Routing Protocol Security for Low-Power and Lossy Networks in the Internet of Things

Author(s):  
Akshet Patel ◽  
D. Shanmugapriya ◽  
Gautam Srivastava ◽  
Jerry Chun-Wei Lin
Author(s):  
Faiza Medjek ◽  
Djamel Tandjaoui ◽  
Imed Romdhani ◽  
Nabil Djedjig

In the internet of things (IoT) vision, people, systems, and objects with sensing and/or actuating capabilities communicate to monitor and control the physical world. Nowadays, the IoT concept has attracted significant attention from different application domain such as healthcare and smart homes. Indeed, self-organization and self-configuration are key characteristics of IoT given that IoT represents a pervasive environment where objects are resource-constrained and communication technologies are very ubiquitous. These characteristics in addition to the vulnerability of objects themselves and of the communication channels make IoT more susceptible to malicious attacks. In this context, a deep analysis of IoT security breach and vulnerabilities is necessary. This chapter presents IoT requirements and existing threats as well as security protocols and mechanisms. It specifically analyzes existing and new threats against the IoT's routing protocol (the routing protocol for low-power and lossy networks: RPL) and presents intrusion detection solutions (IDS) to counter RPL attacks.


Author(s):  
Firas A. Albalas ◽  
Haneen Taamneh ◽  
Wail E. Mardini

Recently, the internet of things (IoT) has become an important concept which has changed the vision of the Internet with the appearance of IPv6 over low power and lossy networks (6LoWPAN). However, these 6LoWPANs have many drawbacks because of the use of many devices with limited resources; therefore, suitable protocols such as the Routing Protocol for low power and lossy networks (RPL) were developed, and one of RPL's main components is the trickle timer algorithm, used to control and maintain the routing traffic frequency caused by a set of control messages. However, the trickle timer suffered from the short-listen problem which was handled by adding the listen-only period mechanism. This addition increased the delay in propagating transmissions and resolving the inconsistency in the network. However, to solve this problem we proposed the history based consistency algorithm (HBC), which eliminates the listen-only period based on the consistency period of the network. The proposed algorithm showed very good results. We measured the performance of HBC trickle in terms of convergence time; which was mainly affected, the power consumption and the packet delivery ratio (PDR). We made a comparison between the original trickle timer, the E-Trickle, the optimized trickle and our HBC trickle algorithm. The PDR and the power consumption showed in some cases better results under the HBC trickle compared to other trickle timers and in other cases the results were very close to the original trickle indicating the efficiency of the proposed trickle in choosing optimal routes when sending messages.


Author(s):  
S. Umamaheswari

The future internet is expected to be an internet of things (IoT) that makes a huge increase in its capability to collect, investigate, and distribute data that can be turned into information or knowledge. The changeover to IPv6, having a common set of standards and developing energy sources for millions of minute sensors, are the challenges of IoT. The environment can be made smart and self-aware by the direct communication between more and more devices that are part of the IoT. The low power lossy networks (LLNs) that consist of more tiny sensors and low power devices are the elements of the IoT. The TCP/IP reference model is used for the internet connectivity, which is not exactly suited for the network that uses smart objects. There is a need to connect the local network that has the smart objects to the internet. The Internet Engineering Task Force (IETF) has come out with the standardized protocols like 6LoWPAN, RPL, COAP, etc. This chapter provides the various protocols used in the internet of things network with their specifications, benefits, and limitations.


Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 5997
Author(s):  
Zahrah A. Almusaylim ◽  
NZ Jhanjhi ◽  
Abdulaziz Alhumam

The rapid growth of the Internet of Things (IoT) and the massive propagation of wireless technologies has revealed recent opportunities for development in various domains of real life, such as smart cities and E-Health applications. A slight defense against different forms of attack is offered for the current secure and lightweight Routing Protocol for Low Power and Lossy Networks (RPL) of IoT resource-constrained devices. Data packets are highly likely to be exposed in transmission during data packet routing. The RPL rank and version number attacks, which are two forms of RPL attacks, can have critical consequences for RPL networks. The studies conducted on these attacks have several security defects and performance shortcomings. In this research, we propose a Secure RPL Routing Protocol (SRPL-RP) for rank and version number attacks. This mainly detects, mitigates, and isolates attacks in RPL networks. The detection is based on a comparison of the rank strategy. The mitigation uses threshold and attack status tables, and the isolation adds them to a blacklist table and alerts nodes to skip them. SRPL-RP supports diverse types of network topologies and is comprehensively analyzed with multiple studies, such as Standard RPL with Attacks, Sink-Based Intrusion Detection Systems (SBIDS), and RPL+Shield. The analysis results showed that the SRPL-RP achieved significant improvements with a Packet Delivery Ratio (PDR) of 98.48%, a control message value of 991 packets/s, and an average energy consumption of 1231.75 joules. SRPL-RP provided a better accuracy rate of 98.30% under the attacks.


Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 2144 ◽  
Author(s):  
José V. V. Sobral ◽  
Joel J. P. C. Rodrigues ◽  
Ricardo A. L. Rabêlo ◽  
Jalal Al-Muhtadi ◽  
Valery Korotaev

The emergence of the Internet of Things (IoT) and its applications has taken the attention of several researchers. In an effort to provide interoperability and IPv6 support for the IoT devices, the Internet Engineering Task Force (IETF) proposed the 6LoWPAN stack. However, the particularities and hardware limitations of networks associated with IoT devices lead to several challenges, mainly for routing protocols. On its stack proposal, IETF standardizes the RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) as the routing protocol for Low-power and Lossy Networks (LLNs). RPL is a tree-based proactive routing protocol that creates acyclic graphs among the nodes to allow data exchange. Although widely considered and used by current applications, different recent studies have shown its limitations and drawbacks. Among these, it is possible to highlight the weak support of mobility and P2P traffic, restrictions for multicast transmissions, and lousy adaption for dynamic throughput. Motivated by the presented issues, several new solutions have emerged during recent years. The approaches range from the consideration of different routing metrics to an entirely new solution inspired by other routing protocols. In this context, this work aims to present an extensive survey study about routing solutions for IoT/LLN, not limited to RPL enhancements. In the course of the paper, the routing requirements of LLNs, the initial protocols, and the most recent approaches are presented. The IoT routing enhancements are divided according to its main objectives and then studied individually to point out its most important strengths and weaknesses. Furthermore, as the main contribution, this study presents a comprehensive discussion about the considered approaches, identifying the still remaining open issues and suggesting future directions to be recognized by new proposals.


2020 ◽  
Vol 63 (6) ◽  
pp. 958-973
Author(s):  
Muhammad Omer Farooq

Abstract The routing protocol for low-power and lossy networks (RPL) is a standard routing framework for Internet of Things (IoT). It supports multipoint-to-point (MP-to-P), point-to-point (P-to-P) and point-to-multipoint (P-to-MP) communications. It is known that RPL’s control overhead can result in the protocol’s poor performance in P-to-P and P-to-MP communications especially in its non-storing mode of operation. Here, we present a routing protocol for the Internet of Things (RIoT) that supports MP-to-P, P-to-P and P-to-MP communications. The protocol can construct P-to-P and P-to-MP routes with relatively lower control overhead. Another salient feature of RIoT is that it supports multiple gateways in the same network with an aim to reduce memory requirement for storing a forwarding table. Furthermore, RIoT is also capable of handling mobility-based IoT use cases. To facilitate communication among nodes connected to different gateways in the same network, here we also present an inter-gateway communication mechanism. We implemented RIoT in the Contiki operating system, and it is extensively evaluated using emulation and real testbed-based experiments. We analyzed the impact of the number of gateways, radio duty cycling (RDC) and mobility on the routing protocols’ performance. Our results demonstrate that either with or without RDC RIoT demonstrates statistically significantly better packet delivery ratio, per-packet end-to-end delay and control overhead compared to the RPL-based protocol. RIoT’s multi-gateway communication architecture substantially reduces the memory requirement to store a forwarding table. Our results also demonstrate that multiple gateways in a network reduce the network partitioning problem in mobile scenarios. Hence, RIoT also demonstrates better performance in mobile scenarios compared to the RPL-based protocol.


Sign in / Sign up

Export Citation Format

Share Document