LEADER: Low Overhead Rank Attack Detection for Securing RPL based IoT

11/25/2020
by   Somnath Karmakar, et al.
0

In recent times researchers have found several security vulnerabilities in the Routing Protocol for Low power and Lossy network (RPL), amongst which rank attack is a predominant one causing detrimental effects on the network by creating a fake topology. To address this concern, we propose a low-overhead rank attack detection scheme for non-storing mode of RPL used in IoT to deal with both increased and decreased rank attacks. Accordingly, we have modified the RPL Destination Oriented Directed Acyclic Graph (DODAG) formation algorithm to detect rank attacks during topology formation and maintenance. The distributed module of the algorithm runs in all the participating nodes whereas the centralized module runs in the sink. Unlike many existing schemes, instead of sending additional control message, we make the scheme low-overhead by simply modifying the DAO control message. Additionally, a lightweight Message Authentication Code (HMAC-LOCHA) is used to verify the integrity and authenticity of the control messages exchanged between nodes and the sink. The correctness of the proposed scheme is established through a concrete proof using multiple test case scenarios. Finally, the performance of the proposed scheme is evaluated both theoretically and through simulation in Contiki-based Cooja simulator. Theoretical evaluation proves the energy efficiency of the scheme. Simulation results show that our scheme outperforms over a state-of-the-art rank attack detection scheme in terms of detection accuracy, false positive or negative rate and energy consumption while also keeping acceptable network performance such as improved detection latency and at par packet delivery ratio.

READ FULL TEXT

page 1

page 8

research
02/24/2023

CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis

The IPv6 routing protocol for low-power and lossy networks (RPL) is the ...
research
04/09/2019

Reliable Group Communication Protocol for Internet of Things

In this paper, we propose RECOUP, a reliable group communication routing...
research
01/31/2020

Battery draining attacks against edge computing nodes in IoT networks

Many IoT devices, especially those deployed at the network edge have lim...
research
02/19/2021

Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem

The Internet of Things (IoT) ecosystem allows communication between bill...
research
03/01/2023

Addressing DAO Insider Attacks in IPv6-Based Low-Power and Lossy Networks

Low-Power and Lossy Networks (LLNs) run on resource-constrained devices ...
research
08/29/2023

LoVe is in the Air – Location Verification of ADS-B Signals using Distributed Public Sensors

The Automatic Dependant Surveillance-Broadcast (ADS-B) message scheme wa...
research
04/11/2019

Detecting Sybil Attacks using Proofs of Work and Location in VANETs

In this paper, we propose a Sybil attack detection scheme using proofs o...

Please sign up or login with your details

Forgot password? Click here to reset