A Lightweight Scheme for Mitigating RPL Version Number Attacks in IoT Networks

被引:17
作者
Alsukayti, Ibrahim S. [1 ]
Singh, Aman [2 ,3 ,4 ]
机构
[1] Qassim Univ, Coll Comp, Dept Comp Sci, Buraydah 51452, Saudi Arabia
[2] Univ Europea Atlantico, Higher Polytech Sch, Santander 39011, Spain
[3] Univ Int Iberoamer, Dept Engn, Arecibo, PR 00613 USA
[4] Univ Int Cuanza, Fac Engn, Bairro Kaluapanda, Cuito Bie, Angola
关键词
Internet of Things; Routing; Network security; Network topology; Wireless sensor networks; Wireless communication; Resilience; Low power electronics; wireless sensor networks; RPL; network security; SECURITY; INTERNET;
D O I
10.1109/ACCESS.2022.3215460
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) systems incorporate a multitude of resource-limited devices typically interconnected over Low Power and Lossy Networks (LLNs). Robust IP-based network routing among such constrained IoT devices can be effectively realized using the IPv6 Routing Protocol for LLN (RPL) which is an IETF-standardized protocol. The RPL design features a topology maintenance mechanism based on a version numbering system. However, such a design property makes it easy to initiate Version Number (VN) attacks targeting the stability, lifetime, and performance of RPL networks. Thus the wide deployment of RPL-based IoT networks would be hindered significantly unless internal routing attacks such as the VN attacks are efficiently addressed. In this research work, a lightweight and effective detection and mitigation solution against RPL VN attacks is introduced. With simple modifications to the RPL functionality, a collaborative and distributed security scheme is incorporated into the protocol design (referred to as CDRPL). As the experimental results indicated, it provides a secure and scalable solution enhancing the resilience of the protocol against simple and composite VN attacks in different experimental setups. CDRPL guaranteed fast and accurate attack detection as well as quick topology convergence upon any attack attempt. It also efficiently maintained network stability, control traffic overhead, QoS performance, and energy consumption during different scenarios of the VN attack. Compared to other similar approaches, CDRPL yields better performance results with lightweight node-local processing, no additional entities, and less communication overhead.
引用
收藏
页码:111115 / 111133
页数:19
相关论文
共 52 条
[1]   A Distributed and Cooperative Verification Mechanism to Defend against DODAG Version Number Attack in RPL [J].
Ahmed, Firoz ;
Ko, Young-Bae .
PECCS: PROCEEDINGS OF THE 6TH INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND EMBEDDED COMPUTING AND COMMUNICATION SYSTEMS, 2016, :55-62
[2]  
Alexander R., 2012, RFC 6550, DOI [10.17487/RFC6550, DOI 10.17487/RFC6550]
[3]   Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP [J].
Almusaylim, Zahrah A. ;
Jhanjhi, N. Z. ;
Alhumam, Abdulaziz .
SENSORS, 2020, 20 (21) :1-25
[4]   The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks [J].
Anhtuan Le ;
Loo, Jonathan ;
Lasebae, Aboubaker ;
Vinel, Alexey ;
Chen, Yue ;
Chai, Michael .
IEEE SENSORS JOURNAL, 2013, 13 (10) :3685-3692
[5]  
Anitha A. A., 2021, Solid State Technol., V64, P2225
[6]  
[Anonymous], 2016, HEIGHTENED DDOS THRE
[7]  
[Anonymous], 2016, ERICSSON CONNECTED F
[8]  
[Anonymous], Tmote Sky datasheet
[9]  
[Anonymous], 2010, Z1 Datasheet
[10]  
[Anonymous], 2021, Sonicwall Cyber Threat Report-Cyber Threat Intelligence for Navigating the New Business Reality