The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things

被引:15
作者
Verma, Abhishek [1 ,2 ]
Ranga, Virender [2 ]
机构
[1] GLA Univ, Inst Engn & Technol, Dept Comp Engn & Applicat, Mathura, India
[2] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
Internet of Things; RPL; 6LoWPAN; LLN; Routing; Copycat attack; LOW-POWER; SECURITY CHALLENGES; ROUTING ATTACKS; PROTOCOL; LOT;
D O I
10.1007/s00607-020-00862-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is the standard network layer protocol for achieving efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Resource-constrained and non-tamper resistant nature of smart sensor nodes makes RPL protocol susceptible to different threats. An attacker may use insider or outsider attack strategy to perform Denial-of-Service (DoS) attacks against RPL based networks. Security and Privacy risks associated with RPL protocol may limit its global adoption and worldwide acceptance. A proper investigation of RPL specific attacks and their impacts on an underlying network needs to be done. In this paper, we present and investigate one of the catastrophic attacks named as a copycat attack, a type of replay based DoS attack against the RPL protocol. An in-depth experimental study for analyzing the impacts of the copycat attack on RPL has been done. The experimental results show that the copycat attack can significantly degrade network performance in terms of packet delivery ratio, average end-to-end delay, and average power consumption. To the best of our knowledge, this is the first paper that extensively studies the impact of RPL specific replay mechanism based DoS attack on 6LoWPAN networks.
引用
收藏
页码:1479 / 1500
页数:22
相关论文
共 57 条
[1]  
Advancare S., 2010, Zolertia: Z1 datasheet
[2]   Secure routing for internet of things: A survey [J].
Airehrour, David ;
Gutierrez, Jairo ;
Ray, Sayan Kumar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :198-213
[3]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[4]   The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks [J].
Anhtuan Le ;
Loo, Jonathan ;
Lasebae, Aboubaker ;
Vinel, Alexey ;
Chen, Yue ;
Chai, Michael .
IEEE SENSORS JOURNAL, 2013, 13 (10) :3685-3692
[5]  
[Anonymous], 2007, Tech. Rep
[6]  
[Anonymous], 2015, TECH REP
[7]  
[Anonymous], 2012, Tech rep
[8]  
[Anonymous], 2016, PROC INT C EMBEDDED
[9]  
[Anonymous], 2011, TECH REP
[10]  
Ashton K., 2009, RFID J, V22, P97