EA-RPL: A Delay-Disruption Tolerant Approach for RPL-based IoT Networks against Inimical Attacks
Keywords:
Contiki, Cooja Simulator, DoS, DTN, IoTAbstract
The IETF has introduced a protocol known as the Routing Protocol for Low Power and Lossy Networks (RPL) tailored for Low Power Lossy networks. RPL stands out as a lightweight routing protocol, making it particularly well-suited for IoT sensor networks. However, its lightweight nature leaves it vulnerable to various routing attacks. On the other hand, Delay Tolerant Networks represent another network category primarily focused on providing solutions that cater to delay, fault tolerance, and energy efficiency in resource-constrained environments. This paper provides a concise examination of the vulnerabilities of RPL and recognizes a resemblance in the identification of inactive nodes within a solution inspired by Delay Tolerant Networks. The research introduces a novel approach named EA-RPL, which is developed based on the monitoring of power consumption and statistical outlier analysis for identifying dormant nodes. The study involves the implementation and analysis of Flooding and DODAG Version attacks on RPL, and the simulations conducted in the Contiki OS and Cooja simulator yield promising proof-of-concept results. These results are based on the assessment of performance metrics encompassing radio duty cycle and energy consumption, which enable the successful identification of attackers.
Downloads
References
A. Conta, Deering, S., M. Gupta, E. (2006). RFC 4443:Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification. RFC 4443, 53(9), 1689–1699. https://doi.org/10.1017/CBO9781107415324.004
Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). Secure routing for internet of things: A survey. Journal of Network and Computer Applications, 66, 198–213. https://doi.org/10.1016/j.jnca.2016.03.006
(Wireless sensor networks: a survey. Computer Networks, , (2002). , )Chen, Y., Chanet, J.-P., Hou, K.-M., Shi, H., & De Sousa, G. (2015). A Scalable Context-Aware Objective Function (SCAOF) of Routing Protocol for Agricultural Low-Power and Lossy Networks (RPAL). Sensors, 15, 19507–19540. https://doi.org/10.3390/s150819507
D’Hondt, A., Bahmad, H., & Vanhee, J. (2016). RPL Attacks Framework. Retrieved from https://github.com/dhondta/rpl-attacks/blob/master/doc/report.pdf
Dodig-crnkovic, G. (2002). Scientific Methods in Computer Science. Computer (Long.
Beach. Calif)., 126–130. Retrieved from http://poincare.math.rs/~vladaf/Courses/Matf MNSR/Literatura/Scientific Methods in Computer Science.pdf
Dodis, Y., Kiltz, E., Pietrzak, K., & Wichs, D. (2012). Message Authentication, Revisited (pp. 355–374). https://doi.org/10.1007/978-3-642-29011-4_22
Dohler, M., Daza, C. V, & Lozano, A. (2012). draft-ietf-roll-security-framework-07 - A Security Framework for Routing over Low Power and Lossy Networks.
Dohler CTTC Daza A Lozano Universitat Pompeu Fabra M Richardson, M. V. (2015).
RFC 7416 - A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks …RPLs—.
Dunkels, A., Schmidt, O., Finne, N., Eriksson, J., Österlind, F., & Durvy, N. T. M. (2011). The Contiki OS: The Operating System for the Internet of Things.
Online], at Http://www. Contikios. Org.
Dvir, A., Holczer, T., & Buttyan, L. (2011). VeRA - Version number and rank authentication in RPL. Proceedings - 8th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2011, 709–714.
https://doi.org/10.1109/MASS.2011.76
Evans, D. (2011). The Internet of Things - How the Next Evolution of the Internet is Changing Everything. CISCO White Paper, (April), 1–11. https://doi.org/10.1109/IEEESTD.2007.373646
Farooq, M. U., Waseem, M., & Khairi, A. (2015). A Critical Analysis on the Security Concerns of Internet of Things (IoT). International Journal of Computer Applications, 111(7).
Gaddour, O., & Koubâa, A. (2012). RPL in a nutshell: A survey. Computer Networks, 56(14), 3163–3178. https://doi.org/10.1016/j.comnet.2012.06.016
Kelsey, R. (2015). 7/17/2015 RFC 6550 - RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks, 1–314. https://doi.org/10.17487/rfc6550
Kirichek, R., & Koucheryavy, A. (2016). Internet of Things Laboratory Test Bed. In Wireless Communications, Networking and Applications, Wcna 2014. https://doi.org/10.1007/978-81-322-2580-5_44
Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., & Chai, M. (2013). The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sensors Journal, 13(10), 3685–3692. https://doi.org/10.1109/JSEN.2013.2266399
Levis, P., Clausen, T., Hui, J., Gnawali, O., & Ko, J. (2011). RFC 6206 - The Trickle Algorithm. Internet Requests for Comments. https://doi.org/10.1017/CBO9781107415324.004
Marco, P. D. I. (2008). Protocol Design and Implementation for Wireless Sensor Networks. Piergiuseppe Di Marco, (April). Retrieved from https://www.diva- portal.org/smash/get/diva2:572787/FULLTEXT01.pdf
Mayzaud, A., Badonnel, R., & Chrisment, I. (2016). A Taxonomy of Attacks in RPL- based Internet of Things. International Journal of Network Security IJNS, 18(3), 459–473. Retrieved from https://hal.inria.fr/hal-01207859
Moteiv. (2006). T-Mote Sky Datasheet. Electronics, 1–28.
Nataf, E., & Festor, O. (2012). Online Estimation of Battery Lifetime for Wireless Sensor Network, (September), 28. Retrieved from https://arxiv.org/pdf/1209.2234.pdf
Perrey, H., Landsmann, M., Ugus, O., Schmidt, T. C., & Wählisch, M. (2013). TRAIL: Topology Authentication in RPL. 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 73–74.
https://doi.org/10.1109/INFCOMW.2013.6970745
Pongle, P., & Chavan, G. (2015). A survey: Attacks on RPL and 6LoWPAN in IoT. In 2015 International Conference on Pervasive Computing (ICPC) (pp. 1–6). IEEE. https://doi.org/10.1109/PERVASIVE.2015.7087034
RGHIOUI, A., KHANNOUS, A., & BOUHORMA, M. (2014). Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions. Journal of Advanced Computer Science & Technology, 3(2), 143. https://doi.org/10.14419/jacst.v3i2.3321
Ruckebusch, P., Devloo, J., Carels, D., De Poorter, E., & Moerman, I. (n.d.). An evaluation of link estimation algorithms for RPL in dynamic wireless sensor networks. Retrieved from http://www.wishful- project.eu/sites/default/files/scube_2015.pdf
Sharma, D., Assistant, S., Mishra, I., & Jain, S. (n.d.). ISSN: 2454-132X Impact factor: 4.295 A Detailed Classification of Routing Attacks against RPL in Internet of Things. International Journal of Advance Research Ideas and Innovations in Technology. Retrieved from https://www.ijariit.com/manuscripts/v3i1/V3I1- 1257.pdf
Shukla, P., & Professor, A. (2007). Comparative Analysis of Distance Vector Routing & Link State Protocols. International Journal of Innovative Research in Computer and Communication Engineering (An ISO Certified Organization), 3297(10). https://doi.org/10.15680/IJIRCCE.2015
Sunshine, C. A. (1977). Source routing in computer networks. ACM SIGCOMM Computer Communication Review, 7(1), 29–33. https://doi.org/10.1145/1024853.1024855
Thomson, C. (2016). Cooja Simulator Manual, (C), 2015–2016. https://doi.org/10.13140/RG.2.1.4274.8408
Thubert, P. (2012). RFC 6552 - Objective Function Zero for the Routing Protocol for Low-Power and Lossy Networks (RPL). Internet Requests for Comments, 1–14. https://doi.org/10.1017/CBO9781107415324.004
Vasseur, J.-P., & Dunkels, A. (2010). RPL Routing in Smart Object Networks. Interconnecting Smart Objects with IP. https://doi.org/10.1016/B978-0-12- 375165-2.00017-X
Vasseur, J., Fellow, C., Systems, C., Agarwal, N., Leader, T., & Hui, J. (2011). RPL: The IP routing protocol designed for low power and lossy networks Internet Protocol for Smart Objects (IPSO) Alliance.
Vijayarani, S., Maria, M., S, S., & Professor, A. (2015). INTRUSION DETECTION SYSTEM – A STUDY. International Journal of Security, Privacy and Trust Management, 4(1). https://doi.org/10.5121/ijsptm.2015.4104
Wang, Q., & Balasingham, I. (n.d.). Wireless Sensor Networks -An Introduction 1 0 Wireless Sensor Networks -An Introduction. Retrieved from http://cdn.intechweb.org/pdfs/12464.pdf
"An efficient intrusion detection scheme for mitigating nodes using data aggregation in delay tolerant network." . NavazASSyed, J. Antony Daniel Rex, and P. Anjala MarySeptember–2015, .International Journal of Scientific & Engineering Research, Vol No-6.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.