[7]   A Lightweight Scheme for Mitigating RPL Version Number Attacks in IoT Networks [J].
Alsukayti, Ibrahim S. ;
Singh, Aman .
IEEE ACCESS, 2022, 10 :111115-111133
[8]  
Anitha AA, 2021, INT J ADV COMPUT SC, V12, P499
[9]   A mechanism to detecting flooding attacks in quantum enabled cloud-based lowpower and lossy networks [J].
Ankam, Sreejyothsna ;
Reddy, N. Sudhakar .
THEORETICAL COMPUTER SCIENCE, 2023, 941 :29-38
[10]   New lightweight mitigation techniques for RPL version number attacks [J].
Aris, Ahmet ;
Yalcin, Siddika Berna Ors ;
Oktug, Sema F. .
AD HOC NETWORKS, 2019, 85 :81-91