ABSTRACT
RPL was developed as a routing protocol in low-power and lossy network contexts to connect many applications using IP-based communication. However, RPL has been exploited to launch several attacks, including local repair attacks. we have evaluated the effect of the local repair attack on the network performance and compared it with the normal RPL. We have conducted simulations on different topologies that included grid and binary topology. The results obtained show that the local repair attack affects the performance of the RPL protocol. The drop in PDR has severely impacted the binary topology to reach only 82%. Moreover, the grid topology suffers from E2E delay, which increases by 50% to reach an average of 2.2 seconds. In addition, the grid topology consumes approximately 40% additional power when the network is under local repair attacks.
- Ryma Abassi and Sihem Guemara El Fatmi. 2017. A trust based communication scheme for safety messages exchange in VANETs. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 10517 LNCS. Springer Verlag, 92–103. https://doi.org/10.1007/978-3-319-67910-5_8Google ScholarCross Ref
- Andrea Agiollo, Mauro Conti, Pallavi Kaliyar, Tsung Nan Lin, and Luca Pajola. 2021. DETONAR: Detection of Routing Attacks in RPL-Based IoT. IEEE Transactions on Network and Service Management 18, 2 (2021), 1178–1190. https://doi.org/10.1109/TNSM.2021.3075496Google ScholarCross Ref
- Roger Alexander, Anders Brandt, J. P. Vasseur, Jonathan Hui, Kris Pister, Pascal Thubert, P. Levis, Rene Struik, Richard Kelsey, and Tim Winter. 2012. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. 6550 (2012). https://doi.org/10.17487/RFC6550Google ScholarDigital Library
- Rakan Alghofaili, Hussah Albinali, and Farag Azzedin. 2024. Build–Launch–Consolidate Framework and Toolkit for Impact Analysis on Wireless Sensor Networks. (2024).Google Scholar
- Hazrat Ali, Simon Duquennoy, and Martin Boldt. 2015. A Performance evaluation of RPL in Contiki. CLOSER 2015 - 5th International Conference on Cloud Computing and Services Science, Proceedings (2015), 233–240. https://www.scopus.com/inward/record.uri?eid=2-s2.0-84969793934 & partnerID=40 & md5=e4087628bf9bdf2fce89089ddeb8b1e1Google Scholar
- Mahmood Alzubaidi, Mohammed Anbar, Samer Al-Saleem, Shadi Al-Sarawi, and Kamal Alieyan. 2017. Review on mechanisms for detecting sinkhole attacks on RPLs. ICIT 2017 - 8th International Conference on Information Technology, ProceedingsJuly (2017), 369–374. https://doi.org/10.1109/ICITECH.2017.8080028Google ScholarCross Ref
- Mahmood Alzubaidi, Mohammed Anbar, Yung-Wey Chong, and Shadi Al-Sarawi. 2018. Hybrid Monitoring Technique for Detecting Abnormal Behaviour in RPL-Based Network. jcm (2018), 198–208. https://doi.org/10.12720/jcm.13.5.198-208Google ScholarCross Ref
- Ahmet Arış, Sıddıka Berna Örs Yalçın, and Sema F. Oktuğ. 2019. New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Networks 85 (3 2019), 81–91. https://doi.org/10.1016/j.adhoc.2018.10.022Google ScholarCross Ref
- Karen Avila, Daladier Jabba, and Javier Gomez. 2020. Security Aspects for RPL-Based Protocols: A Systematic Review in IoT. Applied Sciences 10, 18 (2020), 6472.Google ScholarCross Ref
- Farag Azzedin. 2023. Mitigating Denial of Service Attacks in RPL-Based IoT Environments: Trust-Based Approach. IEEE Access 11 (2023), 129077–129089. https://doi.org/10.1109/ACCESS.2023.3331030Google ScholarCross Ref
- Farag Azzedin and Mustafa Ghaleb. 2019. Towards an architecture for handling big data in oil and gas industries: Service-oriented approach. International Journal of Advanced Computer Science and Applications 10, 2 (2019).Google ScholarCross Ref
- Ankur Bang and Udai Pratap Rao. 2023. Impact Analysis of Rank Attack on RPL-Based 6LoWPAN Networks in Internet of Things and Aftermaths. Arab J Sci Eng 48, 2 (Feb. 2023), 2489–2505. https://doi.org/10.1007/s13369-022-07342-yGoogle ScholarCross Ref
- Ankur O. Bang, Udai Pratap Rao, Pallavi Kaliyar, and Mauro Conti. 2023. Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey. Comput. Surveys 55 (2023), 1–36. Issue 2. https://doi.org/10.1145/3494524Google ScholarDigital Library
- Victoria Bull. 2023. Intrusion Detection in the Internet of Things: From Sniffing to a Border Router’s Point of View.Google Scholar
- AE El-Sebakhy, A Abdulraheem, M Ahmed, A Al-Majed, P Raharja, F Azzedin, and T Sheltami. 2007. Functional network as a novel approach for prediction of permeability in a carbonate reservoir. In SPE Conference. 11–14.Google Scholar
- Behnam Farzaneh, Mohammad Koosha, Elahe Boochanpour, and Emad Alizadeh. 2020. A new method for intrusion detection on RPL routing protocol using fuzzy logic. In 2020 6th International Conference on Web Research (ICWR). IEEE, 245–250.Google ScholarCross Ref
- Olfa Gaddour and Anis Koubâa. 2012. RPL in a nutshell: A survey. Computer Networks 56, 14 (2012), 3163–3178. https://doi.org/10.1016/j.comnet.2012.06.016Google ScholarDigital Library
- Vikas Hassija, Vinay Chamola, Vikas Saxena, Divyansh Jain, Pranav Goyal, and Biplab Sikdar. 2019. A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures., 82721–82743 pages. https://doi.org/10.1109/ACCESS.2019.2924045Google ScholarCross Ref
- Oana Iova, Pietro Picco, Timofei Istomin, and Csaba Kiraly. 2016. RPL: The Routing Standard for the Internet of Things... or Is It?IEEE Communications Magazine 54, 11 (dec 2016), 16–22. https://doi.org/10.1109/MCOM.2016.1600397CMGoogle ScholarCross Ref
- Usha Kiran. 2022. IDS To Detect Worst Parent Selection Attack In RPL-Based IoT Network. In 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS). IEEE, Bangalore, India, 769–773. https://doi.org/10.1109/COMSNETS53615.2022.9668340Google ScholarCross Ref
- Ulf Kulau, Silas Müller, Sebastian Schildt, Felix Büsching, and Lars Wolf. 2021. Investigation & Mitigation of the Energy Efficiency Impact of Node Resets in RPL. Ad Hoc Networks 114 (April 2021), 102417. https://doi.org/10.1016/j.adhoc.2021.102417Google ScholarDigital Library
- Anhtuan Le, Jonathan Loo, Kok Keong Chai, and Mahdi Aiash. 2016. A specification-based IDS for detecting attacks on RPL-based network topology. Information (Switzerland) 7, 2 (2016). https://doi.org/10.3390/info7020025Google ScholarCross Ref
- Anhtuan Le, Jonathan Loo, Aboubaker Lasebae, Mahdi Aiash, and Yuan Luo. 2012. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach: IoT, 6LOWPAN, RPL, QOS SECURITY THREATS, IDS. Int. J. Commun. Syst. 25, 9 (Sept. 2012), 1189–1212.Google Scholar
- Anhtuan Le, Jonathan Loo, Yuan Luo, and Aboubaker Lasebae. 2011. Specification-based IDS for securing RPL from topology attacks. IFIP Wireless Days 1, 1 (2011), 4–6. https://doi.org/10.1109/WD.2011.6098218Google ScholarCross Ref
- Huichen Lin and Neil W Bergmann. 2016. IoT privacy and security challenges for smart home environments. Information 7, 3 (2016), 44.Google ScholarCross Ref
- Anthéa Mayzaud, Rémi Badonnel, and Isabelle Chrisment. 2017. A distributed monitoring strategy for detecting version number attacks in RPL-based networks. IEEE transactions on network and service management 14, 2 (2017), 472–486.Google ScholarDigital Library
- Faiza Medjek, Djamel Tandjaoui, Nabil Djedjig, and Imed Romdhani. 2021. Multicast DIS attack mitigation in RPL-based IoT-LLNs. Journal of Information Security and Applications 61 (Sept. 2021), 102939.Google ScholarDigital Library
- Sayed Mohammad Hossein Mirshahjafari and Behrouz Shahgholi Ghahfarokhi. 2019. Sinkhole+CloneID: A hybrid attack on RPL performance and detection method. Information Security Journal: A Global Perspective 28, 4-5 (Sept. 2019), 107–119. https://doi.org/10.1080/19393555.2019.1658829Google ScholarCross Ref
- Belghachi Mohamed and Feham Mohamed. 2015. QoS Routing RPL for Low Power and Lossy Networks. International Journal of Distributed Sensor Networks 2015 (2015). https://doi.org/10.1155/2015/971545Google ScholarDigital Library
- Syeda M. Muzammal, Raja Kumar Murugesan, and N. Z. Jhanjhi. 2020. A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-based Approaches. IEEE Internet of Things Journal 4662, c (2020), 1–1. https://doi.org/10.1109/jiot.2020.3031162Google ScholarCross Ref
- Syeda Mariam Muzammal, Raja Kumar Murugesan, Noor Zaman Jhanjhi, Mamoona Humayun, Ashraf Osman Ibrahim, and Abdelzahir Abdelmaboud. 2022. A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things. Sensors 22, 18 (Sept. 2022), 7052. https://doi.org/10.3390/s22187052Google ScholarCross Ref
- P.S. Nandhini, S. Kuppuswami, S. Malliga, and R. DeviPriya. 2022. A Lightweight Energy-Efficient Algorithm for mitigation and isolation of Internal Rank Attackers in RPL based Internet of Things. Computer Networks 218 (Dec. 2022), 109391.Google Scholar
- P. Levis; T. Clausen, J. Hui, O. Gnawali, and J. Ko. 2011. The Trickle Algorithm. Internet Engineering Task Force (IETF) (2011). arXiv:arXiv:1011.1669v3http://www.rfc-editor.org/info/rfc6206.Google Scholar
- Pericle Perazzo, Carlo Vallati, Antonio Arena, Giuseppe Anastasi, and Gianluca Dini. 2017. An implementation and evaluation of the security features of RPL. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10517 LNCS, November (2017), 63–76. https://doi.org/10.1007/978-3-319-67910-5_6Google ScholarCross Ref
- Ahmed Raoof, Ashraf Matrawy, and Chung Horng Lung. 2019. Routing Attacks and Mitigation Methods for RPL-Based Internet of Things. IEEE Communications Surveys and Tutorials 21, 2 (2019), 1582–1606. https://doi.org/10.1109/COMST.2018.2885894Google ScholarCross Ref
- Ahmed Raoof, Ashraf Matrawy, and Chung-Horng Lung. 2019. Secure Routing in IoT: Evaluation of RPL’s Secure Mode under Attacks. In 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, 1–6.Google ScholarDigital Library
- Ahmed Raoof, Ashraf Matrawy, and Chung-Horng Lung. 2020. Enhancing Routing Security in IoT: Performance Evaluation of RPL Secure Mode under Attacks. arXiv preprint arXiv:2004.07815 (2020).Google Scholar
- Abdul Rehman and M Ali Lodhi. 2016. Power and Lossy Networks. (2016).Google Scholar
- Rashmi Sahay, G. Geethakumari, and Barsha Mitra. 2021. A novel Network Partitioning Attack against Routing Protocol in Internet of Things. Ad Hoc Networks 121, January (2021), 102583. https://doi.org/10.1016/j.adhoc.2021.102583Google ScholarDigital Library
- Javier Schandy, Leonardo Steinfeld, and Fernando Silveira. 2015. Average power consumption breakdown of Wireless Sensor Network nodes using IPv6 over LLNs. In 2015 International Conference on Distributed Computing in Sensor Systems. IEEE, 242–247.Google ScholarDigital Library
- Ali Seyfollahi, Meysam Moodi, and Ali Ghaffari. 2022. MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications. Computer Standards and Interfaces 82 (8 2022). https://doi.org/10.1016/j.csi.2022.103622Google ScholarDigital Library
- Husam Issa Mohammad Suwad and Farag Ahmed Mohammad Azzedin. 2022. Asset-based security systems and methods. US Patent 11,347,843.Google Scholar
- Lionel Sujay Vailshery. 2022. Internet of Things (IoT) and non-IoT active device connections worldwide from 2010 to 2025. https://www.statista.com/statistics/1101442/iot-number-of-connected-devices-worldwide/.Google Scholar
- George Violettas, George Simoglou, Sophia Petridou, and Lefteris Mamatas. 2021. A Softwarized Intrusion Detection System for the RPL-based Internet of Things networks. Future Generation Computer Systems 125 (12 2021), 698–714. https://doi.org/10.1016/j.future.2021.07.013Google ScholarDigital Library
- Mina Zaminkar and Reza Fotohi. 2020. SoS‑RPL: Securing Internet of Things Against Sinkhole. Wireless Personal Communications 114 (2020), 1287—-1312.Google ScholarCross Ref
Index Terms
- Analytical Study of Local Repair Attack on RPL-Based 6LoWPAN Networks in Internet of Things
Recommendations
Mitigating the worst parent attack in RPL based internet of things
AbstractThe Low Power and Lossy Networks (LLNs) in the Internet of Things environment comprising constrained embedded devices have particular routing requirements that are well satisfied by the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). ...
A study of a routing attack in OLSR-based mobile ad hoc networks
A mobile ad hoc network (MANET) is a collection of mobile nodes which are able to communicate with each other without relying on predefined infrastructures or central administration. Due to their flexibilities and easy deployment, MANET can be applied ...
The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things
AbstractIPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is the standard network layer protocol for achieving efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Resource-constrained and non-tamper resistant ...
Comments