EA-RPL: A Delay-Disruption Tolerant Approach for RPL-based IoT Networks against Inimical Attacks

Authors

  • Anamika Chauhan

Keywords:

Contiki, Cooja Simulator, DoS, DTN, IoT

Abstract

The IETF has introduced a protocol known as the Routing Protocol for Low Power and Lossy Networks (RPL) tailored for Low Power Lossy networks. RPL stands out as a lightweight routing protocol, making it particularly well-suited for IoT sensor networks. However, its lightweight nature leaves it vulnerable to various routing attacks. On the other hand, Delay Tolerant Networks represent another network category primarily focused on providing solutions that cater to delay, fault tolerance, and energy efficiency in resource-constrained environments. This paper provides a concise examination of the vulnerabilities of RPL and recognizes a resemblance in the identification of inactive nodes within a solution inspired by Delay Tolerant Networks. The research introduces a novel approach named EA-RPL, which is developed based on the monitoring of power consumption and statistical outlier analysis for identifying dormant nodes. The study involves the implementation and analysis of Flooding and DODAG Version attacks on RPL, and the simulations conducted in the Contiki OS and Cooja simulator yield promising proof-of-concept results. These results are based on the assessment of performance metrics encompassing radio duty cycle and energy consumption, which enable the successful identification of attackers.

Downloads

Download data is not yet available.

References

A. Conta, Deering, S., M. Gupta, E. (2006). RFC 4443:Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification. RFC 4443, 53(9), 1689–1699. https://doi.org/10.1017/CBO9781107415324.004

Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). Secure routing for internet of things: A survey. Journal of Network and Computer Applications, 66, 198–213. https://doi.org/10.1016/j.jnca.2016.03.006

(Wireless sensor networks: a survey. Computer Networks, , (2002). , )Chen, Y., Chanet, J.-P., Hou, K.-M., Shi, H., & De Sousa, G. (2015). A Scalable Context-Aware Objective Function (SCAOF) of Routing Protocol for Agricultural Low-Power and Lossy Networks (RPAL). Sensors, 15, 19507–19540. https://doi.org/10.3390/s150819507

D’Hondt, A., Bahmad, H., & Vanhee, J. (2016). RPL Attacks Framework. Retrieved from https://github.com/dhondta/rpl-attacks/blob/master/doc/report.pdf

Dodig-crnkovic, G. (2002). Scientific Methods in Computer Science. Computer (Long.

Beach. Calif)., 126–130. Retrieved from http://poincare.math.rs/~vladaf/Courses/Matf MNSR/Literatura/Scientific Methods in Computer Science.pdf

Dodis, Y., Kiltz, E., Pietrzak, K., & Wichs, D. (2012). Message Authentication, Revisited (pp. 355–374). https://doi.org/10.1007/978-3-642-29011-4_22

Dohler, M., Daza, C. V, & Lozano, A. (2012). draft-ietf-roll-security-framework-07 - A Security Framework for Routing over Low Power and Lossy Networks.

Dohler CTTC Daza A Lozano Universitat Pompeu Fabra M Richardson, M. V. (2015).

RFC 7416 - A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks …RPLs—.

Dunkels, A., Schmidt, O., Finne, N., Eriksson, J., Österlind, F., & Durvy, N. T. M. (2011). The Contiki OS: The Operating System for the Internet of Things.

Online], at Http://www. Contikios. Org.

Dvir, A., Holczer, T., & Buttyan, L. (2011). VeRA - Version number and rank authentication in RPL. Proceedings - 8th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2011, 709–714.

https://doi.org/10.1109/MASS.2011.76

Evans, D. (2011). The Internet of Things - How the Next Evolution of the Internet is Changing Everything. CISCO White Paper, (April), 1–11. https://doi.org/10.1109/IEEESTD.2007.373646

Farooq, M. U., Waseem, M., & Khairi, A. (2015). A Critical Analysis on the Security Concerns of Internet of Things (IoT). International Journal of Computer Applications, 111(7).

Gaddour, O., & Koubâa, A. (2012). RPL in a nutshell: A survey. Computer Networks, 56(14), 3163–3178. https://doi.org/10.1016/j.comnet.2012.06.016

Kelsey, R. (2015). 7/17/2015 RFC 6550 - RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks, 1–314. https://doi.org/10.17487/rfc6550

Kirichek, R., & Koucheryavy, A. (2016). Internet of Things Laboratory Test Bed. In Wireless Communications, Networking and Applications, Wcna 2014. https://doi.org/10.1007/978-81-322-2580-5_44

Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., & Chai, M. (2013). The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sensors Journal, 13(10), 3685–3692. https://doi.org/10.1109/JSEN.2013.2266399

Levis, P., Clausen, T., Hui, J., Gnawali, O., & Ko, J. (2011). RFC 6206 - The Trickle Algorithm. Internet Requests for Comments. https://doi.org/10.1017/CBO9781107415324.004

Marco, P. D. I. (2008). Protocol Design and Implementation for Wireless Sensor Networks. Piergiuseppe Di Marco, (April). Retrieved from https://www.diva- portal.org/smash/get/diva2:572787/FULLTEXT01.pdf

Mayzaud, A., Badonnel, R., & Chrisment, I. (2016). A Taxonomy of Attacks in RPL- based Internet of Things. International Journal of Network Security IJNS, 18(3), 459–473. Retrieved from https://hal.inria.fr/hal-01207859

Moteiv. (2006). T-Mote Sky Datasheet. Electronics, 1–28.

Nataf, E., & Festor, O. (2012). Online Estimation of Battery Lifetime for Wireless Sensor Network, (September), 28. Retrieved from https://arxiv.org/pdf/1209.2234.pdf

Perrey, H., Landsmann, M., Ugus, O., Schmidt, T. C., & Wählisch, M. (2013). TRAIL: Topology Authentication in RPL. 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 73–74.

https://doi.org/10.1109/INFCOMW.2013.6970745

Pongle, P., & Chavan, G. (2015). A survey: Attacks on RPL and 6LoWPAN in IoT. In 2015 International Conference on Pervasive Computing (ICPC) (pp. 1–6). IEEE. https://doi.org/10.1109/PERVASIVE.2015.7087034

RGHIOUI, A., KHANNOUS, A., & BOUHORMA, M. (2014). Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions. Journal of Advanced Computer Science & Technology, 3(2), 143. https://doi.org/10.14419/jacst.v3i2.3321

Ruckebusch, P., Devloo, J., Carels, D., De Poorter, E., & Moerman, I. (n.d.). An evaluation of link estimation algorithms for RPL in dynamic wireless sensor networks. Retrieved from http://www.wishful- project.eu/sites/default/files/scube_2015.pdf

Sharma, D., Assistant, S., Mishra, I., & Jain, S. (n.d.). ISSN: 2454-132X Impact factor: 4.295 A Detailed Classification of Routing Attacks against RPL in Internet of Things. International Journal of Advance Research Ideas and Innovations in Technology. Retrieved from https://www.ijariit.com/manuscripts/v3i1/V3I1- 1257.pdf

Shukla, P., & Professor, A. (2007). Comparative Analysis of Distance Vector Routing & Link State Protocols. International Journal of Innovative Research in Computer and Communication Engineering (An ISO Certified Organization), 3297(10). https://doi.org/10.15680/IJIRCCE.2015

Sunshine, C. A. (1977). Source routing in computer networks. ACM SIGCOMM Computer Communication Review, 7(1), 29–33. https://doi.org/10.1145/1024853.1024855

Thomson, C. (2016). Cooja Simulator Manual, (C), 2015–2016. https://doi.org/10.13140/RG.2.1.4274.8408

Thubert, P. (2012). RFC 6552 - Objective Function Zero for the Routing Protocol for Low-Power and Lossy Networks (RPL). Internet Requests for Comments, 1–14. https://doi.org/10.1017/CBO9781107415324.004

Vasseur, J.-P., & Dunkels, A. (2010). RPL Routing in Smart Object Networks. Interconnecting Smart Objects with IP. https://doi.org/10.1016/B978-0-12- 375165-2.00017-X

Vasseur, J., Fellow, C., Systems, C., Agarwal, N., Leader, T., & Hui, J. (2011). RPL: The IP routing protocol designed for low power and lossy networks Internet Protocol for Smart Objects (IPSO) Alliance.

Vijayarani, S., Maria, M., S, S., & Professor, A. (2015). INTRUSION DETECTION SYSTEM – A STUDY. International Journal of Security, Privacy and Trust Management, 4(1). https://doi.org/10.5121/ijsptm.2015.4104

Wang, Q., & Balasingham, I. (n.d.). Wireless Sensor Networks -An Introduction 1 0 Wireless Sensor Networks -An Introduction. Retrieved from http://cdn.intechweb.org/pdfs/12464.pdf

"An efficient intrusion detection scheme for mitigating nodes using data aggregation in delay tolerant network." . NavazASSyed, J. Antony Daniel Rex, and P. Anjala MarySeptember–2015, .International Journal of Scientific & Engineering Research, Vol No-6.

Downloads

Published

12.06.2024

How to Cite

Anamika Chauhan. (2024). EA-RPL: A Delay-Disruption Tolerant Approach for RPL-based IoT Networks against Inimical Attacks. International Journal of Intelligent Systems and Applications in Engineering, 12(4), 4621–4630. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/7160

Issue

Section

Research Article