Defense Denial-of Service Attacks on IPv6 Wireless Sensor Networks

As IoT (Internet of Things) has become popular, more tiny devices and sensors are deployed to monitor our environment. Wireless sensor network is a typical implementation of IoT. Wireless sensor networks consist of many tiny sensors with sensing and communication ability. The applications of wireless sensor networks are widely used today in battlefield guard, circumstance monitor, and traffic analysis. Point to point communication is one of the most important characteristics of IoT, and a great volume of IP address is needed for IoT applications. The existing IP protocol, IPv4, could not provide enough public IP addresses for IoT applications. IPv6 allowing 2128, or approximately 3.4 × 1038 addresses, or more than 7.9 × 1028 times as many as IPv4. It is a promising solution for IoT applications and IP shortage issues. Sensor network often carries on mission-critical tasks. Thus, security in sensor network is vital. Wormhole attack may threat the availability of networks by dropping data randomly or disturbing routing path. In this paper, we propose a detection mechanism which is based on RPL routing protocol. In RPL routing protocol, an information called “Rank” is used to avoid routing loops by computing a node’s position relative to other nodes with respect to the DODAG(Destination Oriented Directed Acyclic Graph) root. The proposed approach detects wormhole attack by identifying abnormal Rank values. The proposed approach uses only Rank information without any extra hardware.

[1]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[2]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[3]  Siarhei Kuryla,et al.  RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .

[4]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[5]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[6]  Issa M. Khalil,et al.  MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks , 2006, 2006 Securecomm and Workshops.

[7]  Panagiotis Papadimitratos,et al.  Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.

[8]  Abdur Rahim Choudhary,et al.  Securing IPv6 network infrastructure: A new security model , 2010, 2010 IEEE International Conference on Technologies for Homeland Security (HST).

[9]  James B. D. Joshi,et al.  IPv6 Security Challenges , 2009, Computer.

[10]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.