Secure Routing in IoT: Evaluation of RPL's Secure Mode under Attacks

As the Routing Protocol for Low Power and Lossy Networks (RPL) became the standard for routing in the Internet of Things (IoT) networks, many researchers had investigated the security aspects of this protocol. However, no work (to the best of our knowledge) has investigated the use of the security mechanisms included in the protocol’s standard, due to the fact that there was no implementation for these features in any IoT operating system yet. A partial implementation of RPL’s security mechanisms was presented recently for Contiki operating system (by Perazzo et al.), which provided us with the opportunity to examine RPL’s security mechanisms. In this paper, we investigate the effects and challenges of using RPL’s security mechanisms under common routing attacks. First, a comparison of RPL’s performance, with and without its security mechanisms, under three routing attacks (Blackhole, Selective-Forward, and Neighbor attacks) is conducted using several metrics (e.g., average data packet delivery rate, average data packet delay, average power consumption... etc.) Based on the observations from this comparison, we come up with few suggestions that could reduce the effects of such attacks, without having added security mechanisms for RPL.

[1]  Jonathan Loo,et al.  The impacts of internal threats towards Routing Protocol for Low power and lossy network performance , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).

[2]  Carsten Bormann,et al.  Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) , 2012, RFC.

[3]  Chung-Horng Lung,et al.  Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[4]  Theodore B. Zahariadis,et al.  Evaluation of RPL with a transmission count-efficient and trust-aware routing metric , 2014, 2014 IEEE International Conference on Communications (ICC).

[5]  Gianluca Dini,et al.  An Implementation and Evaluation of the Security Features of RPL , 2017, ADHOC-NOW.

[6]  Charles E. Perkins,et al.  Registration Extensions for IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) Neighbor Discovery , 2018, RFC.

[7]  Pascal Thubert,et al.  Objective Function Zero for the Routing Protocol for Low-Power and Lossy Networks (RPL) , 2012, RFC.

[8]  Diego Dujovne,et al.  Traffic-aware Objective Function , 2018 .

[9]  Adam Dunkels,et al.  Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[10]  Ivan Mezei,et al.  Routing protocol for low-power and Lossy wireless sensor networks , 2011, 2011 19thTelecommunications Forum (TELFOR) Proceedings of Papers.

[11]  David E. Culler,et al.  TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.

[12]  Imed Romdhani,et al.  New trust metric for the RPL routing protocol , 2017, 2017 8th International Conference on Information and Communication Systems (ICICS).

[13]  Philip Levis,et al.  The Minimum Rank with Hysteresis Objective Function , 2012, RFC.

[14]  Djamel Tandjaoui,et al.  Trust-based RPL for the Internet of Things , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[15]  Cong Pu,et al.  Mitigating Forwarding misbehaviors in RPL-based low power and lossy networks , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[16]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[17]  Behçet Sarikaya,et al.  Address-Protected Neighbor Discovery for Low-Power and Lossy Networks , 2020, RFC.

[18]  Remi Badonnel,et al.  A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..

[19]  Shailendra Shukla,et al.  Impact of packet dropping attacks on RPL , 2016, 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC).

[20]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[21]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.