A survey: Attacks on RPL and 6LoWPAN in IoT

6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard allows heavily constrained devices to connect to IPv6 networks. 6LoWPAN is novel IPv6 header compression protocol, it may go easily under attack. Internet of Things consist of devices which are limited in resource like battery powered, memory and processing capability etc. for this a new network layer routing protocol is designed called RPL (Routing Protocol for low power Lossy network). RPL is light weight protocol and doesn't have the functionality like of traditional routing protocols. This rank based routing protocol may goes under attack. Providing security in Internet of Things is challenging as the devices are connected to the unsecured Internet, limited resources, the communication links are lossy and set of novel technologies used such as RPL, 6LoWPAN etc. This paper focus on possible attacks on RPL and 6LoWPAN network, counter measure against them and consequences on network parameters. Along with comparative analysis of methods to mitigate these attacks are done and finally the research opportunities in network layer security are discussed.

[1]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[2]  Syed Obaid Amin,et al.  A novel coding scheme to implement signature based IDS in IP based Sensor Networks , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management-Workshops.

[3]  Utz Roedig,et al.  Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[4]  Kevin Weekly,et al.  Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).

[5]  Joel J. P. C. Rodrigues,et al.  Network Admission Control Solution for 6LoWPAN Networks , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[6]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[7]  Levente Buttyán,et al.  VeRA - Version Number and Rank Authentication in RPL , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[8]  Thomas C. Schmidt,et al.  TRAIL: Topology Authentication in RPL , 2016, EWSN.

[9]  Remi Badonnel,et al.  A Study of RPL DODAG Version Attacks , 2014, AIMS.

[10]  Xiaohui Liang,et al.  Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.

[11]  Maurizio A. Spirito,et al.  Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[12]  Maurizio A. Spirito,et al.  DEMO: An IDS framework for internet of things empowered by 6LoWPAN , 2013, CCS.

[13]  Hanno Wirtz,et al.  6LoWPAN fragmentation attacks and mitigation mechanisms , 2013, WiSec '13.

[14]  Utz Roedig,et al.  Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN , 2014, Secur. Commun. Networks.

[15]  Taeshik Shon,et al.  Wormhole attack prevention mechanism for RPL based LLN network , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).

[16]  Joseph G. Tront,et al.  Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid , 2014, CISR '14.

[17]  Jonathan Loo,et al.  The impacts of internal threats towards Routing Protocol for Low power and lossy network performance , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).

[18]  Jonathan Loo,et al.  The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.

[19]  Jonathan Loo,et al.  Specification-based IDS for securing RPL from topology attacks , 2011, 2011 IFIP Wireless Days (WD).

[20]  Jonathan Loo,et al.  6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..

[21]  Chen Jun,et al.  Design of Complex Event-Processing IDS in Internet of Things , 2014, 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.