Secure IoT Routing: Selective Forwarding Attacks and Trust-based Defenses in RPL Network

01/18/2022
by   Jun Jiang, et al.
0

IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is an essential routing protocol to enable communications for IoT networks with low power devices. RPL uses an objective function and routing constraints to find an optimized routing path for each node in the network. However, recent research has shown that topological attacks, such as selective forwarding attacks, pose great challenges to the secure routing of IoT networks. Many conventional secure routing solutions, on the other hand, are computationally heavy to be directly applied in resource-constrained IoT networks. There is an urgent need to develop lightweight secure routing solutions for IoT networks. In this paper, we first design and implement a series of advanced selective forwarding attacks from the attack perspective, which can flexibly select the type and percentage of forwarding packets in an energy efficient way, and even bad-mouth other innocent nodes in the network. Experiment results show that the proposed attacks can maximize the attack consequences (i.e. number of dropped packets) while maintaining undetected. Moreover, we propose a lightweight trust-based defense solution to detect and eliminate malicious selective forwarding nodes from the network. The results show that the proposed defense solution can achieve high detection accuracy with very limited extra energy usage (i.e. 3.4

READ FULL TEXT
research
03/01/2023

Addressing DAO Insider Attacks in IPv6-Based Low-Power and Lossy Networks

Low-Power and Lossy Networks (LLNs) run on resource-constrained devices ...
research
04/29/2021

Integrating 6LoWPAN Security with RPL Using The Chained Secure Mode Framework

The IPv6 over Low-powered Wireless Personal Area Network (6LoWPAN) proto...
research
01/31/2020

Battery draining attacks against edge computing nodes in IoT networks

Many IoT devices, especially those deployed at the network edge have lim...
research
12/28/2017

TEDS: A Trusted Entropy and Dempster Shafer Mechanism for Routing in Wireless Mesh Networks

Wireless Mesh Networks (WMNs) have emerged as a key technology for the n...
research
05/18/2022

Adaptive Hybrid Heterogeneous IDS for 6LoWPAN

IPv6 over Low-powered Wireless Personal Area Networks (6LoWPAN) have gro...
research
05/04/2022

V'CER: Efficient Certificate Validation in Constrained Networks

We address the challenging problem of efficient trust establishment in c...
research
05/24/2019

Secure Routing in IoT: Evaluation of RPL Secure Mode under Attacks

As the Routing Protocol for Low Power and Lossy Networks (RPL) became th...

Please sign up or login with your details

Forgot password? Click here to reset