Digital Signature Based Countermeasure Against Puppet Attack in the Internet of Things

In order to achieve the goal of smooth interaction and communication, a novel distance vector and source routing protocol, also officially referred to as RPL, has been proposed for IPv6-based Low Power and Lossy Networks (LLNs) which serve as a major component in the architecture of Internet of Things (IoT). Unfortunately, IoT devices are often equipped with limited energy and extremely constrained with regard to the capabilities of computing and communicating, thus, IoT and its applications are seriously vulnerable to diverse cyber attacks, and investigating possible attacks against IoT-related routing protocol is a top priority to enhance the security of IoT systems in the future. In this paper, we propose a digital signature based countermeasure along with other techniques to defend against puppet attack in LLNs running with RPL. The experimental results indicate that the proposed digital signature based countermeasure can not only reduce the performance impact of puppet attack significantly, but also can accurately detect and effectively mitigate puppet attack.

[1]  Cong Pu Spam DIS Attack Against Routing Protocol in the Internet of Things , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).

[2]  Cong Pu,et al.  Jamming-Resilient Multipath Routing Protocol for Flying Ad Hoc Networks , 2018, IEEE Access.

[3]  Cong Pu,et al.  Mitigating Suppression Attack in Multicast Protocol for Low Power and Lossy Networks , 2018, 2018 IEEE 43rd Conference on Local Computer Networks (LCN).

[4]  Sema F. Oktug,et al.  New lightweight mitigation techniques for RPL version number attacks , 2019, Ad Hoc Networks.

[5]  Angel Lozano,et al.  A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs) , 2015, RFC.

[6]  Preetha Thulasiraman,et al.  A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[7]  Cong Pu,et al.  Energy Depletion Attack in Low Power and Lossy Networks: Analysis and Defenses , 2019, 2019 2nd International Conference on Data Intelligence and Security (ICDIS).

[8]  Siarhei Kuryla,et al.  RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .

[9]  Cong Pu,et al.  Mitigating stealthy collision attack in energy harvesting motivated networks , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).

[10]  Cong Pu,et al.  Hatchetman Attack: A Denial of Service Attack Against Routing in Low Power and Lossy Networks , 2018, 2018 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2018 4th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom).

[11]  Imed Romdhani,et al.  Addressing the DAO Insider Attack in RPL’s Internet of Things Networks , 2019, IEEE Communications Letters.

[12]  Cong Pu,et al.  Spy vs. spy: Camouflage-based active detection in energy harvesting motivated networks , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[13]  Cong Pu,et al.  A Light-Weight Countermeasure to Forwarding Misbehavior in Wireless Sensor Networks: Design, Analysis, and Evaluation , 2018, IEEE Systems Journal.

[14]  Cong Pu Energy Depletion Attack Against Routing Protocol in the Internet of Things , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[15]  Cong Pu Mitigating DAO inconsistency attack in RPL-based low power and lossy networks , 2018, 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC).

[16]  Cong Pu,et al.  Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses , 2018, Sensors.

[17]  Cong Pu,et al.  Self-Adjusting Share-Based Countermeasure to Interest Flooding Attack in Named Data Networking , 2019, 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[18]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[19]  Cong Pu,et al.  Mitigating Forwarding misbehaviors in RPL-based low power and lossy networks , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[20]  Cong Pu,et al.  EYES: Mitigating forwarding misbehavior in energy harvesting motivated networks , 2018, Comput. Commun..

[21]  Cong Pu,et al.  Active detection in mitigating routing misbehavior for MANETs , 2019, Wirel. Networks.