Conference PaperPDF Available

Review on Mechanisms for Detecting Sinkhole Attacks on RPLs

Authors:

Abstract and Figures

Internet Protocol version 6 (IPv6) over Low power Wireless Personal Area Networks (6LoWPAN) is extensively used in wireless sensor networks (WSNs) due to its ability to transmit IPv6 packet with low bandwidth and limited resources. 6LoWPAN has several operations in each layer. Most existing security challenges are focused on the network layer, which is represented by its routing protocol for low-power and lossy network (RPL). RPL components include WSN nodes that have constrained resources. Therefore, the exposure of RPL to various attacks may lead to network damage. A sinkhole attack is a routing attack that could affect the network topology. This paper aims to investigate the existing detection mechanisms used in detecting sinkhole attack on RPL-based networks. This work categorizes and presents each mechanism according to certain aspects. Then, their advantages and drawbacks with regard to resource consumption and false positive rate are discussed and compared.
Content may be subject to copyright.
2017 8th International Conference on Information Technology (ICIT)
978-1-5090-6332-1/17/$31.00 ©2017 IEEE
Review on Mechanisms for Detecting Sinkhole
Attacks on RPLs
Mahmood Alzubaidi
*
1
, Mohammed Anbar
2
, Samer Al-Saleem
3
, Shadi Al-Sarawi
4
, Kamal Alieyan
5
1-5
National Advanced IPv6 Centre (NAV6)
Universiti Sains Malaysia
11800 Gelugor, Penang, Malaysia
*Corresponding author, e-mail: mahmood@nav6.usm.my
2-5
E-mail:
( anbar, samer, Shadi, Kamal_alian)@nav6.usm.my
Abstract— Internet Protocol version 6 (IPv6) over Low
power Wireless Personal Area Networks (6LoWPAN) is
extensively used in wireless sensor networks (WSNs) due to
its ability to transmit IPv6 packet with low bandwidth and
limited resources. 6LoWPAN has several operations in each
layer. Most existing security challenges are focused on the
network layer, which is represented by its routing protocol
for low-power and lossy network (RPL). RPL components
include WSN nodes that have constrained resources.
Therefore, the exposure of RPL to various attacks may lead
to network damage. A sinkhole attack is a routing attack that
could affect the network topology. This paper aims to
investigate the existing detection mechanisms used in
detecting sinkhole attack on RPL-based networks. This work
categorizes and presents each mechanism according to
certain aspects. Then, their advantages and drawbacks with
regard to resource consumption and false positive rate are
discussed and compared.
Keywords-- Internet of things; Sinkhole attack; WSN; RPL;
6LoWPAN.
I.
I
NTRODUCTION
Wireless sensor networks (WSNs) have attracted a fair
amount of research attention during the last decade. Their
limited resources, along with the hostile deployment of the
environment, put severe challenges to the research studies.
Consequently, the phenomenon of the Internet of Things (IoT)
is the rapid deployment of approximately 50 billion things (or
devices) to be connected to the Internet by 2020. Therefore,
the average will be six connected devices for each person on
the planet. The exchangeable data traffic may contain critical
information belonging to various fields, such as home sensors,
medical devices, cars, airplanes, and even nuclear reactors,
which can endanger human life. Thus, a massive number of
devices connected to each other, as well as to the internet,
requires high level of security and authentication.
The use of traditional security mechanisms, such as
firewall, intrusion detection, and prevention systems, which
are deployed at the Internet edge are no longer sufficient to
secure the next generation Internet. Furthermore, the WSNs
architecture in the IoT provides additional concerns and
challenges over network security due to resource constraints,
insufficient infrastructure, limited physical security, dynamic
topology, and unreliable links, thereby making them
particularly vulnerable and difficult to protect against attacks.
Moreover, IoT devices are accessible from anywhere through
trusted networks on the Internet; therefore, IoT networks are
unprotected against an extensive range of malicious attacks.
Hence, if security issues are not addressed, then confidential
information may leak any time. Thus, real deployments in IoT
should be secured, and the following security services [1]
must be considered in the IoT.
Confidentiality: Exchanging messages between a
source and a destination might be easily objected by an
attacker, and secret contents are exposed.
Data integrity: Transit nodes between a source and a
destination should not be able to change or alter the
contents of messages.
Source integrity or authentication: The nodes of the
endpoints should be able to verify the identities of each
other to ensure that they are communicating with the
authentic entities.
Availability: IoT devices must be smoothly working,
and data should be accessible whenever necessary. The
availability of the services that applications provide is
also important.
Freshness and non-repudiation: A compromised
intermediate node could store a data packet and replay
it at a later stage. The replayed packet may contain
typical information. Therefore, mechanisms for
detecting replayed or duplicated messages are
important. These mechanisms should be provided by
replay protection or freshness security services, which
369
2017 8th International Conference on Information Technology (ICIT)
can be performed via integrity-protected sequence
numbers, timestamps, etc.
A. 6LoWPAN
The network working group in [2] presented 6LoWPAN,
which is a low throughput wireless network comprising low
cost and low-power devices. The network works together to
connect the physical environment to real-world applications,
such as WSNs. Common topologies are supported, such as a
star, a mesh, and combinations of the two, as shown in Fig. 1.
Furthermore, the physical and MAC layers are compatible
with the IEEE 802.15.4 standard, which enables the IPv6 to
run over the IEEE 802.15.4 network by fragmenting the IPv6
packet into 128 bytes instead of 1280 bytes in a typical
network. 6LoWPAN network supports the following
characteristics: (i) small packet size; (ii) 16-bit short or IEEE
64-bit extended media access control addresses; (iii) low
bandwidth 250/40/20 kbps; (iv) typically battery operated,
relatively low cost, and low power; (v) networks are ad hoc,
and devices have limited accessibility and user interfaces; (vi)
unreliable due to the nature of devices in the wireless medium;
(vii) currently supports only two routing protocols, which are
loading standardized by the ITU, and routing protocol for low-
power and lossy networks (RPL) [3] standardized by the IETF
ROLL working group.
B. RPL
RPL is standardized in RFC 6550 [3]. Low-power and
lossy networks (LLN) have constraints on processing,
memory, and energy. Therefore, typical routing, such as
OSPF, OLSR, RIP, AODV, and DSR cannot be used. LLN
links suffer from high loss rate, low data rate, instability,
expensive bits, and dynamically formed topology. In addition,
LLN covers both wireless and wired networks that require
bidirectional links. RPL topology based on directed acyclic
graph (DAG) is a directed graph with all the edges oriented in
such a way that cycles do not exist, and the DAG root does
not have an outgoing edge, thus failing to fulfill the need for
WSNs. Therefore, destination-oriented DAG (DODAG) is
deployed by introducing a single destination root, wherein up
is toward the root, and down is away from the root. The
position of each node in the DODAG graph is identified using
the rank number, which clarifies the node distance from the
root using a specified objective with respect to other neighbor
nodes. The node could join multiple DODAGs within the
same RPL instance. DODAG ID is the IPv6 address of the
root, and the DODAG version is the current version of the
DODAG. Therefore, when a new DODAG is computed with
the same root, its version increments. RPL has three main
control messages. The first message is the DODAG
information object (DIO), which multicasts downward in the
RPL instance, and allows other nodes to discover the RPL
instance and join it. The second message is the DODAG
information solicitation (DIS), which is considered as the link-
local multicast request for DIO neighbor discovery. The third
message is the destination advertisement object(DAO), which
flows from the child toward the parents or the root, as
presented in Fig. 2.
C. Classification of RPL attacks
According to Mayzaud et al. [4], IoT attacks are classified
into three types based on the goal of the attacker and the final
damages on the DODAG graph in RPL. The first category of
attacks targets the resource of the networks (energy, memory,
and processing). The second category of attacks targets the
topology of RPL, whereas the last category of attacks targets
network traffic. This current review focuses on the attacks that
have affects the topology of the DODAG graph in RPL,
particularly the sinkhole attack that occurs in two steps. First,
the malicious node can attract considerable traffic by
advertising falsified information data for parent preference by
the other nodes. Then, the malicious node may modify or drop
it after receiving the traffic illegally.
Fig. 1. Star and peer-to-peer topology in 6LoWPAN
Fig. 2. Type of RPL messages
370
2017 8th International Conference on Information Technology (ICIT)
Sinkhole attack might be coupled with other attacks and
poses significant damage for RPL. Thus, detection and
mitigation of sinkhole attack can potentially serve the
community of IoT security. Wallgren et al. [5] stated that a
sinkhole attack might be combined with a selective
forwarding attack, which forwards all RPL control messages
and drops the rest of the traffic. Sinkhole attack can also be
combined with hello flood attacks to broadcast messages with
strong signal power and promote a falsified routing metric.
Similarly, combining a sinkhole attack with wormhole attacks
to forward messages using the out-of-band connection
between two nodes is possible; a high throughput is important
in this combination, and the rest of the traffic follows the
normal path. Moreover, a potential sinkhole attack can turn
into a blackhole attack, in which a malicious node drops all
the packets instead of forwarding them. Last, a sinkhole attack
can be a part of the decreased rank attacks, which disrupt the
traffic or targets the LLN resource with the increased rank
attacks as shown in Fig. 3.
RPL contains two rank repair mechanisms, namely, global
repair and local repair. In the global repair, the DODAG root
sends a new DAG sequence number to reconstruct the entire
topology. When the nodes receive new DIO messages, they
can create a new parent relationship and update the link cost
again. If a local node has a broken link to the DODAG root,
then it can use the local repair. The particular node sends a
message to all its children, informing them that they need to
update their table and select new parents, while the node itself
sends a DIS message to obtain the new rank in the topology
[6]. By contrast, when the node is compromised by a sinkhole
attack, the local and global repair mechanisms do not
efficiently work because differentiating failure and malicious
nodes is difficult without a monitor system. Hence, the
attacker can enable the node to alter its DODAG ID or
frequently broadcast rank without any reason.
Cryptography is considered as the first defense
mechanism against denial-of-service attack in WSN by
optimizing confidentiality, authentication, and integrity.
However, cryptography does not sufficiently work against
routing attacks, such as sinkhole, due to the leak of the Quality
of Service (QoS) in securing requirements, such as
availability, robustness, and resilience. Therefore,
cryptography is combined with an intrusion detection system
(IDS) in the network to monitor the abnormal behavior in RPL
and detect malicious sources from the early phase to protect
the network from damage [6].
The paper is organized as follows. Section II provides a
brief explanation for the recent mechanism and the IDS that
are used to detect a sinkhole attack. Section III discusses the
drawbacks of each mechanism. The paper is concluded in
Section IV.
II. R
ELATED
W
ORKS
The existing mechanisms used to detect sinkhole attacks in
RPL can be categorized according to their main focus on
security, as illustrated in Fig. 4. Accordingly, this section
provides an investigation regarding each category.
Fig. 4. Taxonomy of mechanisms against sinkhole attack in RPL
Fig. 3. The effect of sinkhole attack in the RPL network
371
2017 8th International Conference on Information Technology (ICIT)
A. DIO message-based mechanisms
Dvir et al. [7] proposed an encryption mechanism for
version number and rank authentication (VERA). The nodes
should be able to change the rank field of a DIO message as
it passes through the other nodes. The rank field specifies the
favorability of a node that is close to the root and neighbors.
Therefore, this field can be forged by a node executing a
sinkhole attack. In [7], VERA prevents the attacking nodes
from obtaining lower rank than true rank by implementing a
one-way hash chain, which is used to ensure the strict increase
of ranks from the DODAG root to the constrained nodes. Each
node is aware of the hash chain value, because the DODAG
root has sent this value earlier. When a node sends an
encrypted rank in a DIO message, the receiver node checks if
the value is changed by the previous node and considers the
sender as an attacker. Although the VERA approach can
successfully mitigate a version number attack, it is still weak
against two topology attacks. First is rank spoofing, which
allows an attacker to pretend like any rank in the DODAG.
The second is the rank replay attack, which allows a malicious
node to claim one level closer to the root by replaying the rank
of its parents. TRAIL [8] was proposed to fix VERA issues by
analyzing the incompleteness of the message rank
authentication in VERA. Then, TRAIL presents
enhancements to VERA for repair, and finally discovers and
isolates bogus nodes while these nodes attack the RPL routing
hierarchy. TRAIL is derived from first-hand principles and
resolves the issues of topological infringements. However, the
parent node can determine its child node if its child rank is
lower than its own rank. TRAIL also have a problem, in which
a child node chooses an attacking node as its parent since a
child node cannot determine whether its parent node is an
attacking node. Therefore, Iuchi et al. in [9] proposed a secure
parent solution to ensure that child nodes select a legitimate
node as their parent. Each child node can select a legitimate
node as its parent. In addition, each node selects a parent after
excluding the best candidate if multiple parent nodes are
offered. By utilizing the threshold, each node can identify
whether the rank value broadcasted by its neighbor nodes is
extremely low because it can obtain a maximum and average
rank of its neighbor nodes. Consequently, attacking nodes
intend to claim false lower rank than legitimate nodes.
Thereafter, each node chooses its parent node, except for
nodes whose rank are determined to be extremely low.
Parent fail-over primarily adds unheard node set
(UNS) field to a DIO message when the root node
transmits it first. The UNS field is signed by the 6BR root
to prevent modification in transit. The experiment for this
mechanism was implemented in [10] by setting up a
threshold value. Therefore, when the constrained node
transmits sensor data every 10 seconds, the root adds that
node to the UNS if less than 30% of these messages are
received by the 6BR root. Furthermore, the UNS is
populated by node identifiers of nodes whose paths can be
affected by a sinkhole attack. Therefore, a node, will add
its parent to a local blacklist upon receiving a DIO with
itself included in the UNS.
B. Agent distributed-based IDS
Raza et al. proposed an IDS called SVELTE [11], which
uses a hybrid of signature and anomaly-based detections with
regard to balancing the storage costs of the signature-based
detection and the computing cost of the anomaly-based
techniques. Three main modules are placed in the 6BR. The
first module, called 6LoWPAN mapper, collects information
regarding RPL and rebuilds the network in the 6BR. The
second module analyzes the mapped data and detects
intrusion. The third module, which is a distributed mini
firewall, is designed to filter unwanted traffic before it enters
the resource-constrained network, as shown in Fig. 5. By
contrast, the constrained node has two corresponding
lightweight modules each. The first module provides mapping
information to the root (6BR) to detect intrusion, whereas the
second module works with the centralized firewall [11]. If the
routing graph is inconsistent, then the node has a lower rank
than its parent, indicating an occurrence of a sinkhole attack.
Cervantes et al. in [12] proposed an IDS called INTI.
detects intrusion of sinkhole attacks on the routing services of
6LoWPAN in the IoT. INTI aims to mitigate attacker results
discovered in the IDS that disturb its efficiency, such as false
positive and negative attributed to the cost of the high-value
resources. The system combines watchdog, reputation, and
trust approaches for sinkhole attack detection by analyzing
device performance. INTI performance and its efficiency in
the phases of attack detection rate, various false positives, and
false negative [12] are shown in Fig. 6. The nodes in the
network comprise various resources, such as memory and
Fig. 6. Components in INTI IDS
Fig 5. SVELTE IDS modules are placed in 6BR and in individual
nodes
372
2017 8th International Conference on Information Technology (ICIT)
battery. Each node in the network is provided with a unique
address. The nodes are placed to form a virtual cluster and can
move in any direction. The transmission occurs through a
wireless medium. The nodes in the network are distributed as
leader (L), free (F), member (M), and associated (A) nodes,
and base (B) station. F nodes do not belong to any cluster and
can smoothly move within the network. M nodes belong to a
cluster and transfer their information via the L nodes. L nodes
receive information from the M and A nodes and pass it to the
B station. A node forward the information between clusters to
facilitate data transmission toward clusters. The B station
receives the collected data from all clusters.
C. Agent cluster-based IDS
The specification-based IDS was conducted by Le et al.
[13] to fix issues in the SVELTE approach, such as providing
low false positive rate and low resource consumption. The
proposed specification IDS comprises two stages. First, the
RPL using an extended finite-state machine to define all states
that are related to the network topology stability and analyze
those transition states by using a trace file. The second stage
translates the knowledge of the RPL profile using detection
algorithms that are placed in the IDS agent. The hybrid or
clustering architecture has advantages compared to other
approaches. Furthermore, the IDS agent is cluster-based,
which is placed in each cluster head and records the relevant
information from its members, as illustrated in Fig. 7. There
is no resource consumption because of the lack of overhead
processing on each node, while the cluster head can obtain
more resources to deal with the IDS work. The specification
cluster approach solves the synchronization issue that causes
the high false positive during the message exchange between
the nodes in the previous approach by adding the sequence
number information in the DIO and DIS messages. The
reserved bytes in the DIO and DIS message format is used;
thus, the sequence number where the packets of information
belongs are specifically defined, and the agent can cross-
check only the sources that have the same sequence.
III. D
ISCUSSIO N
The mechanisms based on rank encryption, such as
VERA, TRAIL, and secure parent approaches, implement
high-level encryption methods and provide rank check in each
node to prevent decrease rank attacks. However, these
mechanisms are complex in terms of implementation.
Moreover, each approach only works effectively when
combined with the other two approaches. Therefore,
combining mechanisms causes high resource consumption,
daily detection time, and interference, which lead to high false
positive rates [9], [14]. Furthermore, the parent fail-over
approach alone is insufficient in mitigating a sinkhole attack.
Sybil attack can also affect the determination of the parent
fail-over method by providing an infinite supply of candidate
parents for neighbor selection [10].
The agent distributed-based IDS, such as SVELTE and
INTI [12], [11], places an agent on both sides of the RPL. The
first agent in the host node is for reporting, and the second
agent in the DODAG root is for analyzing. These mechanisms
have two drawbacks. First, the false positive detection due to
the DODAG root has to report the information of the attacking
node to each node. However, the information may pass
through malicious nodes, which similarly perform as normal
nodes; thus, the delivered information is ineffective. The
second drawback is high resource consumption due to the
agent overhead processing, which is placed in each node.
Agent cluster-based IDS proposed in [13] adopted
SVELTE and overcame its problems by proposing cluster-
based IDS. However, the cluster-based IDS can fail due to
centralization. By contrast, when the IDS agent in the cluster
head goes down due to power or attack, the IDS will no longer
be functional. The following table provides a comparison
among the mechanisms and IDS that are used to detect
sinkhole attacks, as mentioned in Section II.
Table 1: Summary of mechanisms used to detect sinkhole attack on
RPL
Mechanisms Countermeasure
method Drawbacks
VERA [7]
DIO message rank
encryption using
SHA
Complex,
causes node
overhead,
resource
consumption,
and ineffective
TRAIL [8]
Analysis algorithm
for fixing VERA
issues
Based on
VERA, the
child node may
choose the
sinkhole node
as a parent
Secure
parent [9]
Selection algorithm
presenting a
threshold value to
solve the parent
selection issue in
TRAIL
Only
p
rovides
a symptom
solution for
parent
selection,
wherein other
issues still exist
Fig 7. Specification cluster-based IDS
373
2017 8th International Conference on Information Technology (ICIT)
Parent fail-
over [10]
Adds tag field to a
DIO message
I
n
sufficient fo
r
mitigating a
sinkhole attack;
the Sybil attack
can also affect
the
determination
of the parent
fail-over
method
SVELTE
[11]
IDS agent placed in
the host node and the
main root
High false
positive,
resource
consumption
INTI [12]
IDS classifies the
node to different
categories to report
to the root and
support node
mobility
Reduced
the false
positive and
resource
consumption
for SVELTE;
however, the
limitation of
both works in
which a few
critical QoS
metrics were
overlooked
Specification
cluster-based
[13]
Cluster-based IDS
centralizes the agent
in the middle of the
node graph to reduce
the overhead on the
nodes and the root
Solves the
resource
consumption
issue and the
false positive
issue in
SVELTE and
INTI; however,
it introduces a
high
probability of
IDS failure due
to
centralization
IV. C
ONCLUSION
This review aimed to provide a clear understanding
regarding the type of internal attacks and the influence of
sinkhole attacks on RPL. Moreover, the recently proposed
various mechanisms and IDS were concluded to detect
sinkhole attacks. Furthermore, each mechanism was analyzed
and studied, and their advantages and drawbacks with regard
to false positive rate and resource consumption were
highlighted. Finally, a brief comparison was provided in the
preceding table, which shows the historical deployment of the
detection mechanisms for sinkhole attack, thereby observing
the most recent effective mechanism. The future work will use
one environment (simulation) as a study method to implement
real-time experiments and provide a comparison among
different approaches. Our next work will apply machine
learning algorithms, such as support vector machine,
supported by a decision tree to obtain better results.
Acknowledgment
This research is supported by Short Term Research Grant,
Universiti Sains Malaysia (USM) No: 304/PNAV/6313272.
R
EFERENCES
[1] T. SHERAS IYA, H. UPADHY AY, and H. B. PATE L, “A SURV EY:
INTRUSION DETEC TION SYSTEM FOR INTERNET OF THINGS,”
International Journal of Computer Science and Engineering (IJCSE), vol. 5,
no. 2, 2016.
[2] K. Kim, S. D. Park, G. Montenegro, S. Yoo, and N. Kushalnagar,
“6LoWP AN ad hoc on-de mand dis tance vector routing (LOAD), Network
WG Internet Draft (work in progress), vol. 19, 2007.
[3] T. Winter, “RPL: IPv6 routing protocol for low-power and lossy networks,”
IETF RFC 6550, 2012.
[4] A. Mayzaud, R. Badonnel, and I. Chrisment, “A Taxonomy of Attacks in
RPL-based Internet of Things,” International Journal of Network Security,
2016.
[5] L. Wallgren, S. Raza, and T. Voigt, “Routing Attacks and Countermeasures
in the RPL-based Internet of Things,” International Journal of Distributed
Sensor Networks, vol. 2013, 2013.
[6] A. Le, J. Loo, A. Lasebae, M. Aiash, and Y. Luo, “6LoWPAN: a study on
QoS security threats and countermeasures using intrusion detection system
approach,” International Journal of Communication Systems, vol. 25, no. 9,
pp. 1189–1212, 2012.
[7] A. Dvir, L. Buttyan, and others, “VeRA-version number and rank
authentication in RPL,” in 2011 IEEE Eighth International Conference on
Mobile Ad-Hoc and Sensor Systems, 2011, pp. 709–714.
[8] H. Perrey, M. Landsmann, O. Ugus, T. C. Schmidt, and M. Wählisch,
“TRAIL: topology authentication in RPL,” arXiv preprint arXiv:1312.0984,
2013.
[9] I. Kenji, T. Matsunaga, K. Toyoda, and I. Sasase, “Secure parent node
select ion sche me in ro ute construct ion to e xclud e attac king no des fro m RPL
network,” IEICE Communications Express, vol. 4, no. 11, pp. 340–345,
2015.
[10] K. Weekly and K. Pister, “Evaluating sinkhole defense techniques in RPL
networks,” in 2012 20th IEEE International Conference on Network
Protocols (ICNP), 2012, pp. 1–6.
[11] S. Raza, L. Wallgren, and T. Voigt, “SVELTE: Real-time intrusion detection
in the Internet of Things,” Ad hoc networks, vol. 11, no. 8, pp. 2661–2674,
2013.
[12] C. Cervantes, D. Poplade, M. Nogueira, and A. Santos, “Detection of
sinkhole attacks for supporting secure routing on 6lowpan for internet of
things,” in 2015 IFIP/IEEE International Symposium on Integrated Network
Management (IM), 2015, pp. 606–611.
[13] A. Le, J. Loo, K. K. Chai, and M. Aiash, “A Specification-Based IDS for
Detecting Attacks on RPL-Based Network Topology,” Information, vol. 7,
no. 2, p. 25, 2016.
[14] P. Pongle and G. Chavan, “A survey: Attacks on RPL and 6LoWPAN in
IoT,” in Pervasive Computing (ICPC), 2015 International Conference on,
2015, pp. 1–6.
374
... Alzubaidi et al. [33] study focused on sinkhole attacks that could alter the topology of the network. This paper's goal was to look into the detection techniques currently in use for RPL-based network sinkhole attacks. ...
... The third one is the Gray hole Attack. The enemy node in this case obtains information from the neighboring node, but it does not pass the information on to the subsequent node [33]. All of these problems will consequently lead to higher energy consumption, packet loss, and makes lower throughput. ...
Article
Full-text available
IoT refers to a collection of smart connected devices that collect and process data to make the world smarter. By 2025, there will be around 41.6 billion connected IoT devices and entities. So, providing security to IoT devices and data communicated among the devices is necessary. This research aims at providing security for IoT data and devices in a real-time environment. Identifying malicious devices and removing them from the network will improve the lifetime of the networks as well as save the energy of each node in an IoT environment. The in-built and existing security mechanisms of the RPL protocol are not checking the control messages as many attacks have occurred in the current scenario. This paper proposes a protocol based on DODAG Information Object (DIO) and DODAG Advertisement Object (DAO) control messages which are used in RPL protocol. The proposed protocol ensures secure data and device communication among the nodes in the IoT environment by using Encrypted Certificate Attestation Service (CAS) Technique. The Cooja Platform Simulator, which is part of Contiki OS, is used to simulate the proposed work. The simulation outcomes demonstrate that the suggested IMDRPL protocol improves the lifetime of networks, and throughput and decreases packet loss compared to the existing RPL-based protocols.
... Butu et al. [93] proposed a NIDS for WSNs that combines the real model methodology and the standard model methodology. The framework relies on descending IDS and vertical IDS according to different levels of WSN structures. ...
Article
Full-text available
One of the key objectives of intelligent Internet of Things-based systems is to improve people's quality of life in terms of simplicity and efficiency. The paradigm for the Internet of Things (IoT) has surfaced recently as a technology to construct intelligent IoT systems. Security and privacy are essential considerations for all intelligent systems built on the Internet of Things concept. Because of the restricted processing and storage capabilities of IoT devices as well as their unique protocols, traditional IDSs are not a practical choice in an IoT environment. An overview of the most recent IDSs created for the IoT paradigm is given in this article, with particular attention to the techniques, features, and procedures of each. This essay also offers a thorough analysis of the IoT architecture, new security flaws, and how they relate to the layers of the IoT architecture. This study suggests that, despite previous studies on the design and implementation of integrated information systems in IoT paradigms, it is still an important task to develop efficient, reliable or trustworthy integrated information systems for IoT-based intelligent systems. This review concludes with future perspectives and important aspects to consider in the development of these IDS.
... A sinkhole attack is one of the most dangerous routing attacks in RPL protocol [27]. Airehrour et al. [23] proposed a trust-based centralized framework to prevent numerous security attacks, including sinkhole attacks in RPL, ensuring reliable communication between IoT devices. ...
Article
Full-text available
Extensive use of the Internet of Things (IoT) in smart homes makes users' lives easy and comfortable. Yet, these resource‐constrained devices are prone to manifold security attacks. The sinkhole attack is one of the most destructive attacks that disrupt smart home operations, causing user dissatisfaction. Existing intrusion detection systems (IDS) cannot handle sinkhole attacks competently as they (i) do not consider the node capacity for being an IDS agent, leading to a low attack detection ratio, (ii) do not examine the sinkhole node's role when mitigating attacks, causing remaining network disconnection with the root node and (iii) do not consider replacing energy‐exhausted IDS nodes, causing connectivity loss of partial network with the root. This paper addresses these shortcomings and adequately presents a mechanism to handle sinkhole attacks. A formulation for assigning weights to network nodes based on their resources is proposed here. An IDS placement strategy is introduced to place IDS agents on particular resourceful nodes that extend network lifetime and enhance attack detection capability. We present a novel attack detection and mitigation strategy by ensuring network connectivity. The proposed mechanism achieves 95% attack detection accuracy and reduces false negative rates by 25% and energy consumption reasonably compared to the state‐of‐the‐art.
Chapter
Sinkhole attacks have been the most dangerous threat to security in recent times. The attackers send malicious requests to Domain Name Server (DNS) that causes unavailability of services and redirects the victim to the destination designed by the malicious attacker. The malicious attacker with the help of these compromised devices forms a BOTNET and uses it for malicious purposes like ransomware, extortion, unauthorized access, fraudulent attempts, data theft, financial gains, eavesdropping, repudiation, etc. The attacker node or the sinkhole node was placed at three different locations to observe the change in count of DIO messages. The purpose of this research was to detect that at what locations can attacker gather a large amount of data. It was observed that when the attacker node was placed at the edge and along the communication links, there was a significant increase in the count of DIO messages. This means that at these points, attacker can gather a lot of information.
Article
Full-text available
As the Internet of Things (IoT) concept materialized worldwide in complex ecosystems, the related data security and privacy issues became apparent. While the system elements and their communication paths could be protected individually, generic, ecosystem-wide approaches were sought after as well. On a parallel timeline to IoT, the concept of distributed ledgers and blockchains came into the technological limelight. Blockchains offer many advantageous features in relation to enhanced security, anonymity, increased capacity, and peer-to-peer capabilities. Although blockchain technology can provide IoT with effective and efficient solutions, there are many challenges related to various aspects of integrating these technologies. While security, anonymity/data privacy, and smart contract-related features are apparently advantageous for blockchain technologies (BCT), there are challenges in relation to storage capacity/scalability, resource utilization, transaction rate scalability, predictability, and legal issues. This paper provides a systematic review on state-of-the-art approaches of BCT and IoT integration, specifically in order to solve certain security-and privacy-related issues. The paper first provides a brief overview of BCT and IoT's basic principles, including their architecture, protocols and consensus algorithms, characteristics, and the challenges of integrating them. Afterwards, it describes the survey methodology, including the search strategy, eligibility criteria, selection results, and characteristics of the included articles. Later, we highlight the findings of this study which illustrates different works that addressed the integration of blockchain technology and IoT to tackle various aspects of privacy and security, which are followed by a categorization of applications that have been investigated with different characteristics, such as their primary information, objective, development level, target application, type of blockchain and platform, consensus algorithm, evaluation environment and metrics, future works or open issues (if any), and further notes for consideration. Furthermore, a detailed discussion of all articles is included from an architectural and operational perspective. Finally, we cover major gaps and future considerations that can be taken into account when integrating blockchain technology with IoT.
Conference Paper
Full-text available
RC-EEE 2021
Article
Full-text available
Routing Protocol for Low power and Lossy network (RPL) topology attacks can downgrade the network performance significantly by disrupting the optimal protocol structure. To detect such threats, we propose a RPL-specification, obtained by a semi-auto profiling technique that constructs a high-level abstract of operations through network simulation traces, to use as reference for verifying the node behaviors. This specification, including all the legitimate protocol states and transitions with corresponding statistics, will be implemented as a set of rules in the intrusion detection agents, in the form of the cluster heads propagated to monitor the whole network. In order to save resources, we set the cluster members to report related information about itself and other neighbors to the cluster head instead of making the head overhearing all the communication. As a result, information about a cluster member will be reported by different neighbors, which allow the cluster head to do cross-check. We propose to record the sequence in RPL Information Object (DIO) and Information Solicitation (DIS) messages to eliminate the synchronized issue created by the delay in transmitting the report, in which the cluster head only does cross-check on information that come from sources with the same sequence. Simulation results show that the proposed Intrusion Detection System (IDS) has a high accuracy rate in detecting RPL topology attacks, while only creating insignificant overhead (about 6.3%) that enable its scalability in large-scale network.
Conference Paper
Full-text available
The Internet of Things (IoT) networks are vulnerable to various kinds of attacks, being the sinkhole attack one of the most destructive since it prevents communication among network devices. In general, existing solutions are not effective to provide protection and security against attacks sinkhole on IoT, and they also introduce high consumption of resources de memory, storage and processing. Further, they do not consider the impact of device mobility, which in essential in urban scenarios, like smart cities. This paper proposes an intrusion detection system, called INTI (Intrusion detection of SiNkhole attacks on 6LoWPAN for InterneT of ThIngs), to identify sinkhole attacks on the routing services in IoT. Moreover, INTI aims to mitigate adverse effects found in IDS that disturb its performance, like false positive and negative, as well as the high resource cost. The system combines watchdog, reputation and trust strategies for detection of attackers by analyzing the behavior of devices. Results show the INTI performance and its effectiveness in terms of attack detection rate, number of false positives and false negatives.
Article
Full-text available
Low-Power and Lossy Networks (LLNs) are a class of network in which both the routers and their interconnect are constrained. LLN routers typically operate with constraints on processing power, memory, and energy (battery power). Their interconnects are characterized by high loss rates, low data rates, and instability. LLNs are comprised of anything from a few dozen to thousands of routers. Supported traffic flows include point-to-point (between devices inside the LLN), point-to-multipoint (from a central control point to a subset of devices inside the LLN), and multipoint-to-point (from devices inside the LLN towards a central control point). This document specifies the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), which provides a mechanism whereby multipoint-to-point traffic from devices inside the LLN towards a central control point as well as point-to-multipoint traffic from the central control point to the devices inside the LLN are supp
Article
Full-text available
The IPv6 Routing Protocol for Low-Power and Lossy Networks was recently introduced as the new routing standard for the Internet of Things. Although RPL defines basic security modes, it remains vulnerable to topological attacks which facilitate blackholing, interception, and resource exhaustion. We are concerned with analyzing the corresponding threats and protecting future RPL deployments from such attacks. Our contributions are twofold. First, we analyze the state of the art, in particular the protective scheme VeRA and present two new rank order attacks as well as extensions to mitigate them. Second, we derive and evaluate TRAIL, a generic scheme for topology authentication in RPL. TRAIL solely relies on the basic assumptions of RPL that (1) the root node serves as a trust anchor and (2) each node interconnects to the root in a straight hierarchy. Using proper reachability tests, TRAIL scalably and reliably identifies any topological attacker without strong cryptographic efforts.
Article
Full-text available
The Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol standardized for constrained environments such as 6LoWPAN networks. Providing security in IPv6/RPL connected 6LoWPANs is challenging because the devices are connected to the untrusted Internet and are resource constrained, the communication links are lossy, and the devices use a set of novel IoT technologies such as RPL, 6LoWPAN, and CoAP/CoAPs. In this paper we provide a comprehensive analysis of IoT technologies and their new security capabilities that can be exploited by attackers or IDSs. One of the major contributions in this paper is our implementation and demonstration of well-known routing attacks against 6LoWPAN networks running RPL as a routing protocol. We implement these attacks in the RPL implementation in the Contiki operating system and demonstrate these attacks in the Cooja simulator. Furthermore, we highlight novel security features in the IPv6 protocol and exemplify the use of these features for intrusion detection in the IoT by implementing a lightweight heartbeat protocol.
Article
The growing interest for the Internet of Things is contributing to the large-scale deployment of Low power and Lossy Networks (LLN). These networks support communications amongst objects from the real world, such as home automation devices and embedded sensors, and their interconnection to the Internet. An open standard routing protocol, called RPL, has been specified by the IETF in order to address the specific properties and constraints of these networks. However, this protocol is exposed to a large variety of attacks. Their consequences can be quite significant in terms of network performance and resources. In this paper, we propose to establish a taxonomy of the attacks against this protocol, considering three main categories including attacks targeting network resources, attacks modifying the network topology and attacks related to network traffic. We describe these attacks, analyze and compare their properties, discuss existing counter-measures and their usage from a risk management perspective.
Conference Paper
6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard allows heavily constrained devices to connect to IPv6 networks. 6LoWPAN is novel IPv6 header compression protocol, it may go easily under attack. Internet of Things consist of devices which are limited in resource like battery powered, memory and processing capability etc. for this a new network layer routing protocol is designed called RPL (Routing Protocol for low power Lossy network). RPL is light weight protocol and doesn't have the functionality like of traditional routing protocols. This rank based routing protocol may goes under attack. Providing security in Internet of Things is challenging as the devices are connected to the unsecured Internet, limited resources, the communication links are lossy and set of novel technologies used such as RPL, 6LoWPAN etc. This paper focus on possible attacks on RPL and 6LoWPAN network, counter measure against them and consequences on network parameters. Along with comparative analysis of methods to mitigate these attacks are done and finally the research opportunities in network layer security are discussed.
Conference Paper
In this work, we present the results of a study on the detrimental effects of sinkhole attacks on Wireless Sensor Networks (WSNs) which employ the Routing Protocol for LLNs (Low-power and Lossy Networks). A sinkhole is a compromised node which attempts to capture traffic with the intent to drop messages, thus degrading the end-to-end delivery performance, that is, reducing the number of messages successfully delivered to their destination. The mechanism by which the sinkhole captures traffic is by advertising an attractive route to its neighbors. We evaluate two countermeasures addressing the sinkhole problem: a parent fail-over and a rank authentication technique. We show via simulation that while each technique, applied alone, does not work all that well, the combination of the two techniques significantly improves the performance of a network under attack. We also demonstrate that, with the defenses described, increasing the density of the network can combat a penetration of sinkholes nodes, without needing to identify the sinkholes.
Article
In the Internet of Things (IoT), resource-constrained things are connected to the unreliable and untrusted Internet via IPv6 and 6LoWPAN networks. Even when they are secured with encryption and authentication, these things are exposed both to wireless attacks from inside the 6LoWPAN network and from the Internet. Since these attacks may succeed, Intrusion Detection Systems (IDS) are necessary. Currently, there are no IDSs that meet the requirements of the IPv6-connected IoT since the available approaches are either customized for Wireless Sensor Networks (WSN) or for the conventional Internet. In this paper we design, implement, and evaluate a novel intrusion detection system for the IoT that we call SVELTE. In our implementation and evaluation we primarily target routing attacks such as spoofed or altered information, sinkhole, and selective-forwarding. However, our approach can be extended to detect other attacks. We implement SVELTE in the Contiki OS and thoroughly evaluate it. Our evaluation shows that in the simulated scenarios, SVELTE detects all malicious nodes that launch our implemented sinkhole and/or selective forwarding attacks. However, the true positive rate is not 100%, i.e., we have some false alarms during the detection of malicious nodes. Also, SVELTE's overhead is small enough to deploy it on constrained nodes with limited energy and memory capacity.
Article
Fuelled to bring the Internet of Things concept to real life, the Internet Engineering Task Force is working on 6LoWPAN, in which the standard allows a vast number of smart objects to be deployed in local wireless sensor networks (WSNs) using the huge address space of IPv6 for data and information harvesting through the Internet. From the security point of view, 6LoWPAN/WSN will be open to security threats from the local network itself and the Internet. Cryptography techniques applied as the front line of defence or deterrent can easily be broken because of the weak secure nature of LoWPAN devices and the wireless environment. Compromised nodes could lead to insider attacks without being detected by any cryptography checking. An intrusion detection system (IDS) is, primarily needed as a second line of defence to monitor the network operations and raise an alarm in case of any anomaly. This paper analyses potential security threats in 6LoWPAN and reviews the current countermeasures, in particular, the IDS-based solutions for countering insider/internal threats. Additionally, it discovers three novel QoS-related security threats, namely rank attack, local repair attack, and resource depleting attack, which are more seriously affecting the routing protocol for low-power and lossy network, the routing protocol used to establish 6LoWPAN network topology. A new two-layer IDS concept is introduced as a countermeasure method for securing the routing protocol for low-power and lossy network-built network topology from the internal QoS attacks. Potential research works are also presented to provide baseline reference to researchers in this field