EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things

被引:25
作者
Bang, A. O. [1 ]
Rao, Udai Pratap [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol SVNIT, Comp Sci & Engn Dept, Surat 395007, Gujarat, India
关键词
RPL; Internet of things; Rank attack; Objective function; Echelon metric; IPv6; 6LoWPAN; INTRUSION DETECTION; ROUTING PROTOCOL; LOW-POWER; SYSTEM;
D O I
10.1007/s12083-021-01275-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Routing Protocol for Low Power and Lossy Networks (RPL) is the only standard protocol that assists the routing process in Low Power and Lossy Networks (LLNs) - based Internet of Things (IoT) applications. However, due to the resource-constrained nature, lack of physical protection and security requirements of the inherent protocol, LLNs are vulnerable to attacks that primarily alter the working of the RPL protocol and disrupt the ongoing communication. Therefore, it is a high profit and desperate target of many attackers. Our work offers a detailed overview of one such significant threat to RPL known as the rank attack. Considering the resource-constrained nature of the IoT devices, we propose and evaluate a lightweight and efficient method to mitigate and isolate the rank attack. Specifically, our approach uses a novel Echelon Metric Based Objective Function (EMBOF) over the default RPL to calculate and check the legitimacy of the advertised rank. The Echelon value is additively determined by the root node and the corresponding parent node(s) in the RPL network topology. Our approach not only detects the attacker node(s) but also isolates it immediately. We implement and evaluate our approach through extensive simulations in Cooja, a Contiki operating system (OS) based simulator. The results of our experiments show the viability of our proposal concerning detection accuracy, isolation latency, packet delivery ratio, end-to-end delay, power consumption and memory overhead.
引用
收藏
页码:642 / 665
页数:24
相关论文
共 72 条
  • [1] Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges
    Ahmed, Abdelmuttlib Ibrahim Abdalla
    Ab Hamid, Siti Hafizah
    Gani, Abdullah
    Khan, Suleman
    Khan, Muhammad Khurram
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 145
  • [2] SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things
    Airehrour, David
    Gutierrez, Jairo A.
    Ray, Sayan Kumar
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 860 - 876
  • [3] Airehrour D, 2016, 2016 26TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P115, DOI 10.1109/ATNAC.2016.7878793
  • [4] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [5] Almusaylim Z. A., 2020, Detection and mitigation of RPL rank and version number attacks in smart Internet of things
  • [6] The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks
    Anhtuan Le
    Loo, Jonathan
    Lasebae, Aboubaker
    Vinel, Alexey
    Chen, Yue
    Chai, Michael
    [J]. IEEE SENSORS JOURNAL, 2013, 13 (10) : 3685 - 3692
  • [7] [Anonymous], 2012, Cisco Connected Grid Security for Field Area Network
  • [8] Aris A., 2018, SECURITY INTERNET TH
  • [9] New lightweight mitigation techniques for RPL version number attacks
    Aris, Ahmet
    Yalcin, Siddika Berna Ors
    Oktug, Sema F.
    [J]. AD HOC NETWORKS, 2019, 85 : 81 - 91
  • [10] Aris A, 2016, IEEE IFIP NETW OPER, P776, DOI 10.1109/NOMS.2016.7502897