Acta Informatica Pragensia 2024, 13(3), 340-358 | DOI: 10.18267/j.aip.2343448
Securing RPL-Based Networks Against Version Number and Rank Attacks
- 1 Département d’Informatique, Faculté des Sciences Exactes, Université de Bejaia, Bejaia, Algeria
- 2 Laboratoire LAMIE, Faculté des Mathématiques et d’Informatique, Université de Batna 2, Batna, Algeria
The increasing reliance on Low-power and Lossy Networks (LLN) in the Internet of Things (IoT) and their vulnerability to various attacks have made their protection necessary. Most of the proposed approaches to protecting such networks neither support scalability nor are lightweight enough to be incorporated into these constrained networks. In this paper, we present a lightweight approach to protecting LLN networks from rank and version number attacks. The proposal relies on light exchanged messages between the network nodes and the root and network nodes themselves. Successive comparison processes are used to detect the attack while two blocking techniques are introduced against malicious nodes. Simulations demonstrated the effectiveness of the approach, outperforming similar approaches such as Sink-Based Intrusion Detection Systems (SBIDS), Secure Routing Protocol (SRPL) for LLN, the Machine-Learning Technique based on K-Nearest Neighbour (MLTKNN), secure trust-aware Routing Protocol for Low Power and Lossy Networks (SecTrust) and Shield in terms of appropriate parameters, without causing extra charges on the network.
Keywords: Internet of things; LLN; Routing protocol for low power and lossy networks; Security; Blocking techniques.
Received: February 11, 2024; Revised: April 29, 2024; Accepted: May 3, 2024; Prepublished online: June 11, 2024; Published: August 22, 2024 Show citation
References
- Ahmed, F., & Ko, Y. B. (2016). A distributed and cooperative verification mechanism to defend against DODAG version number attack in RPL. In PECCS 2016 - Proceedings of the 6th International Joint Conference on Pervasive and Embedded Computing and Communication Systems, (pp. 55-62). Scitepress. https://doi.org/10.5220/0005930000550062
Go to original source...
- Airehrour, D., Gutierrez, J. A., & Ray, S. K. (2019). SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Generation Computer Systems, 93, 860-876. https://doi.org/10.1016/j.future.2018.03.021
Go to original source...
- Alsukayti, I. S., & Singh, A. (2022). A Lightweight Scheme for Mitigating RPL Version Number Attacks in IoT Networks. IEEE Access, 10, 111115-111133. https://doi.org/10.1109/ACCESS.2022.3215460
Go to original source...
- Alzubaidi, M., Anbar, M., Chong, Y. W., & Al-Sarawi, S. (2018). Hybrid monitoring technique for detecting abnormal behaviour in RPL-based network. Journal of Communications, 13(5), 198-208. https://doi.org/10.12720/jcm.13.5.198-208
Go to original source...
- Ariº, A., & Oktug, S. F. (2020). Analysis of the RPL Version Number Attack with Multiple Attackers. In 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE. https://doi.org/10.1109/CyberSA49311.2020.9139695
Go to original source...
- Ariº, A., Oktug, S. F., & Örs Yalcin, S. B. (2016). RPL version number attacks: In-depth study. In Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, (pp. 776-779). IEEE. https://doi.org/10.1109/NOMS.2016.7502897
Go to original source...
- Ariº, A., Örs Yalcin, S. B., & Oktug, S. F. (2019). New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Networks, 85, 81-91. https://doi.org/10.1016/j.adhoc.2018.10.022
Go to original source...
- Glissa, G., Rachedi, A., & Meddeb, A. (2016). A secure routing protocol based on RPL for internet of things. In 2016 IEEE Global Communications Conference. IEEE. https://doi.org/10.1109/GLOCOM.2016.7841543
Go to original source...
- Ioulianou, P., Vasilakis, V., Moscholios, I., & Logothetis, M. (2018). A Signature-based Intrusion Detection System for the Internet of Things. ePrint. White Rose Research Online. https://eprints.whiterose.ac.uk/133312/1/ictf_2018_IoT.pdf
- Karmakar, S., Sengupta, J., & Bit, S.D. (2021). LEADER: Low Overhead Rank Attack Detection for Securing RPL based IoT. In 2021 International Conference on Communication Systems and Networks, (pp. 429-437). IEEE. https://doi.org/10.1109/COMSNETS51098.2021.9352937
Go to original source...
- Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., & Chai, M. (2013). The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks. IEEE Sensors Journal, 13(10), 3685-3692. https://doi.org/10.1109/JSEN.2013.2266399
Go to original source...
- Neerugatti, V., & Reddy, A. R. M. (2019). Machine learning based technique for detection of rank attack in RPL based internet of things networks. International Journal of Innovative Technology and Exploring Engineering, 8(9 Special Issue 3), 244-248. https://doi.org/10.35940/ijitee.I3044.0789S319
Go to original source...
- Nikravan, M., Movaghar, A., & Hosseinzadeh, M. (2018). A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power and Lossy Networks. Wireless Personal Communications, 99(2), 1035-1059. https://doi.org/10.1007/s11277-017-5165-4
Go to original source...
- Osman, M., He, J., Mahiuob, F., Mokbal, M., & Zhu, N. (2021a). Artificial Neural Network Model for Decreased Rank Attack Detection in RPL Based on IoT Networks. International Journal of Network Security, 23(3), 496-503. https://doi.org/10.6633/IJNS.202105_23(3).15
Go to original source...
- Osman, M., He, J., Mokbal, F. M. M., Zhu, N., & Qureshi, S. (2021b). ML-LGBM: A Machine Learning Model Based on Light Gradient Boosting Machine for the Detection of Version Number Attacks in RPL-Based Networks. IEEE Access, 9, 83654-83665. https://doi.org/10.1109/ACCESS.2021.3087175
Go to original source...
- Perazzo, P., Vallati, C., Arena, A., Anastasi, G., & Dini, G. (2017). An Implementation and Evaluation of the Security Features of RPL. In Ad-hoc, Mobile, and Wireless Networks, (pp. 63-76). Springer. https://doi.org/10.1007/978-3-319-67910-5_6
Go to original source...
- Pongle, P., & Chavan, G. (2015). Real Time Intrusion and Wormhole Attack Detection in Internet of Things. International Journal of Computer Applications, 121(9), 1-9. https://doi.org/10.5120/21565-4589
Go to original source...
- Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Networks, 11(8), 2661-2674. https://doi.org/10.1016/j.adhoc.2013.04.014
Go to original source...
- Rehman, A., Khan, M. M., Lodhi, M. A., & Hussain, F. B. (2016). Rank attack using objective function in RPL for low power and lossy networks. In 2016 International Conference on Industrial Informatics and Computer Systems, (pp. 1-5). IEEE. https://doi.org/10.1109/ICCSII.2016.7462418
Go to original source...
- Sahay, R., Geethakumari, G., & Modugu, K. (2018). Attack graph - Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT. In IEEE 4th World Forum on Internet of Things, (pp. 313-318). IEEE. https://doi.org/10.1109/WF-IoT.2018.8355171
Go to original source...
- Shafique, U., Khan, A., Rehman, A., Bashir, F., & Alam, M. (2018). Detection of rank attack in routing protocol for Low Power and Lossy Networks. Annals of Telecommunications, 73(7-8), 429-438. https://doi.org/10.1007/s12243-018-0645-4
Go to original source...
- Zaminkar, M., & Fotohi, R. (2020). SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism. Wireless Personal Communications, 114(2), 1287-1312. https://doi.org/10.1007/s11277-020-07421-z
Go to original source...
This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.