A Security Analysis of LOADng Routing Protocol

Along with other standards, the Lightweight Ondemand Ad hoc Distance-vector routing protocol - Next Generation (LOADng), has provided a baseline architecture for the Internet of Things. Trying to ensure an advanced communication in the world of smart, tiny and embedded networking devices, LOADng should establish and maintain secure links between all communicating objects. This paper mainly addresses the security aspect of LOADng routing, it analyses the impact of using ICV and Timestamp TLVs protection to preserve control messages from various possible vulnerabilities. The experimental evaluation, through the Contiki OS, proves the feasibility and the efficiency of these two security methods against LOADng deficiencies.

[1]  Gabriel Montenegro,et al.  IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.

[2]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[3]  Mohamed-Lamine Messai Classification of Attacks in Wireless Sensor Networks , 2014, ArXiv.

[4]  Joel J. P. C. Rodrigues,et al.  Performance evaluation of LOADng routing protocol in IoT P2P and MP2P applications , 2016, 2016 International Multidisciplinary Conference on Computer and Energy Science (SpliTech).

[5]  Rajendra V. Boppana,et al.  Mitigating malicious control packet floods in ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[6]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[7]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[8]  Andrzej Duda,et al.  Performance comparison of the RPL and LOADng routing protocols in a Home Automation scenario , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[9]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[10]  Anass Sedrati,et al.  Internet of Things challenges: A focus on security aspects , 2017, 2017 8th International Conference on Information and Communication Systems (ICICS).

[11]  Tahar Ezzedine,et al.  LOADng Routing Protocol Evaluation for Bidirectional Data flow in AMI Mesh Networks , 2015, ArXiv.

[12]  Thomas H. Clausen,et al.  Integrity Check Value and Timestamp TLV Definitions for Mobile Ad Hoc Networks (MANETs) , 2012, RFC.

[13]  Thomas Clausen,et al.  Evaluation of routing protocol for low power and Lossy Networks: LOADng and RPL , 2013, 2013 IEEE Conference on Wireless Sensor (ICWISE).

[14]  Axel Colin de Verdiere,et al.  The Lightweight On-demand Ad hoc Distance-vector Routing Protocol - Next Generation (LOADng) , 2012 .

[15]  Cédric Adjih,et al.  Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format , 2009, RFC.