Security Against Rank Attack in RPL Protocol

The Routing Protocol for Low Power and Lossy Networks (RPL) is experiencing a wave of security threats, due to the need of its utility in the Internet of Things (IoT). RPL is so far considered as one of the most utilized routing protocols in new IoT applications, which is one of the reasons the latter may lead to confronting challenges later on. In other words, security is thus the primary interest in RPL, regarding the nature of objects and their different constraints that are regularly regarded as security vulnerabilities for cyber-attacks. To continue, it is evident to claim that it is mandatory to determine and analyze all the kinds of attacks that target this protocol, such as the rank attack which is best known for its strongest threats that lead to degraded topology performance and energy consumption of nodes in the network. This study presents an overview of RPL, a proposed taxonomy of all the recent published works about rank attacks as well as the different mitigation methods, and the damage caused on network parameters. To conclude, a comparison between several attacks has been adopted using the Friedman test, and a discussion has been presented with some other recent research concerning security against rank attack.

[1]  Prakash Srivastava,et al.  Trust-based Enhanced Secure Routing against Rank and Sybil Attacks in IoT , 2019, 2019 Twelfth International Conference on Contemporary Computing (IC3).

[2]  Thomas C. Schmidt,et al.  TRAIL: Topology Authentication in RPL , 2016, EWSN.

[3]  Fereidoon Shams Aliee,et al.  Dynamic and comprehensive trust model for IoT and its integration into RPL , 2018, The Journal of Supercomputing.

[4]  Levente Buttyán,et al.  VeRA - Version Number and Rank Authentication in RPL , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[5]  Abdul Rehman,et al.  Rank attack using objective function in RPL for low power and lossy networks , 2016, 2016 International Conference on Industrial Informatics and Computer Systems (CIICS).

[6]  Nei Kato,et al.  Harvesting and Threat Aware Security Configuration Strategy for IEEE 802.15.4 Based IoT Networks , 2019, IEEE Communications Letters.

[7]  Emmanuel S. Pilli,et al.  RMDD: Cross Layer Attack in Internet of Things , 2018, 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[8]  Iwao Sasase,et al.  Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network , 2015, 2015 21st Asia-Pacific Conference on Communications (APCC).

[9]  Abbas Jamalipour,et al.  Mobility-Aware Energy-Efficient Parent Selection Algorithm for Low Power and Lossy Networks , 2019, IEEE Internet of Things Journal.

[10]  Abderrezak Rachedi,et al.  A Secure Routing Protocol Based on RPL for Internet of Things , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[11]  Behrouz Shahgholi Ghahfarokhi,et al.  Sinkhole+CloneID: A hybrid attack on RPL performance and detection method , 2019, Inf. Secur. J. A Glob. Perspect..

[12]  Krishna Asawa,et al.  Impact analysis of rank attack with spoofed IP on routing in 6LoWPAN network , 2017, 2017 Tenth International Conference on Contemporary Computing (IC3).

[13]  Jonathan Loo,et al.  The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.

[14]  Sayan Kumar Ray,et al.  SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..