Enhancing Routing Security in IoT: Performance Evaluation of RPL Secure Mode under Attacks

04/15/2020
by   Ahmed Raoof, et al.
0

As the Routing Protocol for Low Power and Lossy Networks (RPL) became the standard for routing in the Internet of Things (IoT) networks, many researchers had investigated the security aspects of this protocol. However, no work (to the best of our knowledge) has investigated the use of the security mechanisms included in RPL standard, mainly because there was no implementation for these features in any IoT operating systems yet. A partial implementation of RPL security mechanisms was presented recently for the Contiki operating system (by Perazzo et al.), which provided us with an opportunity to examine RPL security mechanisms. In this paper, we investigate the effects and challenges of using RPL security mechanisms under common routing attacks. First, a comparison of RPL performance, with and without its security mechanisms, under four routing attacks (Blackhole, Selective-Forward, Neighbor, and Wormhole attacks) is conducted using several metrics (e.g., average data packet delivery rate, average data packet delay, average power consumption, etc.). This comparison is performed using two commonly used Radio Duty-Cycle protocols. Secondly, and based on the observations from this comparison, we propose two techniques that could reduce the effects of such attacks, without having added security mechanisms for RPL. An evaluation of these techniques shows improved performance of RPL under the investigated attacks, except for the Wormhole attack.

READ FULL TEXT

page 1

page 2

page 3

page 4

page 5

page 8

page 9

page 10

research
05/24/2019

Secure Routing in IoT: Evaluation of RPL Secure Mode under Attacks

As the Routing Protocol for Low Power and Lossy Networks (RPL) became th...
research
02/11/2021

Securing RPL using Network Coding: The Chained Secure Mode (CSM)

As the de facto routing protocol for many Internet of Things (IoT) netwo...
research
04/29/2021

Integrating 6LoWPAN Security with RPL Using The Chained Secure Mode Framework

The IPv6 over Low-powered Wireless Personal Area Network (6LoWPAN) proto...
research
03/01/2023

The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things

IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is the stan...
research
04/24/2019

Impersonating LoRaWAN gateways using Semtech Packet Forwarder

Low Power Wide Area Network (LPWAN) technologies like the Long Range Wid...
research
12/31/2019

Patterns and Interactions in Network Security

Networks play a central role in cyber-security: networks deliver securit...
research
08/01/2019

Runtime Mitigation of Packet Drop Attacks in Fault-tolerant Networks-on-Chip

Fault-tolerant routing (FTR) in Networks-on-Chip (NoCs) has become a com...

Please sign up or login with your details

Forgot password? Click here to reset