A Root-based Defense Mechanism Against RPL Blackhole Attacks in Internet of Things Networks

With the rapid development of the Internet of Things (IoT), various smart “things”, such as home appliances, vehicles and mobile medical devices, connected through the Internet are increasingly adopted by consumers. Many of such connections are enabled by IoT routing protocol: IPv6 Routing Protocol for Low Power and Lossy Networks (RPL), which utilizes a variety of objective functions (OFs) and routing constraints to establish an optimal routing path for each network node. However, recent studies show that topology attacks, such as Blackhole attacks, have brought great security challenges to the secure routing in IoT networks. On the other hand, as most of the IoT edge devices are resource constrainted, they cannot afford intensive computations and communications required by conventional security solutions. Therefore, in this work, we propose a lightweight defense mechanism based on RPL routing protocol to detect Blackhole attacks and exclude the detected malicious nodes from the routing network. The results show that the proposed mechanism can effectively detect and defend against Blackhole attacks while causing limited energy consumption overhead.

[1]  Daniel John Benson A Performance Study of RPL with Trickle Algorithm Variants , 2016 .

[2]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[3]  Gutierrez Jairo,et al.  Securing RPL routing protocol from blackhole attacks using a trust-based mechanism , 2016 .

[4]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[5]  Manuel Ricardo,et al.  Energy-efficient node selection in application-driven WSN , 2017, Wirel. Networks.

[6]  Siarhei Kuryla,et al.  RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .

[7]  Jonathan Loo,et al.  6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..

[8]  James L. Antonakos,et al.  Computer Networking for LANS to WANS: Hardware, Software and Security , 2009 .

[9]  Hazrat Ali A Performance Evaluation of RPL in Contiki , 2012 .

[10]  Emmanuel Baccelli,et al.  Applicability Statement: The Use of the Routing Protocol for Low-Power and Lossy Networks (RPL) Protocol Suite in Home Automation and Building Control , 2016, RFC.

[11]  Kevin Weekly,et al.  Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).

[12]  Angel Lozano,et al.  A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs) , 2015, RFC.

[13]  Remi Badonnel,et al.  A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..

[14]  Hazrat Ali A Performance Evaluation of RPL in Contiki A Cooja Simulation based study , 2012 .