Security explorations for routing attacks in low power networks on internet of things

The routing protocol for low power and lossy networks works as an effective method for communication in Contiki. However, many security attacks exist in RPL. These attacks affect the traffic or energy of the network. This paper focused on the persistent explorations of Contiki-based IoT networks to examine the effect of three well-known security attacks that exist on RPL. The RPL security attacks are named as: hello flood attack, decreased rank attack and increased version attack. The impact of these security attacks has been evaluated for scalability, energy efficiency and destination-oriented directed acyclic graph construction over simulated IoT networks in Contiki. All three aforesaid attacks are found to be responsible for affecting the DODAG construction, rising the network traffic and power consumption in one way or the other. To investigate the impact of attacks particularly on the scalability, the simulations are accomplished using eight different scenarios. It is found that the throughput of the network increases with the rise in the number of normal nodes (N) up to a critical point, at which N has optimum value. It is found that at N = 40, the critical point appears for many categories in different attacks. Like, “resdm” and “resem” categories possess this critical point through hello flood attack. Similarly, the “rdsdm” category has maximum throughput at N = 40 through increased version attack. Likewise, the decreased rank attack brought this critical point at N = 40 for categories “rdsem” and “resem”. The simulation results show that regardless of the attacks “rese” and “rdse” categories produce more throughput than “resd” and “rdsd” categories. This work also demonstrates the effect of the size of heterogenous packets on multiple throughput metrics.

[1]  Roger Achkar,et al.  A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks , 2019, Int. J. Interdiscip. Telecommun. Netw..

[2]  Mansour Sheikhan,et al.  A hybrid intrusion detection architecture for Internet of things , 2016, 2016 8th International Symposium on Telecommunications (IST).

[3]  Nicola Fanizzi,et al.  Class expression induction as concept space exploration: From DL-Foil to DL-Focl , 2020, Future Gener. Comput. Syst..

[4]  Maurizio A. Spirito,et al.  Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[5]  GaddourOlfa,et al.  Survey RPL in a nutshell , 2012 .

[6]  Michael Gerndt,et al.  Wireless sensors networks for Internet of Things , 2016, 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[7]  Remi Badonnel,et al.  A Study of RPL DODAG Version Attacks , 2014, AIMS.

[8]  Fabrice Theoleyre,et al.  Efficient topology construction for RPL over IEEE 802.15.4 in wireless sensor networks , 2014, Ad Hoc Networks.

[9]  Azzedine Boukerche,et al.  A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-Power and Lossy Networks: A Focus on Core Operations , 2019, IEEE Communications Surveys & Tutorials.

[10]  Young-Bae Ko,et al.  Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks , 2016, Secur. Commun. Networks.

[11]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[12]  Mohammed Bouhorma,et al.  Denial-of-Service attacks on 6LoWPAN-RPL networks: Threats and an intrusion detection system proposition , 2014 .

[13]  Sema F. Oktug,et al.  RPL version number attacks: In-depth study , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.

[14]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[15]  Sanjay Pawar,et al.  Node level energy consumption analysis in 6LoWPAN network using real and emulated Zolertia Z1 motes , 2016, 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).

[16]  Remi Badonnel,et al.  Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks , 2015, Int. J. Netw. Manag..

[17]  Snehal Deshmukh-Bhosale,et al.  A Real-Time Intrusion Detection System for Wormhole Attack in the RPL based Internet of Things , 2019, Procedia Manufacturing.

[18]  Adnan Noor Mian,et al.  Experimental study of link quality in IEEE 802.15.4 using Z1 Motes , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).

[19]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[20]  Rafael Timóteo de Sousa Júnior,et al.  Security analysis of a proposed internet of things middleware , 2017, Cluster Computing.

[21]  Chung-Horng Lung,et al.  Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[22]  Barsha Mitra,et al.  Efficient Framework for Detection of Version Number Attack in Internet of Things , 2018, ISDA.

[23]  Sanjay Pawar,et al.  Effect of radio link and network layer parameters on performance of Zolertia Z1 motes based 6LoWPAN , 2017, 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT).

[24]  Ashok Kumar Turuk,et al.  A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).

[25]  Adam Dunkels,et al.  Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[26]  Mustafa Kocakulak,et al.  An overview of Wireless Sensor Networks towards internet of things , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).

[27]  Sebastian Thrun,et al.  Parallel Stochastic Hill- Climbing with Small Teams , 2005 .

[28]  BottaAlessio,et al.  Integration of Cloud computing and Internet of Things , 2016 .

[29]  Awais Ahmed,et al.  A novel and secure attacks detection framework for smart cities industrial internet of things , 2020 .

[30]  Pongpisit Wuttidittachotti,et al.  Discovery of Suitable Node Number for Wireless Sensor Networks Based on Energy Consumption using Cooja , 2019, 2019 21st International Conference on Advanced Communication Technology (ICACT).

[31]  D. Vydeki,et al.  Measurement and Analysis of QoS Parameters in RPL Network , 2018, 2018 Tenth International Conference on Advanced Computing (ICoAC).

[32]  Amin Karami,et al.  A Wormhole Attack Detection and Prevention Technique in Wireless Sensor Networks , 2017 .

[33]  B. B. Gupta,et al.  Security in Internet of Things: issues, challenges, taxonomy, and architecture , 2017, Telecommunication Systems.

[34]  Byomakesh Mahapatra,et al.  Performance Evaluation of RPL protocol in a 6LoWPAN based Smart Home Environment , 2020, 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA).

[35]  Anis Koubaa,et al.  RPL in a nutshell: A survey , 2012, Comput. Networks.

[36]  Yeqiong Song,et al.  Using Cooja for WSN Simulations: Some New Uses and Limits , 2016, EWSN.

[37]  Elie F. Kfoury,et al.  Generic hybrid methods for secure connections based on the integration of GBA and TLS/CA , 2017, 2017 Sensors Networks Smart and Emerging Technologies (SENSET).

[38]  Remi Badonnel,et al.  Addressing DODAG inconsistency attacks in RPL networks , 2014, 2014 Global Information Infrastructure and Networking Symposium (GIIS).

[39]  J. Tiberghien,et al.  Poster Abstract: Outdoors Range Measurements with Zolertia Z1 Motes and Contiki , 2013, REALWSN.

[40]  In-Ho Ra,et al.  Multi-Topology Based QoS-Differentiation in RPL for Internet of Things Applications , 2020, IEEE Access.

[41]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[42]  Gabi Dreo Rodosek,et al.  Towards a trust computing architecture for RPL in Cyber Physical Systems , 2013, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013).

[43]  Adam Dunkels,et al.  Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[44]  Ali Diabat,et al.  A comprehensive survey of the Grasshopper optimization algorithm: results, variants, and applications , 2020, Neural Computing and Applications.

[45]  Ahmad Y. Javaid,et al.  Comparative Analysis of Simulation and Real-World Energy Consumption for Battery-Life Estimation of Low-Power IoT (Internet of Things) Deployment in Varying Environmental Conditions Using Zolertia Z1 Motes , 2016, S-CUBE.

[46]  Mohammed Bouhorma,et al.  Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions , 2014 .

[47]  Gianluca Dini,et al.  Implementation of a wormhole attack against a rpl network: Challenges and effects , 2018, 2018 14th Annual Conference on Wireless On-demand Network Systems and Services (WONS).

[48]  Chao-Tung Yang,et al.  Next-generation Internet of things and cloud security solutions , 2019, Int. J. Distributed Sens. Networks.

[49]  Mridula Sharma,et al.  Simulating Attacks for RPL and Generating Multi-class Dataset for Supervised Machine Learning , 2019, 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).

[50]  Pavan Pongle,et al.  A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[51]  Abderrezak Rachedi,et al.  A Secure Routing Protocol Based on RPL for Internet of Things , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[52]  Mário Alves,et al.  mRPL+: A mobility management framework in RPL/6LoWPAN , 2017, Comput. Commun..

[53]  Zhengguo Sheng,et al.  Performance Analysis of Routing Protocol for Low Power and Lossy Networks (RPL) in Large Scale Networks , 2017, IEEE Internet of Things Journal.

[54]  Constantin F. Aliferis,et al.  The max-min hill-climbing Bayesian network structure learning algorithm , 2006, Machine Learning.

[55]  Enzo Mingozzi,et al.  Implementation of Software-Defined 6LoWPANs in Contiki OS , 2019, 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[56]  Manuel Ricardo,et al.  Improving the energy efficiency of WSN by using application-layer topologies to constrain RPL-defined routing trees , 2014, 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET).

[57]  Byung-Seo Kim,et al.  Internet of Things (IoT) Operating Systems Support, Networking Technologies, Applications, and Challenges: A Comparative Review , 2018, IEEE Communications Surveys & Tutorials.

[58]  Remi Badonnel,et al.  A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..