The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things

被引:15
作者
Verma, Abhishek [1 ,2 ]
Ranga, Virender [2 ]
机构
[1] GLA Univ, Inst Engn & Technol, Dept Comp Engn & Applicat, Mathura, India
[2] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
Internet of Things; RPL; 6LoWPAN; LLN; Routing; Copycat attack; LOW-POWER; SECURITY CHALLENGES; ROUTING ATTACKS; PROTOCOL; LOT;
D O I
10.1007/s00607-020-00862-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is the standard network layer protocol for achieving efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Resource-constrained and non-tamper resistant nature of smart sensor nodes makes RPL protocol susceptible to different threats. An attacker may use insider or outsider attack strategy to perform Denial-of-Service (DoS) attacks against RPL based networks. Security and Privacy risks associated with RPL protocol may limit its global adoption and worldwide acceptance. A proper investigation of RPL specific attacks and their impacts on an underlying network needs to be done. In this paper, we present and investigate one of the catastrophic attacks named as a copycat attack, a type of replay based DoS attack against the RPL protocol. An in-depth experimental study for analyzing the impacts of the copycat attack on RPL has been done. The experimental results show that the copycat attack can significantly degrade network performance in terms of packet delivery ratio, average end-to-end delay, and average power consumption. To the best of our knowledge, this is the first paper that extensively studies the impact of RPL specific replay mechanism based DoS attack on 6LoWPAN networks.
引用
收藏
页码:1479 / 1500
页数:22
相关论文
共 57 条
[31]   Low-power and lossy networks under mobility: A survey [J].
Oliveira, Afonso ;
Vazao, Teresa .
COMPUTER NETWORKS, 2016, 107 :339-352
[32]  
Olsson J., 2014, Texas Instruments, P13
[33]   Application of Internet of Things in Smart Grid Power Transmission [J].
Ou, Qinghai ;
Zhen, Yan ;
Li, Xiangzhen ;
Zhang, Yiying ;
Zeng, Lingkang .
2012 THIRD FTRA INTERNATIONAL CONFERENCE ON MOBILE, UBIQUITOUS, AND INTELLIGENT COMPUTING (MUSIC), 2012, :96-100
[34]   Standardized Protocol Stack for the Internet of (Important) Things [J].
Palattella, Maria Rita ;
Accettura, Nicola ;
Vilajosana, Xavier ;
Watteyne, Thomas ;
Grieco, Luigi Alfredo ;
Boggia, Gennaro ;
Dohler, Mischa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03) :1389-1406
[35]   DIO Suppression Attack Against Routing in the Internet of Things [J].
Perazzo, Pericle ;
Vallati, Carlo ;
Anastasi, Giuseppe ;
Dini, Gianluca .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (11) :2524-2527
[36]   The limitations in the state-of-the-art counter-measures against the security threats in H-IoT [J].
Qadri, Yazdan Ahmad ;
Ali, Rashid ;
Musaddiq, Arslan ;
Al-Turjman, Fadi ;
Kim, Dae Wan ;
Kim, Sung Won .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (03) :2047-2065
[37]   Routing Attacks and Mitigation Methods for RPL-Based Internet of Things [J].
Raoof, Ahmed ;
Matrawy, Ashraf ;
Lung, Chung-Horng .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02) :1582-1606
[38]   A novel blockchain based framework to secure IoT-LLNs against routing attacks [J].
Sahay, Rashmi ;
Geethakumari, G. ;
Mitra, Barsha .
COMPUTING, 2020, 102 (11) :2445-2470
[39]   A roadmap for security challenges in the Internet of Things [J].
Sfar, Arbia Riahi ;
Natalizio, Enrico ;
Challal, Yacine ;
Chtourou, Zied .
DIGITAL COMMUNICATIONS AND NETWORKS, 2018, 4 (02) :118-137
[40]   Detection of rank attack in routing protocol for Low Power and Lossy Networks [J].
Shafique, Usman ;
Khan, Abid ;
Rehman, Abdur ;
Bashir, Faisal ;
Alam, Masoom .
ANNALS OF TELECOMMUNICATIONS, 2018, 73 (7-8) :429-438