A novel Network Partitioning Attack against Routing Protocol in Internet of Things

被引:17
作者
Sahay, Rashmi [1 ]
Geethakumari, G. [1 ]
Mitra, Barsha [1 ]
机构
[1] BITS Pilani, Dept CSIS, Hyderabad Campus, Pilani, Rajasthan, India
关键词
Internet of Things; Routing Protocol for Low Power and Lossy Networks; Network Partitioning Attack; Mitigation; LOSSY NETWORKS; LOW-POWER; RPL;
D O I
10.1016/j.adhoc.2021.102583
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) environment comprises large scale deployment of constrained devices like RFIDs and sensors making routing an essential requirement. These constrained devices are part of the Low power and Lossy Networks (LLNs) in the IoT. The Internet Engineering Task Force standardized IPv6 Routing Protocol for Low power and Lossy Networks (RPL) as the routing protocol for LLNs in IoT. IoT-LLNs are organized as multiple Destination Oriented Directed Acyclic Graphs (DODAGs). The root node in the DODAG organizes and maintains the DODAG through broadcast based configuration information dissemination process. The root node also connects the various nodes in the DODAG to the rest of the IoT network. Hence, for any node in the IoT-LLN, connectivity with the root node is important. We present a novel Network Partitioning Attack (NPA) scenario against RPL in IoT-LLNs wherein a malicious node segregates a section of the IoT-LLN from the root node and thus from the rest of the IoT network. In this paper, we discuss in-depth the vulnerabilities of RPL, which result in the proposed Network Partitioning Attack. We present an analytical model to demonstrate the impact of the attack on the performance of the routing protocol and validate the model through simulation. We also suggest mechanisms to mitigate the attack.
引用
收藏
页数:11
相关论文
共 38 条
  • [1] SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things
    Airehrour, David
    Gutierrez, Jairo A.
    Ray, Sayan Kumar
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 860 - 876
  • [2] Secure routing for internet of things: A survey
    Airehrour, David
    Gutierrez, Jairo
    Ray, Sayan Kumar
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 : 198 - 213
  • [3] [Anonymous], 2016, A Taxonomy of Attacks in RPL-based Internet of Things
  • [4] Aris A, 2016, IEEE IFIP NETW OPER, P776, DOI 10.1109/NOMS.2016.7502897
  • [5] A survey on,routing protocols supported by the Contiki Internet of things operating system
    Bin Zikria, Yousaf
    Afzal, Muhammad Khalil
    Ishmanov, Farruh
    Kim, Sung Won
    Yu, Heejung
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 : 200 - 219
  • [6] Cervantes C, 2015, PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), P606, DOI 10.1109/INM.2015.7140344
  • [7] Chen BB, 2018, INT CONF COMMUN SYST, P167, DOI 10.1109/COMSNETS.2018.8328194
  • [8] Cirstea C, 2012, 2012 35TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), P37, DOI 10.1109/TSP.2012.6256248
  • [9] UNIT DISK GRAPHS
    CLARK, BN
    COLBOURN, CJ
    JOHNSON, DS
    [J]. DISCRETE MATHEMATICS, 1990, 86 (1-3) : 165 - 177
  • [10] Clausen T., 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications, P365, DOI 10.1109/WiMOB.2011.6085374