Evaluating and improving the scalability of RPL security in the Internet of Things

Abstract Wireless Sensor and Actuator Networks (WSANs) will represent a key building block for the future Internet of Things, as a cheap and easily-deployable technology to connect smart devices on a large scale. In WSAN the Routing Protocol for Low-Power and Lossy Networks (RPL) has a crucial role as the standard IPv6-based routing protocol. RPL specifications define a basic set of security features, without which it would be open to disruptive routing attacks. However, the impact of these features on the WSAN performance has not been thoroughly investigated yet. The contribution of this paper is two-fold. First, we extensively evaluate the impact of security mechanisms on the scalability of WSANs by means of both simulations and real experiments. We show that the protection against eavesdropping and forgery has a modest impact on the performance, whereas the protection against replay has a more considerable impact, especially on the network formation time which increases noticeably. Despite this, we show that protecting against replay reduces the number of control messages exchanged and improves routes optimality. For these reasons, we recommend to always use the security mechanisms. Finally, we propose a standard-compliant optimization for defending against replay that reduces the impact on the overall performance.

[1]  Jose A. Gutierrez,et al.  IEEE 802.15.4 Low-Rate Wireless Personal Area Networks: Enabling Wireless Sensor Networks , 2003 .

[2]  Angel Lozano,et al.  A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs) , 2015, RFC.

[3]  Jonathan Loo,et al.  The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.

[4]  David E. Culler,et al.  Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.

[5]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[6]  Remi Badonnel,et al.  A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..

[7]  David E. Culler,et al.  An IPv6 Routing Header for Source Routes with the Routing Protocol for Low-Power and Lossy Networks (RPL) , 2012, RFC.

[8]  Gianluca Dini,et al.  DIO Suppression Attack Against Routing in the Internet of Things , 2017, IEEE Communications Letters.

[9]  Gianluca Dini,et al.  On evaluating the performance impact of the IEEE 802.15.4 security sub-layer , 2014, Comput. Commun..

[10]  Adam Dunkels,et al.  The ContikiMAC Radio Duty Cycling Protocol , 2011 .

[11]  Giuseppe Anastasi,et al.  Interplay of Link Quality Estimation and RPL Performance: An Experimental Study , 2016, PE-WASUN@MSWiM.

[12]  Martin Stehlík Comparison of Simulators for Wireless Sensor Networks , 2011 .

[13]  JeongGil Ko,et al.  The Trickle Algorithm , 2011, RFC.

[14]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[15]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[16]  Robert Tappan Morris,et al.  a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.

[17]  Russ Housley,et al.  Counter with CBC-MAC (CCM) , 2003, RFC.

[18]  Anis Koubaa,et al.  RPL in a nutshell: A survey , 2012, Comput. Networks.