EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things

被引:0
作者
A. O. Bang
Udai Pratap Rao
机构
[1] Sardar Vallabhbhai National Institute of Technology (SVNIT),Computer Science and Engineering Department
来源
Peer-to-Peer Networking and Applications | 2022年 / 15卷
关键词
RPL; Internet of things; Rank attack; Objective function; Echelon metric; IPv6; 6LoWPAN;
D O I
暂无
中图分类号
学科分类号
摘要
Routing Protocol for Low Power and Lossy Networks (RPL) is the only standard protocol that assists the routing process in Low Power and Lossy Networks (LLNs) - based Internet of Things (IoT) applications. However, due to the resource-constrained nature, lack of physical protection and security requirements of the inherent protocol, LLNs are vulnerable to attacks that primarily alter the working of the RPL protocol and disrupt the ongoing communication. Therefore, it is a high profit and desperate target of many attackers. Our work offers a detailed overview of one such significant threat to RPL known as the rank attack. Considering the resource-constrained nature of the IoT devices, we propose and evaluate a lightweight and efficient method to mitigate and isolate the rank attack. Specifically, our approach uses a novel Echelon Metric Based Objective Function (EMBOF) over the default RPL to calculate and check the legitimacy of the advertised rank. The Echelon value is additively determined by the root node and the corresponding parent node(s) in the RPL network topology. Our approach not only detects the attacker node(s) but also isolates it immediately. We implement and evaluate our approach through extensive simulations in Cooja, a Contiki operating system (OS) based simulator. The results of our experiments show the viability of our proposal concerning detection accuracy, isolation latency, packet delivery ratio, end-to-end delay, power consumption and memory overhead.
引用
收藏
页码:642 / 665
页数:23
相关论文
共 91 条
  • [1] Son D(2020)Internet of things system technologies based on quality of experience Peer Peer Netw Appl 13 475-488
  • [2] Huh S(2018)The internet of things: A review of enabled technologies and future challenges IEEE Access 7 7606-7640
  • [3] Lee T(2018)Cross-layer cooperative multichannel medium access for internet of things Peer Peer Netw Appl 11 504-517
  • [4] Kwak J(2020)Lidl: Localization with early detection of sybil and wormhole attacks in iot networks Comput Secur 94 101849-1606
  • [5] Din IU(2018)Routing attacks and mitigation methods for rpl-based internet of things IEEE Commun Surv Tutorials 21 1582-5967
  • [6] Guizani M(2019)Rpl-based routing protocols in iot applications: A review IEEE Sens J 19 5952-61
  • [7] Hassan S(2020)Cosec-rpl: detection of copycat attacks in rpl based 6lowpans using outlier analysis Telecommun Syst 75 43-71
  • [8] Kim B-S(2018)Addressing the dao insider attack in rpl’s internet of things networks IEEE Commun Lett 23 68-347
  • [9] Khan MK(2020)Attestation-enabled secure and scalable routing protocol for iot networks Ad Hoc Netw 98 102054-2674
  • [10] Atiquzzaman M(2020)Resilient against spoofing in 6lowpan networks by temporary-private ipv6 addresses Peer Peer Netw Appl 13 333-438