skip to main content
10.1145/3644713.3644809acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

Analytical Study of Local Repair Attack on RPL-Based 6LoWPAN Networks in Internet of Things

Authors Info & Claims
Published:13 May 2024Publication History

ABSTRACT

RPL was developed as a routing protocol in low-power and lossy network contexts to connect many applications using IP-based communication. However, RPL has been exploited to launch several attacks, including local repair attacks. we have evaluated the effect of the local repair attack on the network performance and compared it with the normal RPL. We have conducted simulations on different topologies that included grid and binary topology. The results obtained show that the local repair attack affects the performance of the RPL protocol. The drop in PDR has severely impacted the binary topology to reach only 82%. Moreover, the grid topology suffers from E2E delay, which increases by 50% to reach an average of 2.2 seconds. In addition, the grid topology consumes approximately 40% additional power when the network is under local repair attacks.

References

  1. Ryma Abassi and Sihem Guemara El Fatmi. 2017. A trust based communication scheme for safety messages exchange in VANETs. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 10517 LNCS. Springer Verlag, 92–103. https://doi.org/10.1007/978-3-319-67910-5_8Google ScholarGoogle ScholarCross RefCross Ref
  2. Andrea Agiollo, Mauro Conti, Pallavi Kaliyar, Tsung Nan Lin, and Luca Pajola. 2021. DETONAR: Detection of Routing Attacks in RPL-Based IoT. IEEE Transactions on Network and Service Management 18, 2 (2021), 1178–1190. https://doi.org/10.1109/TNSM.2021.3075496Google ScholarGoogle ScholarCross RefCross Ref
  3. Roger Alexander, Anders Brandt, J. P. Vasseur, Jonathan Hui, Kris Pister, Pascal Thubert, P. Levis, Rene Struik, Richard Kelsey, and Tim Winter. 2012. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. 6550 (2012). https://doi.org/10.17487/RFC6550Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Rakan Alghofaili, Hussah Albinali, and Farag Azzedin. 2024. Build–Launch–Consolidate Framework and Toolkit for Impact Analysis on Wireless Sensor Networks. (2024).Google ScholarGoogle Scholar
  5. Hazrat Ali, Simon Duquennoy, and Martin Boldt. 2015. A Performance evaluation of RPL in Contiki. CLOSER 2015 - 5th International Conference on Cloud Computing and Services Science, Proceedings (2015), 233–240. https://www.scopus.com/inward/record.uri?eid=2-s2.0-84969793934 & partnerID=40 & md5=e4087628bf9bdf2fce89089ddeb8b1e1Google ScholarGoogle Scholar
  6. Mahmood Alzubaidi, Mohammed Anbar, Samer Al-Saleem, Shadi Al-Sarawi, and Kamal Alieyan. 2017. Review on mechanisms for detecting sinkhole attacks on RPLs. ICIT 2017 - 8th International Conference on Information Technology, ProceedingsJuly (2017), 369–374. https://doi.org/10.1109/ICITECH.2017.8080028Google ScholarGoogle ScholarCross RefCross Ref
  7. Mahmood Alzubaidi, Mohammed Anbar, Yung-Wey Chong, and Shadi Al-Sarawi. 2018. Hybrid Monitoring Technique for Detecting Abnormal Behaviour in RPL-Based Network. jcm (2018), 198–208. https://doi.org/10.12720/jcm.13.5.198-208Google ScholarGoogle ScholarCross RefCross Ref
  8. Ahmet Arış, Sıddıka Berna Örs Yalçın, and Sema F. Oktuğ. 2019. New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Networks 85 (3 2019), 81–91. https://doi.org/10.1016/j.adhoc.2018.10.022Google ScholarGoogle ScholarCross RefCross Ref
  9. Karen Avila, Daladier Jabba, and Javier Gomez. 2020. Security Aspects for RPL-Based Protocols: A Systematic Review in IoT. Applied Sciences 10, 18 (2020), 6472.Google ScholarGoogle ScholarCross RefCross Ref
  10. Farag Azzedin. 2023. Mitigating Denial of Service Attacks in RPL-Based IoT Environments: Trust-Based Approach. IEEE Access 11 (2023), 129077–129089. https://doi.org/10.1109/ACCESS.2023.3331030Google ScholarGoogle ScholarCross RefCross Ref
  11. Farag Azzedin and Mustafa Ghaleb. 2019. Towards an architecture for handling big data in oil and gas industries: Service-oriented approach. International Journal of Advanced Computer Science and Applications 10, 2 (2019).Google ScholarGoogle ScholarCross RefCross Ref
  12. Ankur Bang and Udai Pratap Rao. 2023. Impact Analysis of Rank Attack on RPL-Based 6LoWPAN Networks in Internet of Things and Aftermaths. Arab J Sci Eng 48, 2 (Feb. 2023), 2489–2505. https://doi.org/10.1007/s13369-022-07342-yGoogle ScholarGoogle ScholarCross RefCross Ref
  13. Ankur O. Bang, Udai Pratap Rao, Pallavi Kaliyar, and Mauro Conti. 2023. Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey. Comput. Surveys 55 (2023), 1–36. Issue 2. https://doi.org/10.1145/3494524Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Victoria Bull. 2023. Intrusion Detection in the Internet of Things: From Sniffing to a Border Router’s Point of View.Google ScholarGoogle Scholar
  15. AE El-Sebakhy, A Abdulraheem, M Ahmed, A Al-Majed, P Raharja, F Azzedin, and T Sheltami. 2007. Functional network as a novel approach for prediction of permeability in a carbonate reservoir. In SPE Conference. 11–14.Google ScholarGoogle Scholar
  16. Behnam Farzaneh, Mohammad Koosha, Elahe Boochanpour, and Emad Alizadeh. 2020. A new method for intrusion detection on RPL routing protocol using fuzzy logic. In 2020 6th International Conference on Web Research (ICWR). IEEE, 245–250.Google ScholarGoogle ScholarCross RefCross Ref
  17. Olfa Gaddour and Anis Koubâa. 2012. RPL in a nutshell: A survey. Computer Networks 56, 14 (2012), 3163–3178. https://doi.org/10.1016/j.comnet.2012.06.016Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Vikas Hassija, Vinay Chamola, Vikas Saxena, Divyansh Jain, Pranav Goyal, and Biplab Sikdar. 2019. A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures., 82721–82743 pages. https://doi.org/10.1109/ACCESS.2019.2924045Google ScholarGoogle ScholarCross RefCross Ref
  19. Oana Iova, Pietro Picco, Timofei Istomin, and Csaba Kiraly. 2016. RPL: The Routing Standard for the Internet of Things... or Is It?IEEE Communications Magazine 54, 11 (dec 2016), 16–22. https://doi.org/10.1109/MCOM.2016.1600397CMGoogle ScholarGoogle ScholarCross RefCross Ref
  20. Usha Kiran. 2022. IDS To Detect Worst Parent Selection Attack In RPL-Based IoT Network. In 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS). IEEE, Bangalore, India, 769–773. https://doi.org/10.1109/COMSNETS53615.2022.9668340Google ScholarGoogle ScholarCross RefCross Ref
  21. Ulf Kulau, Silas Müller, Sebastian Schildt, Felix Büsching, and Lars Wolf. 2021. Investigation & Mitigation of the Energy Efficiency Impact of Node Resets in RPL. Ad Hoc Networks 114 (April 2021), 102417. https://doi.org/10.1016/j.adhoc.2021.102417Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Anhtuan Le, Jonathan Loo, Kok Keong Chai, and Mahdi Aiash. 2016. A specification-based IDS for detecting attacks on RPL-based network topology. Information (Switzerland) 7, 2 (2016). https://doi.org/10.3390/info7020025Google ScholarGoogle ScholarCross RefCross Ref
  23. Anhtuan Le, Jonathan Loo, Aboubaker Lasebae, Mahdi Aiash, and Yuan Luo. 2012. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach: IoT, 6LOWPAN, RPL, QOS SECURITY THREATS, IDS. Int. J. Commun. Syst. 25, 9 (Sept. 2012), 1189–1212.Google ScholarGoogle Scholar
  24. Anhtuan Le, Jonathan Loo, Yuan Luo, and Aboubaker Lasebae. 2011. Specification-based IDS for securing RPL from topology attacks. IFIP Wireless Days 1, 1 (2011), 4–6. https://doi.org/10.1109/WD.2011.6098218Google ScholarGoogle ScholarCross RefCross Ref
  25. Huichen Lin and Neil W Bergmann. 2016. IoT privacy and security challenges for smart home environments. Information 7, 3 (2016), 44.Google ScholarGoogle ScholarCross RefCross Ref
  26. Anthéa Mayzaud, Rémi Badonnel, and Isabelle Chrisment. 2017. A distributed monitoring strategy for detecting version number attacks in RPL-based networks. IEEE transactions on network and service management 14, 2 (2017), 472–486.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Faiza Medjek, Djamel Tandjaoui, Nabil Djedjig, and Imed Romdhani. 2021. Multicast DIS attack mitigation in RPL-based IoT-LLNs. Journal of Information Security and Applications 61 (Sept. 2021), 102939.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Sayed Mohammad Hossein Mirshahjafari and Behrouz Shahgholi Ghahfarokhi. 2019. Sinkhole+CloneID: A hybrid attack on RPL performance and detection method. Information Security Journal: A Global Perspective 28, 4-5 (Sept. 2019), 107–119. https://doi.org/10.1080/19393555.2019.1658829Google ScholarGoogle ScholarCross RefCross Ref
  29. Belghachi Mohamed and Feham Mohamed. 2015. QoS Routing RPL for Low Power and Lossy Networks. International Journal of Distributed Sensor Networks 2015 (2015). https://doi.org/10.1155/2015/971545Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Syeda M. Muzammal, Raja Kumar Murugesan, and N. Z. Jhanjhi. 2020. A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-based Approaches. IEEE Internet of Things Journal 4662, c (2020), 1–1. https://doi.org/10.1109/jiot.2020.3031162Google ScholarGoogle ScholarCross RefCross Ref
  31. Syeda Mariam Muzammal, Raja Kumar Murugesan, Noor Zaman Jhanjhi, Mamoona Humayun, Ashraf Osman Ibrahim, and Abdelzahir Abdelmaboud. 2022. A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things. Sensors 22, 18 (Sept. 2022), 7052. https://doi.org/10.3390/s22187052Google ScholarGoogle ScholarCross RefCross Ref
  32. P.S. Nandhini, S. Kuppuswami, S. Malliga, and R. DeviPriya. 2022. A Lightweight Energy-Efficient Algorithm for mitigation and isolation of Internal Rank Attackers in RPL based Internet of Things. Computer Networks 218 (Dec. 2022), 109391.Google ScholarGoogle Scholar
  33. P. Levis; T. Clausen, J. Hui, O. Gnawali, and J. Ko. 2011. The Trickle Algorithm. Internet Engineering Task Force (IETF) (2011). arXiv:arXiv:1011.1669v3http://www.rfc-editor.org/info/rfc6206.Google ScholarGoogle Scholar
  34. Pericle Perazzo, Carlo Vallati, Antonio Arena, Giuseppe Anastasi, and Gianluca Dini. 2017. An implementation and evaluation of the security features of RPL. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10517 LNCS, November (2017), 63–76. https://doi.org/10.1007/978-3-319-67910-5_6Google ScholarGoogle ScholarCross RefCross Ref
  35. Ahmed Raoof, Ashraf Matrawy, and Chung Horng Lung. 2019. Routing Attacks and Mitigation Methods for RPL-Based Internet of Things. IEEE Communications Surveys and Tutorials 21, 2 (2019), 1582–1606. https://doi.org/10.1109/COMST.2018.2885894Google ScholarGoogle ScholarCross RefCross Ref
  36. Ahmed Raoof, Ashraf Matrawy, and Chung-Horng Lung. 2019. Secure Routing in IoT: Evaluation of RPL’s Secure Mode under Attacks. In 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, 1–6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Ahmed Raoof, Ashraf Matrawy, and Chung-Horng Lung. 2020. Enhancing Routing Security in IoT: Performance Evaluation of RPL Secure Mode under Attacks. arXiv preprint arXiv:2004.07815 (2020).Google ScholarGoogle Scholar
  38. Abdul Rehman and M Ali Lodhi. 2016. Power and Lossy Networks. (2016).Google ScholarGoogle Scholar
  39. Rashmi Sahay, G. Geethakumari, and Barsha Mitra. 2021. A novel Network Partitioning Attack against Routing Protocol in Internet of Things. Ad Hoc Networks 121, January (2021), 102583. https://doi.org/10.1016/j.adhoc.2021.102583Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Javier Schandy, Leonardo Steinfeld, and Fernando Silveira. 2015. Average power consumption breakdown of Wireless Sensor Network nodes using IPv6 over LLNs. In 2015 International Conference on Distributed Computing in Sensor Systems. IEEE, 242–247.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Ali Seyfollahi, Meysam Moodi, and Ali Ghaffari. 2022. MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications. Computer Standards and Interfaces 82 (8 2022). https://doi.org/10.1016/j.csi.2022.103622Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Husam Issa Mohammad Suwad and Farag Ahmed Mohammad Azzedin. 2022. Asset-based security systems and methods. US Patent 11,347,843.Google ScholarGoogle Scholar
  43. Lionel Sujay Vailshery. 2022. Internet of Things (IoT) and non-IoT active device connections worldwide from 2010 to 2025. https://www.statista.com/statistics/1101442/iot-number-of-connected-devices-worldwide/.Google ScholarGoogle Scholar
  44. George Violettas, George Simoglou, Sophia Petridou, and Lefteris Mamatas. 2021. A Softwarized Intrusion Detection System for the RPL-based Internet of Things networks. Future Generation Computer Systems 125 (12 2021), 698–714. https://doi.org/10.1016/j.future.2021.07.013Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Mina Zaminkar and Reza Fotohi. 2020. SoS‑RPL: Securing Internet of Things Against Sinkhole. Wireless Personal Communications 114 (2020), 1287—-1312.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Analytical Study of Local Repair Attack on RPL-Based 6LoWPAN Networks in Internet of Things

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ICFNDS '23: Proceedings of the 7th International Conference on Future Networks and Distributed Systems
            December 2023
            808 pages
            ISBN:9798400709036
            DOI:10.1145/3644713

            Copyright © 2023 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 13 May 2024

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited
          • Article Metrics

            • Downloads (Last 12 months)4
            • Downloads (Last 6 weeks)4

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format