Figure - available from: The Journal of Supercomputing
This content is subject to copyright. Terms and conditions apply.
RPL routing operation flowchart

RPL routing operation flowchart

Source publication
Article
Full-text available
Ensuring security in IoT routing protocols is more challenging due to the fact that devices are mobile, resource constrained, and heterogeneous. The routing protocol for low-power and lossy networks (RPL) as the de facto routing protocol for IoT provides a little protection against routing attacks. On the other hand, the standard RPL because of the...

Similar publications

Article
Full-text available
Underwater Acoustic Sensor Networks offer very promising solutions to monitor the aqueous environments. Due to the distinctive characteristics of UASNs, it is very challenging to design a routing protocol that can achieve maximum data delivery ratio in the network. The main challenge is the communication medium (acoustic links) that is subject to t...
Article
Full-text available
Vehicular Ad Hoc Networks (VANETs) are based on network technology where cars act as mobile nodes to form a communication network. In VANETs, routing protocols have a significance regarding the overall network performance since they determine the way of sending and receiving packets between mobile nodes. Most of the protocols proposed for VANETs ar...
Article
Full-text available
The routing in underwater acoustic sensor networks (UASNs) has become a challenging issue due to several problems. First, in UASN, the distance between the nodes changes due to their mobility with the water current, thus increasing the network's energy consumption. Second problem in UASNs is the occurrence of the void hole, which affects the networ...
Article
Full-text available
This article describes an algorithm of classification by similarity of nodes in a MANET (Clustering). To optimize a network performance without influencing others, we must act only on the cluster structure. Any additional calculation clutters more the system. To overcome this limitation, a strong classification method is needed. The purpose of clas...
Article
Full-text available
Delay tolerant network routing is characterized by sparsely or densely populated nodes. In such network routing with limited resource like buffer space is a difficult task. In the past work this characteristic of delay tolerant network node is ignored. To overcome the network routing issues, in this paper we propose dynamic trusted routing scheme f...

Citations

... The contribution is a workable IDS solution modified to fit the specific features and needs of IoT networks based on RPL. To improve the safety of IoT networks, Hashemi and Aliee [38] present a novel trust model developed for the IoT. A new method for localization is presented by Kaliyar et al. [39] that includes features for the early detection of Sybil and wormhole attacks in IoT networks. ...
Article
Full-text available
The increasing reliance on cyber-physical systems (CPSs) in critical domains such as healthcare, smart grids, and intelligent transportation systems necessitates robust security measures to protect against cyber threats. Among these threats, blackhole and greyhole attacks pose significant risks to the availability and integrity of CPSs. The current detection and mitigation approaches often struggle to accurately differentiate between legitimate and malicious behavior, leading to ineffective protection. This paper introduces Gini-index and blockchain-based Blackhole/Greyhole RPL (GBG-RPL), a novel technique designed for efficient detection and mitigation of blackhole and greyhole attacks in smart health monitoring CPSs. GBG-RPL leverages the analytical prowess of the Gini index and the security advantages of blockchain technology to protect these systems against sophisticated threats. This research not only focuses on identifying anomalous activities but also proposes a resilient framework that ensures the integrity and reliability of the monitored data. GBG-RPL achieves notable improvements as compared to another state-of-the-art technique referred to as BCPS-RPL, including a 7.18% reduction in packet loss ratio, an 11.97% enhancement in residual energy utilization, and a 19.27% decrease in energy consumption. Its security features are also very effective, boasting a 10.65% improvement in attack-detection rate and an 18.88% faster average attack-detection time. GBG-RPL optimizes network management by exhibiting a 21.65% reduction in message overhead and a 28.34% decrease in end-to-end delay, thus showing its potential for enhanced reliability, efficiency, and security.
... In this method, the recommendations rely only on the two-hop neighbor (parents of parents) and are vulnerable to Bad-mouthing and Good-mouthing attacks. Hashemi et al. [60] introduced DCTM-IoT. This model calculates trust in terms of direct and indirect observations. ...
... It can also resist significant Sybil, Rank, and Blackhole attacks. 15 ...
Article
The number of internet-connected IoT devices is increasing at a rapid speed. Because of this exponential growth, there are now some serious security concerns and challenges. As most of these devices are part of our daily activities, they contain personal private data which is getting transferred to some other location. When many IoT devices are in a network, they transfer the data on a hop-by-hop basis, which raises concerns about the routing security and trustworthiness of other IoT devices on which they are dependent for transferring their data. The goal of this study is to develop a safe environment for routing with the help of a trust analysis of each node participating in the network. Routing nodes are prone to some routing attacks like the Rank attack, wormhole attack, and Sybil attack. In this study, a lightweight trust-based system has been developed to detect and remove these attacks. The proposed model consists an accuracy of 98%. Moreover, proposed model is compared with earlier studies, proposed model's performance stands remarkable.
... These exclusive characteristics of distributed networks make themselves an excellent choice for several sectors and the industrial manufacturing sector is one of them. All the core concepts of distributed networks are applied in manufacturing systems where devices are being deployed in a distributed pattern with no dependability upon a single authority (Hashemi & Shams Aliee, 2019). The automated communication among these nodes is ensured by specifically designed communication protocols. ...
... The resource sharing among these nodes can take place virtually with full transparency, scalability, and concurrency. As a result of this connectivity, the entire process-ing burden is divided among all nodes and a mutual harmonic scenario is created among the participant nodes (Hashemi & Shams Aliee, 2019). ...
... A Dynamic and Comprehensive Testing Model (DCTM) is proposed that is capable to locate the presence of malicious activities in cloud-based distributed manufacturing systems (Hashemi & Shams Aliee, 2019). The rank attack, Sybil attack, and version number attack have been taken into consideration and the model is proposed to counter with such security challenges. ...
Chapter
The current century has witnessed a prodigious expansion in scientific innovations contributing toward the betterment of humanity. The astonishing advancements in digital communications have facilitated various spheres of our lifestyle including the manufacturing sector. A plethora of cutting-edge technologies are rubbing shoulders to revolutionize manufacturing trends. Distributed system communications introduce a new concept of digital collaboration among a diversified range of scattered communication nodes. The individual resources of multiple nodes are intelligently integrated to formulate an aggregated impact that yields phenomenal productivity. The smart connectivity among various heterogeneous nodes may familiarize the network with an extended variety of potential security threats. The literature environs a bulk of security solutions proposed to overcome these challenges. This research study provides a comprehensive elaboration of these security threats along with the security practices designed to encounter such activities.
... Hashemi et.al. in [44] propose a Dynamic and Comprehensive Trust Model for IoT (DCTM-IoT). Trust is calculated based on three dimension. ...
Article
Full-text available
In domains such as telehealth, intelligent transportation, and autonomous agriculture, ensuring secure routing of collected and exchanged data is paramount. Since its inception, there have been many research challenges for the RLP routing protocol that operates in resource-constrained environments and utilizes battery-powered IoT devices. Hence, researchers have focused on this crucial challenge by advising solutions to mitigate attacks that deplete nodes’ energy and hence create energy gaps in the network. In this article, we study the impact of two energy exhaustion attacks (hello flooding and version number modification) on the RPL protocol and we present a novel mitigation solution based on behavioural trust. We present an in-depth study of the impact on radio energy consumption of the hello flooding and version number modification attacks in RPL as the number of network nodes increases. We showed that the impact of the former is localized to nodes in the vicinity of the attacker while the latter has a global impact that extends to the entire network. The obtained results from our simulations show that version number modification attack in particular has devastating impact on the network. We also propose a trust-based solution to mitigate these attacks and demonstrate its effectiveness. Accordingly, we conduct comparative study of these attacks and empirically investigate their impact on network performance by running extensive evaluation experiments. Our findings verify the effectiveness of our proposed trust system in mitigating both attacks.
... In this method, rank and Sybil assaults are dealt with by a trust calculation across nodes considering indirect and direct packet transfers. Another work proposed in [18] provided a multi-dimensional trust model for the Internet of Things that is both comprehensive and dynamic. Sybil, blackhole, and Rank attacks are the primary focus of this study. ...
... [16] Network Level attacks Does not address specific attacks. It uses only one parameter to calculate trust that may result in misleading trust results [17] Rank and Sybil Use only one parameter to measure trust, i.e., Packet forwarding that may result in misleading trust results [18] Rank, Sybil and Blackhole ...
Article
Full-text available
The smart grid relies on Advanced Metering Infrastructure (AMI) to function. A high failure rate, low information, and instability in correspondence links recognize them. Because of the significant packet loss and slow transmission rate of the wireless connection between smart meters in AMI, these infrastructures are considered Low-power and Lossy Networks (LLNs). The routing protocol in an AMI network is crucial for ensuring the availability and timeliness of data transfer. IPv6 Routing Protocol for Low-power and lossy networks (RPL) is the optimal routing option for the AMI communication configuration. However, it is highly at risk against many outer and Internal attacks, and its effectiveness may be severely diminished by Sybil assault. Different trust-based techniques have been suggested to mitigate Internal attacks. However, existing trust systems have high energy consumption issues, which causes a reduction in the performance of LLNs due to complex calculations at the node level. Therefore, this paper presents a novel fog-enabled GINI index-based trust mechanism, "GITM," to mitigate Sybil attacks using the forwarding behavior of legitimate member nodes. Regarding identifying and isolating Sybil assaults, our approach outperforms the state-of-the-art methods. GITM detects and isolates a more significant amount of malicious network nodes compared to other techniques within a similar time frame. The Sybil attack detection rate increases by 4.48%, energy consumption reduces by 21%, and isolation latency reduces by 26.30% (concerning time). Furthermore, the end-to-end delay is merely 0.30% more in our case, and the number of control messages decreases by 28%.
... They also validate their approach, however, it required each node to be run in promiscuous mode for sniffing packets. Later, a dynamic hierarchical trust model is proposed in DCTM-RPL [38]. Secure communication is shown to have been achieved by building up trust above a threshold value in their approach. ...
Article
Full-text available
The Internet of Things (IoT) paradigm facilitates communication for a multitude of connected smart objects and provisions essential and mission-critical services across diverse sectors. To route packets, IoT networks use Routing Protocol for Low-Power and Lossy Networks (RPL) by default. However, RPL lacks security features by design, making IoT-RPL prone to low-overhead internal attacks such as the rank and version attacks. The attack and normal traffic are found to be identical, making detection challenging for signature-based and anomaly-based Intrusion Detection Systems (IDS). Moreover, a formal proof of correctness of IDS schemes is lacking. In this paper, we propose a novel rank and version attack detection and rank attacker location identification mechanism that utilizes active probing and Discrete Event System (DES) based IDS. Our proposed IDS scheme is centralized with inputs from sensing at the leaf levels. IDS uses as an intelligent probing technique that helps distinguish normal and attack behaviour. Further, DES is used to model the normal and attack specifications. A DES diagnoser, constructed from the DES models, generates an alert when a malicious node is identified. We also prove the correctness and completeness of our scheme. The DES framework is implemented only at root node, therefore using our IDS does not require any heavy deployment, protocol modifications, or training. Proposed method is implemented in simulation and testbed, with a sufficiently large number of IoT devices. We compare our scheme to state-of-the-art approaches. Our performance is found to be energy-efficient, having minimal false positives and achieving more than 99% accuracy in detecting intrusions and identifying the malicious nodes.
... Most IoT devices are connected to Wireless Sensor Network (WSN) and have low battery power and less processing capabilities [15]. Routing Protocol for Low Power Lossy Network (RPL) is a network layer routing protocol which is especially designed for IoT technologies and now-a-days it is highly utilized in IoT devices [16]. ...
... Smart devices which have constraints like limited memory and energy and less processing power uses RPL protocol for routing purpose. Initially, RPL protocol relied on directed acyclic graph (DAG) that introduced the problem of routing loop (algorithm not converging to outgoing links) [15]. Therefore, destination-oriented DAG (DODAG) was introduced to help achieve a loop-free network, converging to single destination [27]. ...
... 1) Direct attack where Sybil node communicates directly with normal node. 2) Indirect attack where malicious node (an intermediate node) communicates with the normal node [12], [15], [44]. ...
Article
Full-text available
Internet of Things (IoT) has revolutionized the world in the last decade. Today millions of devices are connected to each other utilizing IoT technology in one way or the other. With the significant growth in IoT devices, the provision of IoT security is imperative. Routing protocol for low power and lossy networks (RPL) is a network layer protocol, specially designed for routing in IoT devices. RPL protocol faces many attacks such as selective forwarding attacks, blackhole attacks, sybil attacks, wormhole attacks, and sinkhole attacks. All these attacks pose great threats to IoT networks and can substantially affect the performance of the network. In this work, a comprehensive review of internal attacks on the network layer is presented. Specifically, we focus on the literature that considers presenting solutions for the detection and prevention of sinkhole attacks. We reviewed the state-of-the-art works and different performance parameters like energy consumption, scalability, threshold value, packet delivery ratio, and throughput. Moreover, we also present a detailed analysis of machine learning-based algorithms and techniques proposed for the security of RPL protocol against internal attacks.
... The RPL standard has some limitations in routing due to using a single metric that ultimately disrupts network performance. To overcome the limitations of using a single metric and avoid the consequences of routing attacks, we used the concept of trust and integrated a dynamic and comprehensive trust model for the IoT and integrated it into the RCT (DCTM-RPL) DCTM-RPL function [23]. ...
Article
Full-text available
The internet of things (IoT) is a collection of systems connected to an online network consisting of things. Routing Protocol for Low-Power and Lossy Networks (RPL) is a proactive routing protocol for wireless networks based on distance vectors. Several methods have been proposed for improving RPL protocol security, suffering from lack of accuracy, the authenticity of intrusion detection, and lack of scalability. Therefore, in this research, an intrusion detection system based on deep cellular learning automata and semantic hierarchy is developed to increase RPL protocol security. Semantic hierarchy is used to transform attack features into significant values, and deep cellular learning automata are employed to increase the security of the RPL protocol. Here five datasets related to attacks, including Darknet, “Version Number”, “NSL-KDD”, “Botnet”, and Distributed Denial of Service (DDoS), have been used. Comparing the proposed results on five datasets indicates that the proposed method outperforms its counterparts. Also, the proposed model has been tested on Blackhole, NID, and BoT-IoT datasets based on ANN and CNN's Deep Neural Network. The results of penetration detection accuracy of the proposed method on Blackhole datasets, NID, and BoT-IoT were 99.65%, 99.71%, and 93.75%, respectively, which improved by averages of 0.42% compared to ANN and 0.55% compared to CNN methods.
... SMTrust routing algorithms are embedded into RPL, and the protocol is evaluated for network performance, in terms of topology stability, packet loss rate, throughput, and power consumption. The performance of SMTrust is significantly better as compared to standard RPL objective function (OF), which is Minimum Rank with Hysteresis Objective Function (MRHOF) and existing trust-based approaches, such as SecTrust (Airehrour, Gutierrez, & Ray, 2018), Dynamic and Comprehensive Trust Model (DCTM) (Hashemi & Aliee, 2019), and Metric-based RPL Trustworthiness Scheme (MRTS) (Djedjig et al., 2020). However, in SMTrust there was no consideration for load balanncing. ...
Preprint
Full-text available
In the Internet of Things (IoT), the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and features. Among various RPL security solutions, a trust-based security is easy to adapt for resource-constrained IoT environments. A recent study introduced a trust based security enhancement to the standard RPL to tackle Blackhole and Rank attack. The study also introduces a mobility metric in the trust computation process to aid with selection a mobile node as parent in a heterogeneous RPL network. The selection of a mobile node as parent, introduces instability in the network. In the study also there was no consideration for load balancing. In this work we seek to improve the proposed recent work by incorporating the inverse of mobility metric value in the trust computation process to promote the selection of static node and also added load [RESEARCH IN PROGRESS DRAFT PAPER] September 22, 2022 2 | P a g e balancing in the overall trust computation. This study also introduces the detection of other variants of rank attack (rank decrease and worst parent selection) as well as other variants of packet dropping attack (Selective Forwarding Attack).