The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things

被引:15
作者
Verma, Abhishek [1 ,2 ]
Ranga, Virender [2 ]
机构
[1] GLA Univ, Inst Engn & Technol, Dept Comp Engn & Applicat, Mathura, India
[2] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
Internet of Things; RPL; 6LoWPAN; LLN; Routing; Copycat attack; LOW-POWER; SECURITY CHALLENGES; ROUTING ATTACKS; PROTOCOL; LOT;
D O I
10.1007/s00607-020-00862-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is the standard network layer protocol for achieving efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Resource-constrained and non-tamper resistant nature of smart sensor nodes makes RPL protocol susceptible to different threats. An attacker may use insider or outsider attack strategy to perform Denial-of-Service (DoS) attacks against RPL based networks. Security and Privacy risks associated with RPL protocol may limit its global adoption and worldwide acceptance. A proper investigation of RPL specific attacks and their impacts on an underlying network needs to be done. In this paper, we present and investigate one of the catastrophic attacks named as a copycat attack, a type of replay based DoS attack against the RPL protocol. An in-depth experimental study for analyzing the impacts of the copycat attack on RPL has been done. The experimental results show that the copycat attack can significantly degrade network performance in terms of packet delivery ratio, average end-to-end delay, and average power consumption. To the best of our knowledge, this is the first paper that extensively studies the impact of RPL specific replay mechanism based DoS attack on 6LoWPAN networks.
引用
收藏
页码:1479 / 1500
页数:22
相关论文
共 57 条
[21]  
Hussain M. I., 2017, CSI Trans. ICT, V5, P87, DOI [10.1007/s40012-016-0136-6, DOI 10.1007/S40012-016-0136-6]
[22]   RPL: THE ROUTING STANDARD FOR THE INTERNET OF THINGS ... OR IS IT? [J].
Iova, Oana ;
Picco, Gian Pietro ;
Istomin, Timofei ;
Kiraly, Csaba .
IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (12) :16-22
[23]   Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach [J].
Jabez, J. ;
Muthukumar, B. .
INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 :338-346
[24]   A survey of routing attacks in mobile Ad Hoc networks [J].
Kannhavong, Bounpadith ;
Nakayama, Hidehisa ;
Nemoto, Yoshiaki ;
Kato, Nei ;
Jamalipour, Abbas .
IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) :85-91
[25]  
Kumar N, 2016, INT C SOFT COMP PATT, P262
[26]  
Le Anhtuan, 2013, 2013 IEEE Symposium on Computers and Communications (ISCC), P000789, DOI 10.1109/ISCC.2013.6755045
[27]   A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology [J].
Le, Anhtuan ;
Loo, Jonathan ;
Chai, Kok Keong ;
Aiash, Mahdi .
INFORMATION, 2016, 7 (02)
[28]  
MAYZAUD A., 2016, A Taxonomy of Attacks in RPL-based Internet of Things
[29]   Internet of Things: information security challenges and solutions [J].
Miloslavskaya, Natalia ;
Tolstoy, Alexander .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (01) :103-119
[30]   A Survey on Resource Management in loT Operating Systems [J].
Musaddiq, Arslan ;
Bin Zikria, Yousaf ;
Hahm, Oliver ;
Yu, Heejung ;
Bashir, Ali Kashif ;
Kim, Sung Won .
IEEE ACCESS, 2018, 6 :8459-8482