Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP

The rapid growth of the Internet of Things (IoT) and the massive propagation of wireless technologies has revealed recent opportunities for development in various domains of real life, such as smart cities and E-Health applications. A slight defense against different forms of attack is offered for the current secure and lightweight Routing Protocol for Low Power and Lossy Networks (RPL) of IoT resource-constrained devices. Data packets are highly likely to be exposed in transmission during data packet routing. The RPL rank and version number attacks, which are two forms of RPL attacks, can have critical consequences for RPL networks. The studies conducted on these attacks have several security defects and performance shortcomings. In this research, we propose a Secure RPL Routing Protocol (SRPL-RP) for rank and version number attacks. This mainly detects, mitigates, and isolates attacks in RPL networks. The detection is based on a comparison of the rank strategy. The mitigation uses threshold and attack status tables, and the isolation adds them to a blacklist table and alerts nodes to skip them. SRPL-RP supports diverse types of network topologies and is comprehensively analyzed with multiple studies, such as Standard RPL with Attacks, Sink-Based Intrusion Detection Systems (SBIDS), and RPL+Shield. The analysis results showed that the SRPL-RP achieved significant improvements with a Packet Delivery Ratio (PDR) of 98.48%, a control message value of 991 packets/s, and an average energy consumption of 1231.75 joules. SRPL-RP provided a better accuracy rate of 98.30% under the attacks.

[1]  Levente Buttyán,et al.  VeRA - Version Number and Rank Authentication in RPL , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[2]  Andrew H. Kemp,et al.  RPL-Based Routing Protocols in IoT Applications: A Review , 2019, IEEE Sensors Journal.

[3]  Abdur Rehman,et al.  Detection of rank attack in routing protocol for Low Power and Lossy Networks , 2018, Ann. des Télécommunications.

[4]  Jonathan Loo,et al.  Specification-based IDS for securing RPL from topology attacks , 2011, 2011 IFIP Wireless Days (WD).

[5]  Emmanuel Nataf,et al.  Survey on RPL enhancements: A focus on topology, security and mobility , 2018, Comput. Commun..

[6]  Anant V. Nimkar,et al.  A comparative study on RPL attacks and security solutions , 2017, 2017 International Conference on Intelligent Computing and Control (I2C2).

[7]  Thomas C. Schmidt,et al.  TRAIL: Topology Authentication in RPL , 2016, EWSN.

[8]  V.K.Karthik,et al.  Addressing Attacks and Security Mechanism in the RPL based IOT , 2017 .

[9]  Sema F. Oktug,et al.  RPL version number attacks: In-depth study , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.

[10]  Iwao Sasase,et al.  Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network , 2015, 2015 21st Asia-Pacific Conference on Communications (APCC).

[11]  Virender Ranga,et al.  Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review , 2020, IEEE Sensors Journal.

[12]  Prakash Srivastava,et al.  Trust-based Enhanced Secure Routing against Rank and Sybil Attacks in IoT , 2019, 2019 Twelfth International Conference on Contemporary Computing (IC3).

[13]  N. Z. Jhanjhi,et al.  Proposing a Secure RPL based Internet of Things Routing Protocol: A Review , 2020, Ad Hoc Networks.

[14]  Abbas Jamalipour,et al.  A Lightweight Intrusion Detection for Sybil Attack Under Mobile RPL in the Internet of Things , 2020, IEEE Internet of Things Journal.

[15]  Sneha A. Dalvi,et al.  Internet of Things for Smart Cities , 2017 .

[16]  Sema F. Oktug,et al.  New lightweight mitigation techniques for RPL version number attacks , 2019, Ad Hoc Networks.

[17]  Young-Bae Ko,et al.  A Distributed and Cooperative Verification Mechanism to Defend against DODAG Version Number Attack in RPL , 2016, PECCS.

[18]  Hiren Patel,et al.  A Survey on Trust-based Intrusion Detection for Version Number Attack on RPL , 2018 .

[19]  Sayan Kumar Ray,et al.  Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..

[20]  Noor Zaman,et al.  A review on smart home present state and challenges: linked to context-awareness internet of things (IoT) , 2019, Wirel. Networks.

[21]  Noor Zaman,et al.  Proposing A Data Privacy Aware Protocol for Roadside Accident Video Reporting Service Using 5G In Vehicular Cloud Networks Environment , 2018, 2018 4th International Conference on Computer and Information Sciences (ICCOINS).

[22]  Jonathan Loo,et al.  The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.

[23]  Sajjad Mahmood,et al.  Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study , 2020, Arabian Journal for Science and Engineering.

[24]  Isabelle Chrisment,et al.  A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks , 2017, IEEE Transactions on Network and Service Management.

[25]  Murad Khan,et al.  Internet of Things: A Comprehensive Review of Enabling Technologies, Architecture, and Challenges , 2018 .

[26]  Noor Zaman,et al.  A Lightweight and Secure Authentication Scheme for IoT Based E-Health Applications , 2019 .

[27]  Preetha Thulasiraman,et al.  A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[28]  Sayan Kumar Ray,et al.  SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..

[29]  Xing Li,et al.  A Security Routing Protocol for Internet of Things Based on RPL , 2017, 2017 International Conference on Networking and Network Applications (NaNA).

[30]  Nz Jhanjhi,et al.  Comprehensive Review: Privacy Protection of User in Location-Aware Services of Mobile Cloud Computing , 2019, Wirel. Pers. Commun..

[31]  Mehdi Hosseinzadeh,et al.  A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power and Lossy Networks , 2018, Wirel. Pers. Commun..

[32]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[33]  Chung-Horng Lung,et al.  Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[34]  AirehrourDavid,et al.  Secure routing for internet of things , 2016 .

[35]  Song Han,et al.  ARM: A hybrid specification-based intrusion detection system for rank attacks in 6TiSCH networks , 2017, 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).

[36]  Abderrezak Rachedi,et al.  A Secure Routing Protocol Based on RPL for Internet of Things , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).