Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks

In the RPL routing protocol, DODAG Information Solicitation (DIS) control messages are sent by nodes to join the network. In turn, the receiver node replies with DODAG Information Object (DIO) control message after resetting its trickle timer. A malicious node can utilize this RPL protocol behavior to perform the DIS flooding attack by sending illegitimate DIS frequently which forces normal nodes to reset their trickle timers and flood the network with DIO messages. In this study, we show that such attacks can severely degrade the performance of Low Power and Lossy Networks (LLNs) because of the increase in control packet overhead and power consumption. To address DIS flooding attacks, we propose a lightweight mitigation scheme that detects and mitigate such attacks in order to improve LLNs performance.

[1]  Remi Badonnel,et al.  Detecting version number attacks in RPL-based networks using a distributed monitoring architecture , 2016, 2016 12th International Conference on Network and Service Management (CNSM).

[2]  Remi Badonnel,et al.  Using the RPL protocol for supporting passive monitoring in the Internet of Things , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.

[3]  Remi Badonnel,et al.  A Study of RPL DODAG Version Attacks , 2014, AIMS.

[4]  Siarhei Kuryla,et al.  RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .

[5]  Imed Romdhani,et al.  Addressing the DAO Insider Attack in RPL’s Internet of Things Networks , 2019, IEEE Communications Letters.

[6]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[7]  David E. Culler,et al.  Extending IP to Low-Power, Wireless Personal Area Networks , 2008, IEEE Internet Computing.

[8]  Abhishek Verma,et al.  Mitigation of DIS flooding attacks in RPL‐based 6LoWPAN networks , 2019, Trans. Emerg. Telecommun. Technol..

[9]  Chung-Horng Lung,et al.  Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[10]  Mansour Sheikhan,et al.  Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..

[11]  Gianluca Dini,et al.  An Implementation and Evaluation of the Security Features of RPL , 2017, ADHOC-NOW.

[12]  Virender Ranga,et al.  Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT , 2019, Wireless Personal Communications.

[13]  Preetha Thulasiraman,et al.  A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[14]  Sayan Kumar Ray,et al.  SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..

[15]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.

[16]  Hai Anh TRAN,et al.  The Flooding Attack in Low Power and Lossy Networks: A Case Study , 2018, 2018 International Conference on Smart Communications in Network Technologies (SaCoNeT).

[17]  Isabelle Chrisment,et al.  A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks , 2017, IEEE Transactions on Network and Service Management.

[18]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[19]  Jonathan Loo,et al.  The impacts of internal threats towards Routing Protocol for Low power and lossy network performance , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).

[20]  Angel Lozano,et al.  A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs) , 2015, RFC.

[21]  Jonathan Loo,et al.  A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology , 2016, Inf..

[22]  Virender Ranga,et al.  ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things , 2019, 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU).

[23]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.