EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things
Routing Protocol for Low Power and Lossy Networks (RPL) is the only standard protocol that assists the routing process in Low Power and Lossy Networks (LLNs) - based Internet of Things (IoT) applications. However, due to the resource-constrained nature, lack of physical protection and security requi...
Gespeichert in:
Veröffentlicht in: | Peer-to-peer networking and applications 2022, Vol.15 (1), p.642-665 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Routing Protocol for Low Power and Lossy Networks (RPL) is the only standard protocol that assists the routing process in Low Power and Lossy Networks (LLNs) - based Internet of Things (IoT) applications. However, due to the resource-constrained nature, lack of physical protection and security requirements of the inherent protocol, LLNs are vulnerable to attacks that primarily alter the working of the RPL protocol and disrupt the ongoing communication. Therefore, it is a high profit and desperate target of many attackers. Our work offers a detailed overview of one such significant threat to RPL known as the rank attack. Considering the resource-constrained nature of the IoT devices, we propose and evaluate a lightweight and efficient method to mitigate and isolate the rank attack. Specifically, our approach uses a novel Echelon Metric Based Objective Function (EMBOF) over the default RPL to calculate and check the legitimacy of the advertised rank. The Echelon value is additively determined by the root node and the corresponding parent node(s) in the RPL network topology. Our approach not only detects the attacker node(s) but also isolates it immediately. We implement and evaluate our approach through extensive simulations in Cooja, a Contiki operating system (OS) based simulator. The results of our experiments show the viability of our proposal concerning detection accuracy, isolation latency, packet delivery ratio, end-to-end delay, power consumption and memory overhead. |
---|---|
ISSN: | 1936-6442 1936-6450 |
DOI: | 10.1007/s12083-021-01275-3 |