Addressing Attacks and Security Mechanism in the RPL based IOT

IJCSEC Front Page

Abstract:
Addressing and Mitigating the Routing Attacks in the RPL (Routing Protocol for Low Power and Lossy Networks) based IOT (Internet of Things) is challenging endeavor. RPL is peculiar for the IPv6, which is concerned to substitute IPv4 to overcome the long-lasting foretell problem of IPv4 address lethargy. The RPL protocol, contradict more functions while running on the support less devices. Through this prolonged severe behavior leads to the attack in the network topology constraints. The objective of the paper is to address the Rank Attack which has significant performance degradation in the network. This Attack creates a fleeting change in a network to diverse the regular paths and stop sending packets to the sink (destination). A Mechanism is proposed to mitigate the attack which leads to secure communication from source to destination. Due to secure communication, the packet delivery ratio is increased to 90% and above with a trade-off in latency.

Keywords: RPL, IOT, IPv4, IPv6, Rank Attack, Cooja Simulator, Contiki Operating System.

References:

  1. T. Winter, P. Thubert, A. Brandt et al., “RPL: IPV6 routing protocol for low-power and lossy networks,” RFC 6550, March 2012.
  2. N. Kushalnagar, G. Montenegro, and C. Schumacher, “IPv6 over low-power wireless personal Area networks (6LoWPANs): overview, assumptions, problem statement, and goals,” RFC 4919, 2007.
  3. S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt, and U. Roedig, “Securing communication in 6LoWPAN with compressed IPsec,” in Proceeding of the 7th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS ‟11), Barcelona, Spain, June 2011.
  4. T. Kothmayr, C. Schmitt,W.Hu, M. Brunig, and G. Carle, DTLS Based Security and Two way authentication for the Internet of Things, Ad Hoc Networks, 2013.
  5. S. Raza, D. Trabalza, and T. Voigt, “6low-pan compressed dtls for coap,” in Proceeding IEEE 8th International Conference of Distributed Computing in Sensor Systems (DCOSS ‟12), pp. 287-289, IEEE, 2012.
  6. S. Raza, S. Duquennoy, J. H¨oglund, U. Roedig, and T. Voigt, Secure Communication for the Internet of Things— A Comparison of Link- Layer Security and IP sec for 6LoWPAN, Security and Communication Networks, John Wiley & Sons, 2012.
  7. O. Garcia-Morchon, R. Hummen, S. S. Kumar, R. Struik, and S. L. Keoh, “Security Considerations in the IP- based Internet of Things,” March 2012.
  8. A. Dunkels et al., “The contiki operatingsystem,” 2012, http:// www.sics.se/contiki/.
  9. N. Tsiftes, J. Eriksson, and A. Dunkels, “Low-power wireless IPv6 routing with Contiki RPL,” in Proceeding of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN ‟10), pp. 406-407,ACM, April 2010.
  10. Z. Shelby, K. Kartke, C. Bormann, and B. Frank, “Constrained application protocol (CoAP),” draft-ietf-core-coap- 12, October 2012.