LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks

Abstract The Internet of Things (IoT) is recognized as a disruptive innovation that has been led by industry leaders and researchers. IoT promises to improve our daily life based on smart objects interacting with each other, and that can be connected to the Internet. Building a security framework into this new paradigm is a significant technical challenge today. It is mainly due to the low-cost and resource-constrained nature of IoT devices. In most of the IoT application scenarios, the routing is done by the de-facto standard protocol called routing protocol for low power and lossy networks (RPL). The use of RPL is suitable due to its energy-efficient schemes, availability of secure and multiple communication modes, and adaptivity to work in various IoT network scenarios. Hence, many researchers are now focusing on RPL related security issues. To this end, our work provides a concise description of two major threats to RPL called sybil and wormhole attacks. Moreover, we propose two solutions to detect these attacks in RPL-based IoT networks. Specifically, our proposed techniques exploit the concept of Highest Rank Common Ancestor (HRCA) to find a common ancestor with the highest rank among all the ancestors that a pair of nodes have in the target network tree. Our two detection algorithms not only detect an ongoing attack but also localizes the position of the adversary in the network. Thus, it makes the mitigation process lightweight and fast. We implement the two approaches in Cooja, the Contiki network emulator. The results obtained from our experiments demonstrate the feasibility of the proposals concerning true positive rate, detection time, packet loss ratio, memory consumption, and network overhead. Our techniques show promising to cover more complex scenarios in the future.

[1]  Ahmad-Reza Sadeghi,et al.  IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[2]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[3]  Xiaohui Liang,et al.  Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.

[4]  Hon Sun Chiu,et al.  Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .

[5]  Ahmad-Reza Sadeghi,et al.  Revisiting Context-Based Authentication in IoT , 2018, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).

[6]  Ruchi Mehta,et al.  Trust based mechanism for Securing IoT Routing Protocol RPL against Wormhole &Grayhole Attacks , 2018, 2018 3rd International Conference for Convergence in Technology (I2CT).

[7]  Jonathan Loo,et al.  The impacts of internal threats towards Routing Protocol for Low power and lossy network performance , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).

[8]  Ivana Tomić,et al.  A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.

[9]  Mohsen Guizani,et al.  A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.

[10]  Abderrezak Rachedi,et al.  A Secure Routing Protocol Based on RPL for Internet of Things , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[11]  Majid Khabbazian,et al.  Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks , 2009, IEEE Transactions on Wireless Communications.

[12]  Michele Nogueira Lima,et al.  Evaluation of Sybil attack detection approaches in the Internet of Things content dissemination , 2016, 2016 Wireless Days (WD).

[13]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[14]  Andrew H. Kemp,et al.  RPL-Based Routing Protocols in IoT Applications: A Review , 2019, IEEE Sensors Journal.

[15]  Pavan Pongle,et al.  A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[16]  Preetha Thulasiraman,et al.  A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[17]  Sayan Kumar Ray,et al.  SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..

[18]  Muhammad Nasir Mumtaz Bhutta,et al.  Wormhole attack detection in routing protocol for low power lossy networks , 2017, 2017 International Conference on Information and Communication Technologies (ICICT).

[19]  Cong Pu,et al.  Mitigating Forwarding misbehaviors in RPL-based low power and lossy networks , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[20]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[21]  Pavan Pongle,et al.  Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .

[22]  Imed Romdhani,et al.  Addressing the DAO Insider Attack in RPL’s Internet of Things Networks , 2019, IEEE Communications Letters.

[23]  Gianluca Dini,et al.  Implementation of a wormhole attack against a rpl network: Challenges and effects , 2018, 2018 14th Annual Conference on Wireless On-demand Network Systems and Services (WONS).

[24]  Shahid Raza,et al.  TinyIKE: Lightweight IKEv2 for Internet of Things , 2019, IEEE Internet of Things Journal.

[25]  Virender Ranga,et al.  ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things , 2019, 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU).

[26]  Shusen Yang,et al.  BRPL: Backpressure RPL for High-Throughput and Mobile IoTs , 2017, IEEE Transactions on Mobile Computing.

[27]  Mauro Conti,et al.  SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things , 2018, 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[28]  David E. Culler,et al.  Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey , 2017, IEEE Communications Surveys & Tutorials.

[29]  Chung-Horng Lung,et al.  Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[30]  G. Geethakumari,et al.  Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).