A Trust-Aware RPL Routing Protocol to Detect Blackhole and Selective Forwarding Attacks

Main Article Content

David Airehrour
Jairo A. Gutierrez
Sayan Kumar Ray

Keywords

IoT, RPL, Trust, Blackhole attacks, Selective Forwarding attacks

Abstract

This research addresses blackhole and selective forwarding routing attacks, which are fundamental security attacks on the routing of data in IoT networks. Most IoT devices today, from medical devices to connected vehicles and even smart buildings, have the capability of communicating wirelessly with one another. Although, consumers are progressively embracing the concept of connected devices, recent studies indicate that security is not high on the priority list of manufacturers especially in the way these IoT devices route and communicate data amongst themselves. Thus, it leaves the door wide open to attacks and compromises. In this study, a trust-based routing Protocol for Low-Power and Lossy Networks addressing blackhole and selective forwarding attacks is proposed. We show that our proposed protocol is not only secure from blackhole and selective forwarding attacks, but also does not impose undue overheads on network traffic.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...
Abstract 697 | PDF Downloads 17

References

Amin, S. O., Siddiqui, M. S., Hong, C. S., & Choe, J. (2009). A novel coding scheme to implement signature based IDS in IP based Sensor Networks. Paper presented at the Integrated Network Management-Workshops, 2009. IM'09. IFIP/IEEE International Symposium on.

Bysani, L. K., & Turuk, A. K. (2011). A survey on selective forwarding attack in wireless sensor networks. Paper presented at the Devices and Communications (ICDeCom), 2011 International Conference on.

Chinn, D., Kaplan, J., & Weinberg, A. (2014). Risk and responsibility in a hyperconnected world: Implications for enterprises: McKinsey Global Institute.

Chugh, K., Aboubaker, L., & Loo, J. (2012). Case Study of a Black Hole Attack on LoWPAN-RPL. Paper presented at the Proc. of the Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), Rome, Italy (August 2012).

Dvir, A., Holczer, T., & Buttyan, L. (2011). VeRA-version number and rank authentication in rpl. Paper presented at the Mobile Adhoc and Sensor Systems (MASS), 2011 IEEE 8th International Conference on.

Ericsson. (2011). More than 50 billion connected devices: Driving forces. http://www.akos-rs.si/files/Telekomunikacije/Digitalna_agenda/Internetni_protokol_Ipv6/More-than-50-billion-connected-devices.pdf

Gnawali, O. (2012). The minimum rank with hysteresis objective function. https://tools.ietf.org/html/rfc6719

Hu, Y., Wu, Y., & Wang, H. (2014). Detection of insider selective forwarding attack based on monitor node and trust mechanism in wsn. Wireless Sensor Network, 6(11), 237.

Kasinathan, P., Pastrone, C., Spirito, M., & Vinkovits, M. (2013). Denial-
of-Service detection in 6LoWPAN based Internet of Things. Paper presented at the Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on.

Le, A., Loo, J., Lasebae, A., Aiash, M., & Luo, Y. (2012). 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication Systems, 25(9), 1189-1212. doi: 10.1002/dac.2356

Mathur, A., Newe, T., & Rao, M. (2016). Defence against black hole and selective forwarding attacks for medical WSNs in the IoT. Sensors, 16(1), 118.

Nordrum, A. (2016). Quantum Computer Comes Closer to Cracking RSA Encryption. IEEE Spectrum.

Perrey, H., Landsmann, M., Ugus, O., Schmidt, T. C., & Wählisch, M.
(2013). TRAIL: Topology Authentication in RPL. arXiv preprint arXiv:1312.0984.

Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Netw., 11(8), 2661-2674. doi: 10.1016/j.adhoc.2013.04.014

Ren, J., Zhang, Y., Zhang, K., & Shen, X. (2016). Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Transactions on Wireless Communications, 15(5), 3718-3731.

Thingsquare. (2016). Contiki: The Open Source OS for the Internet of Things,. Retrieved June, 2016, from http://www.contiki-os.org/download.html

Tsao, T., Alexander, R., Dohler, M., Daza, V., Lozano, A., & Richardson, M. (2014). A Security Threat Analysis for Routing Protocol for Low-power and lossy networks (RPL).

Wallgren, L., Raza, S., & Voigt, T. (2013). Routing Attacks and Countermeasures in the RPL-Based Internet of Things. International Journal of Distributed Sensor Networks, 2013, 11. doi: 10.1155/2013/794326

Weekly, K., & Pister, K. (2012). Evaluating sinkhole defense techniques in RPL networks. Paper presented at the Network Protocols (ICNP), 2012 20th IEEE International Conference on.

Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., . . . Alexander, R. (2012). RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. https://tools.ietf.org/html/rfc6550

Zhang, K., Liang, X., Lu, R., & Shen, X. (2014). Sybil Attacks and Their Defenses in the Internet of Things. Internet of Things Journal, IEEE, 1(5), 372-383.