scholarly journals Detection and Mitigation of RPL Rank and Version Number Attacks in Smart Internet of Things

Author(s):  
Zahrah A. Almusaylim ◽  
Abdulaziz Alhumam ◽  
Wathiq Mansoor ◽  
Pushpita Chatterjee ◽  
Noor Zaman Jhanjhi

The rapid growth of the smart Internet of Things (IoT) and massive propagation of wireless technologies revealed the recent opportunities for development in various domains of real life such as smart cities and E-Health applications. A slight defense against different forms of attacks is offered for the current secure and lightweight Routing Protocol for Low Power and Lossy Networks (RPL) of IoT resource-constrained devices. Data packets are highly likely to be exposed while transmitting them during data packets routing. The RPL rank and version number attacks, which are two forms of RPL attacks, can have critical consequences for RPL networks. The studies conducted on these attacks have several security defects and performance shortcomings. The research proposes a Secure RPL Routing Protocol (SRPL-RP) for rank and version number attacks. It mainly detects, mitigates and isolates attacks in the RPL networks. The detection is based on a comparison of ranks strategy. The mitigation uses threshold and attacks status tables, and the isolation adds them to a blacklist table and alerts relevant nodes to skip them. SRPL-RP supports diverse types of network topologies and is comprehensively analyzed with multiple studies such as Standard RPL with Attacks, SBIDS and RPL+ Shield. The analysis results showed that the SRPL-RP achieves great improvements with Packet Delivery Ratio (PDR) of 98.48%, control message value of 991 packets/second, and average energy consumption of 1231.75 joules. It provides a better accuracy rate with 98.17% under the attacks.

Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 5997
Author(s):  
Zahrah A. Almusaylim ◽  
NZ Jhanjhi ◽  
Abdulaziz Alhumam

The rapid growth of the Internet of Things (IoT) and the massive propagation of wireless technologies has revealed recent opportunities for development in various domains of real life, such as smart cities and E-Health applications. A slight defense against different forms of attack is offered for the current secure and lightweight Routing Protocol for Low Power and Lossy Networks (RPL) of IoT resource-constrained devices. Data packets are highly likely to be exposed in transmission during data packet routing. The RPL rank and version number attacks, which are two forms of RPL attacks, can have critical consequences for RPL networks. The studies conducted on these attacks have several security defects and performance shortcomings. In this research, we propose a Secure RPL Routing Protocol (SRPL-RP) for rank and version number attacks. This mainly detects, mitigates, and isolates attacks in RPL networks. The detection is based on a comparison of the rank strategy. The mitigation uses threshold and attack status tables, and the isolation adds them to a blacklist table and alerts nodes to skip them. SRPL-RP supports diverse types of network topologies and is comprehensively analyzed with multiple studies, such as Standard RPL with Attacks, Sink-Based Intrusion Detection Systems (SBIDS), and RPL+Shield. The analysis results showed that the SRPL-RP achieved significant improvements with a Packet Delivery Ratio (PDR) of 98.48%, a control message value of 991 packets/s, and an average energy consumption of 1231.75 joules. SRPL-RP provided a better accuracy rate of 98.30% under the attacks.


2020 ◽  
Vol 26 (11) ◽  
pp. 1366-1381
Author(s):  
Sathishkumar Natesan ◽  
Rajakumar Krishnan

The Routing Protocol for Low Power and Lossy Networks (RPL) is operated by gadgets comprised of many devices of embedded type with limited energy, memory as well as resources that do their process. The improvements in the life of the network and energy conservation are the key challenging features in Low Power and Lossy Networks (LLN). Obviously, the LLN has a key strategic part in routing. The Internet of Things (IoT) device is expected to make the apt choice. In LLN, the poor routing choice leads to traffic congestion, reduction in power as well as packet loss ratio. The task in the proposal analyzes Delay (D), Load (L) and Battery Discharge Index (BDI) pivoted Energy Efficient Composite Metric Routing (EECMR) protocol for LLN. The performance of the work in the proposal is evaluated by the COOJA simulator. It outperforms with respect to Network Lifetime (NL), Delay as well as Packet Delivery Ratio (PDR) contrasted to the routing metrics like Traffic Load (TL), Link Quality (LQ), Residual Energy (RE), RE-Battery Discharge Index (RE-BDI) and Hop Count (HC).


2019 ◽  
Vol 8 (S3) ◽  
pp. 100-104
Author(s):  
Vikram Neerugatti ◽  
A. Rama Mohan Reddy

Internet of Things (IoT) is the advanced technology, were the constrained nodes/things (all the objects around us such as chair, home, car, keys, etc.) will be connected to the internet to form a network, for sharing and monitoring the data, remotely. RPL (IPv6 Routing Protocol for Low Power and Lossy networks) is a routing protocol particularly designed for the constrained (low powered, low computation, less size, etc.) networks with the protocol 6LoWPAN (IPv6 Low Powered wireless Personal Area Networks). Due to the constrained behaviour of the RPL protocol, it will leads to many RPL routing attacks such as Sinkhole, Black hole, Wormhole, Selective forwarding, rank attacks, etc. This paper was focused on the Wormhole attack. The Wormhole attack will select the packets from one location and drops those packets in some other location (malicious) by forming the Tunnelling. To detect this attack here proposed and implemented a novel approach called (ADWA). Acknowledgement based technique for detection of the wormhole attack in RPL based Internet of Things networks. This approach was shown efficient results with the Telosb sky emulator nodes in the Contiki Cooja simulator, in terms of the Packet delivery ratio, delay and detection of wormhole attack.


Author(s):  
Baranidharan V. ◽  
Sivaradje G. ◽  
Kiruthiga Varadharajan ◽  
Vignesh S.

The most adverse characteristics of underwater wireless sensor network (UWSN) communications are high propagation delay, high error rate, very low bandwidth, and limited available energy. The energy resources replacement is also more expensive. The proposed clustering-based geographic- opportunistic routing with adjustment of depth-based topology control for communication recovery of void regions (C- GEDAR). The cluster-based GEDAR routes the packet to the surface of sonobuoys with the help of clusters. The void sensor node recovery algorithm is used to recover the void nodes to calculate their new depth. The proposed routing protocol is to be simulated and its performances are evaluated by using an Aquasim simulator. The simulated result shows that C-GEDAR performs better average energy consumption, good packet delivery ratio (PDR) and less end-to-end delay.


2017 ◽  
Vol 13 (2) ◽  
pp. 87 ◽  
Author(s):  
Jose V. V. Sobral ◽  
Joel J. P. C. Rodrigues ◽  
Neeraj Kumar ◽  
Chunsheng Zhu ◽  
Raja W. Ahmad

LOADng (Lightweight On-demand Ad hoc Distance-vector Routing Protocol - Next Generation) is an emerging routing protocol that emerged as an alternative to RPL (IPv6 Routing Protocol for Low power and Lossy Networks). Although some work has been dedicated to study LOADng, these works do not analyze the performance of this protocol with different routing metrics. A routing metric is responsible for defining values for paths during the route creation process. Moreover, based on these metrics information a routing protocol will select the path to forward a message. Thus, this work aims to realize a performance assessment study considering different routing metrics applied to LOADng. The scenarios under study consider different traffic patterns and network sizes. The routing metrics are evaluated considering the packet delivery ratio, average energy spent per bit delivered, average latency, and number of hops. The results reveals that routing metrics used by this protocol may influence (directly) the network performance.


Sensors ◽  
2019 ◽  
Vol 19 (24) ◽  
pp. 5486 ◽  
Author(s):  
Sankar Sennan ◽  
Sathiyabhama Balasubramaniyam ◽  
Ashish Kr. Luhach ◽  
Somula Ramasubbareddy ◽  
Naveen Chilamkurti ◽  
...  

Energy conservation is one of the most critical problems in Internet of Things (IoT). It can be achieved in several ways, one of which is to select the optimal route for data transfer. IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is a standardized routing protocol for IoT. The RPL changes its path frequently while transmitting the data from source to the destination, due to high data traffic in dense networks. Hence, it creates data traffic across the nodes in the networks. To solve this issue, we propose Energy and Delay Aware Data aggregation in Routing Protocol (EDADA-RPL) for IoT. It has two processes, namely parent selection and data aggregation. The process of parent selection uses routing metric residual energy (RER) to choose the best possible parent for data transmission. The data aggregation process uses the compressed sensing (CS) theory in the parent node to combine data packets from the child nodes. Finally, the aggregated data transmits from a downward parent to the sink. The sink node collects all the aggregated data and it performs the reconstruction operation to get the original data of the participant node. The simulation is carried out using the Contiki COOJA simulator. EDADA-RPL’s performance is compared to RPL and LA-RPL. The EDADA-RPL offers good performance in terms of network lifetime, delay, and packet delivery ratio.


2012 ◽  
Vol 2 (3) ◽  
pp. 11-17 ◽  
Author(s):  
Shiva Shankar ◽  
Dr.B. Sivakumar ◽  
Dr.G. Varaprasad

In this paper, we present an extensive ns-2.33 simulation basedperformance comparison of four widely known stability-orientedon-demand Mobile Adhoc Network (MANET) routingprotocols. Our simulations show that modified Power DSR(PDSR) routes are more stable than existing DSR routes, whichare more stable than DSDV and AODV routes. This also resultsin an increased packet delivery ratio for PDSR in comparison tothat of DSR and DSDV. On the other hand, based on the energyconsumed per packet and the average energy used per node,DSR is better than DSDV, which is better than PDSR. At lownetwork density and mobility, PDSR routes incur the lowestdelay and as the network density and node mobility increases,DSR incurs lower delay. Thus, we see a stability-delay-energyconsumption tradeoff among these three stability-orientedrouting protocols. Regarding the fairness of node usage, weobserve that routes get distributed more evenly with increase inthe node mobility and network density. But, still there is anappreciable variation in the energy consumption per node asonly the chain of nodes that form stable routes are exhausted to agreater extent. A routing protocol that incurs fewer transitionswill lose fewer data packets, create less routing overhead andalso maintain in-order data delivery. At the same time, bystaying with a long-lived route, the routing protocol may incur alonger end-to-end delay. We intend to explore this tradeoffbetween stability and delay and try to come with up a metric thatwould quantify the efficiency of a MANET routing protocolwith respect to both stability and delay. On these lines, weintroduce the idea of Stability-Delay Tradeoff (SDT) as ameasure of the efficiency of a MANET routing protocols.


Author(s):  
M Prasad ◽  
◽  
D Reddy ◽  

In Internet of Things (IoT), secure communication is a prime concern since the open internet source and vast heterogeneity offers several challenges to the network. To achieve an enhanced security, an effective trust evaluation model is required through which the abnormal nodes can be detected and isolated. Towards this objective we have proposed a Light Weight Trust Sensing (LWTS) mechanism for IoT routing. Several factors like Packet Forwarding Factor, Packet Consistency Factor and Packet Repetition Factor are employed to analyze the behaviour of IoT nodes. Along with these factors, the proposed model also checks for energy efficiency to achieve an improved network lifetime. Trust Calculation process is accomplished in two phases; they are direct and indirect fashion. Finally based on obtained total trust, each neighbour node are categorized as No Trust, Average Trust, Fair Trust and Good Trust and the node with good trust is selected as next-hop forwarding node. For the proposed approach extensive simulations are carried out and the performance is measured through Packet Delivery Ratio, Malicious Detection Rate and Average Energy Consumption. The obtained results prove the effectiveness when compared to existing approaches.


2019 ◽  
Vol 8 (3) ◽  
pp. 6013-6018

MANETs are a trending topic in the wireless communication network. MANETs are formed automatically by an autonomous system of mobile nodes that are connected via wireless links. Cluster-head gateway switch routing protocol (CGSR) is a proactive protocol which is also called table-driven protocol. It consists of routing table information before setting up a connection. Ad-hoc on-demand distance vector protocol (AODV) is a reactive protocol, it sets path only when demanded by the network. CGSR protocol forms a group of nodes into clusters and selects a node as cluster-head based on some clustering algorithms for each cluster. In this paper, we have proposed a protocol, which combines the advantages of both CGSR and AODV to minimize traffic congestion in an ad-hoc wireless network. The performance metrics such as routing overhead, end-end delay, packet delivery ratio, throughput, and average energy consumption are enhanced and compared with other clustering protocols such as CGSR and LEACH protocols. The comparison result reveals that the routing overhead, end-end delay, and the average energy consumption is reduced and packet delivery ratio, throughput is improved.


2018 ◽  
Vol 18 (3) ◽  
pp. 75-92 ◽  
Author(s):  
S. Sankar ◽  
P. Srinivasan

Abstract We propose a multi-layer cluster based energy aware routing protocol for Low Power and Lossy Networks, which divides the network area into equal length rings. The intra-ring clustering process divides a ring into equal sized clusters and inter-cluster routing applies the fuzzy logic to select the best route for data transfer. It increases the network lifetime and packet delivery ratio by 18-22% and 5-8%, respectively.


Sign in / Sign up

Export Citation Format

Share Document