The Flooding Attack in Low Power and Lossy Networks: A Case Study

Routing Protocol for Low Power and Lossy Networks (RPL) has been specially designed to support the interconnection between resource-constrained devices. It has been well-known that the RPL is exposed to various internal DoS attacks. One of the most effective attacks seems to be the flooding. This paper assesses the impact that the flooding attack has on the RPL network. This attack is observed to decrease the packet delivery rate, while increasing the end-to-end packet delay. We also investigate the overhearing solution and show that such mechanism can be used as a primary indicator to detect and eliminate the flooding attack from the network.

[1]  Marco Conti,et al.  The role of the RPL routing protocol for smart grid communications , 2013, IEEE Communications Magazine.

[2]  Jonathan Loo,et al.  A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology , 2016, Inf..

[3]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[4]  Vashek Matyas,et al.  Neighbor-Based Intrusion Detection for Wireless Sensor Networks , 2010, 2010 6th International Conference on Wireless and Mobile Communications.

[5]  Remi Badonnel,et al.  A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..

[6]  David E. Culler,et al.  Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[7]  Sayan Kumar Ray,et al.  Securing RPL routing protocol from blackhole attacks using a trust-based mechanism , 2016, 2016 26th International Telecommunication Networks and Applications Conference (ITNAC).

[8]  Angel Lozano,et al.  A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs) , 2015, RFC.

[9]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[10]  Jonathan Loo,et al.  The impacts of internal threats towards Routing Protocol for Low power and lossy network performance , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).

[11]  Siarhei Kuryla,et al.  RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .

[12]  Jonathan Loo,et al.  6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..