Using Provenance to Detect Selective Forwarding Attack in RPL-Based Internet of Things

In the Internet of Things (IoT), resource-constrained things can connect to the Internet via IPv6 and 6LoWPAN networks. The Routing Protocol for Low-Power and Lossy Networks (RPL) has enabled such interconnection. However, the data transportation using RPL is vulnerable to various attacks due to the interaction between unattended things with the unreliable Internet. For instance, the data generated by sensors are vulnerable to attacks (for instance, selective forwarding attack). Therefore, error-free and reliable information cannot be assured in the decision-making process. During data transmission from source to destination, provenance can be used to track data acquisition and data traversal. In this paper, we use provenance to evaluate the network performance by computing the packet delivery ratio (PDR) at each forwarding node in the packet path. Furthermore, to identify the faulty nodes, we counted the packets received from the respective child nodes in the routing table at each parent node participating in the network. We have evaluated the proposed approach for RPL-based IoT in terms of provenance size, provenance generation time, and memory consumption.

[1]  Adeel Anjum,et al.  Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes , 2017, J. Netw. Comput. Appl..

[2]  Keke Gai,et al.  Security and Privacy Issues in Internet of Things , 2019, Blockchain Technology in Internet of Things.

[3]  Choong Seon Hong,et al.  Data trustworthiness in IoT , 2018, 2018 International Conference on Information Networking (ICOIN).

[4]  Mrs. K. Valarmathi,et al.  A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks , 2016 .

[5]  Sabah Suhail,et al.  Introducing Secure Provenance in IoT: Requirements and Challenges , 2016, 2016 International Workshop on Secure Internet of Things (SIoT).

[6]  Elisa Bertino,et al.  Dictionary Based Secure Provenance Compression for Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.

[7]  Adam Dunkels,et al.  Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[8]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[9]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[10]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[11]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.