Securing RPL using Network Coding: The Chained Secure Mode (CSM)

02/11/2021
by   Ahmed Raoof, et al.
0

As the de facto routing protocol for many Internet of Things (IoT) networks nowadays, and to assure the confidentiality and integrity of its control messages, the Routing Protocol for Low Power and Lossy Networks (RPL) incorporates three modes of security: the Unsecured Mode (UM), Preinstalled Secure Mode (PSM), and the Authenticated Secure Mode (ASM). While the PSM and ASM are intended to protect against external routing attacks and some replay attacks (through an optional replay protection mechanism), recent research showed that RPL in PSM is still vulnerable to many routing attacks, both internal and external. In this paper, we propose a novel secure mode for RPL, the Chained Secure Mode (CSM), based on the concept of intraflow Network Coding (NC). The CSM is designed to enhance RPL resilience and mitigation capability against replay attacks while allowing the integration with external security measures such as Intrusion Detection Systems (IDSs). The security and performance of the proposed CSM were evaluated and compared against RPL in UM and PSM (with and without the optional replay protection) under several routing attacks: the Neighbor attack (NA), Wormhole (WH), and CloneID attack (CA), using average packet delivery rate (PDR), End-to-End (E2E) latency, and power consumption as metrics. It showed that CSM has better performance and more enhanced security than both the UM and PSM with the replay protection, while mitigating both the NA and WH attacks and significantly reducing the effect of the CA in the investigated scenarios.

READ FULL TEXT

page 1

page 5

page 7

page 8

page 10

research
05/30/2020

Introducing Network Coding to RPL: The Chained Secure Mode (CSM)

As the de facto routing protocol for many Internet of Things (IoT) netwo...
research
04/29/2021

Integrating 6LoWPAN Security with RPL Using The Chained Secure Mode Framework

The IPv6 over Low-powered Wireless Personal Area Network (6LoWPAN) proto...
research
08/01/2019

Runtime Mitigation of Packet Drop Attacks in Fault-tolerant Networks-on-Chip

Fault-tolerant routing (FTR) in Networks-on-Chip (NoCs) has become a com...
research
05/24/2019

Secure Routing in IoT: Evaluation of RPL Secure Mode under Attacks

As the Routing Protocol for Low Power and Lossy Networks (RPL) became th...
research
04/15/2020

Enhancing Routing Security in IoT: Performance Evaluation of RPL Secure Mode under Attacks

As the Routing Protocol for Low Power and Lossy Networks (RPL) became th...
research
10/29/2019

A Ultimate Approach of Mitigating Attacks in RPL Based Low Power Lossy Networks

The Routing Protocol for Low-Power and Lossy Networks (RPL) is the exist...
research
07/08/2019

Mitigating Censorship with Multi-Circuit Tor and Linear Network Coding

Anonymity networks are providing practical mechanisms to protect its use...

Please sign up or login with your details

Forgot password? Click here to reset