Intrusion Detection System Based RPL Attack Detection Techniques and Countermeasures in IoT: A Comparison

Routing Protocol for Low power and Lossy Network (RPL) is a light weight routing protocol designed for LLN (Low Power Lossy Networks). It is a source routing protocol. Due to constrained nature of resources in LLN, RPL is exposed to various attacks such as blackhole attack, wormhole attack, rank attack, version attack, etc. IDS (Intrusion Detection System) is one of the countermeasures for detection and prevention of attacks for RPL based loT. Traditional IDS techniques are not suitable for LLN due to certain characteristics like different protocol stack, standards and constrained resources. In this paper, we have presented various IDS research contribution for RPL based routing attacks. We have also classified the proposed IDS in the literature, according to the detection techniques. Therefore, this comparison will be an eye-opening stuff for future research in mitigating routing attacks for RPL based IoT.

[1]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[2]  Geethapriya Thamilarasu,et al.  Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things , 2019, Sensors.

[3]  Rosilah Hassan,et al.  A STUDY ON PROTOCOL STACK IN 6LOWPAN MODEL , 2012 .

[4]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[5]  Jonathan Loo,et al.  Specification-based IDS for securing RPL from topology attacks , 2011, 2011 IFIP Wireless Days (WD).

[6]  Elisa Bertino,et al.  Kalis — A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[7]  Virender Ranga,et al.  Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT , 2019, Wireless Personal Communications.

[8]  Ali Dehghantanha,et al.  Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[9]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[10]  Jinquan Zeng,et al.  Research on immunity-based intrusion detection technology for the Internet of Things , 2011, 2011 Seventh International Conference on Natural Computation.

[11]  Abhishek Gupta,et al.  Computational intelligence based intrusion detection systems for wireless communication and pervasive computing networks , 2013, 2013 IEEE International Conference on Computational Intelligence and Computing Research.

[12]  Snehal Deshmukh-Bhosale,et al.  A Real-Time Intrusion Detection System for Wormhole Attack in the RPL based Internet of Things , 2019, Procedia Manufacturing.

[13]  Hon Sun Chiu,et al.  Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .

[14]  Pavan Pongle,et al.  A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[15]  A. Umamakeswari,et al.  InDReS: An Intrusion Detection and response system for Internet of Things with 6LoWPAN , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[16]  Ismail Ahmedy,et al.  Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol , 2018, IEEE Access.

[17]  Roger Achkar,et al.  A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks , 2019, Int. J. Interdiscip. Telecommun. Netw..

[18]  Tsung-Han Lee,et al.  A Lightweight Intrusion Detection Scheme Based on Energy Consumption Analysis in 6LowPAN , 2013, EMC/HumanCom.

[19]  Anis Koubaa,et al.  RPL in a nutshell: A survey , 2012, Comput. Networks.

[20]  Michele Nogueira Lima,et al.  Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[21]  Sanjay Sharma,et al.  A study on Need of Adaptation Layer in 6LoWPAN Protocol Stack , 2017 .

[22]  Peter Burnap,et al.  Pulse: an adaptive intrusion detection for the internet of things , 2018, IoT 2018.

[23]  Chung-Horng Lung,et al.  Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[24]  Deokho Kim,et al.  A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things , 2014, Sensors.