Routing Protocol for Low Power and Lossy network (RPL) is the underlying routing protocol of 6LoWPAN standard to enable the integration of Wireless Sensor Network on the Internet. Security is an essential requirement for the protocol/standard to be public accepted. One major security issue of RPL is the non-tamper resistant nature of the wireless sensor device, which can make it easy to be compromised and leads to cryptography keys exposed. If this happens, the attackers can join the network as the internal legitimate users and can manipulate the network operation based on controlling the compromised nodes. These internal attackers can make severe consequences to the network performance. In this paper, we present a simulation-based study of the impacts of different types of such attacks on RPL. We consider several new internal threats towards RPL, namely Rank attack, Local Repair attack, Neighbour attack and DIS attack. Specifically we study how the network performance can be affected by those attacks through metrics such as end-to-end delay, delivery ratio and control overhead generated. To the best of our knowledge, this is the first paper that studies the vulnerability and the performance of RPL under these internal security threats.
[1]
Philip Levis,et al.
RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks
,
2012,
RFC.
[2]
Jonathan Loo,et al.
Specification-based IDS for securing RPL from topology attacks
,
2011,
2011 IFIP Wireless Days (WD).
[3]
Jonathan Loo,et al.
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach
,
2012,
Int. J. Commun. Syst..
[4]
Uyen Trang Nguyen,et al.
A study of different types of attacks on multicast in mobile ad hoc networks
,
2008,
Ad Hoc Networks.
[5]
Alhussein A. Abouzeid,et al.
RPL Based Routing for Advanced Metering Infrastructure in Smart Grid
,
2010,
2010 IEEE International Conference on Communications Workshops.
[6]
Arjan Durresi,et al.
Routing Loops in DAG-Based Low Power and Lossy Networks
,
2010,
2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[7]
T. Kavitha,et al.
Security Vulnerabilities In Wireless Sensor Networks: A Survey
,
2010
.