Have a personal or library account? Click to login

Implementing and evaluating a new Silent Rank Attack in RPL-Contiki based IoT networks

Open Access
|Dec 2023

References

  1. M. Majid et al., “Applications of wireless sensor networks and internet of things frameworks in the industry revolution 4.0: A systematic literature review,” Sensors, vol. 22, no. 6, p. 2087, 2022. doi:10.3390/s22062087.
  2. S. M. Tahsien, H. Karimipour, and P. Spachos, “Machine learning based solutions for security of Internet of Things (IoT): A survey,” Journal of Network and Computer Applications, vol. 161, p. 102630, Jul. 2020, doi: https://doi.org/10.1016/j.jnca.2020.102630.
  3. M. Saleh et al., “Deep reinforcement learning based transmission policy enforcement and multi-hop routing in QoS aware LoRa IoT networks,” Computer Communications, vol. 183, pp. 33-50, Feb. 2022, doi: https://doi.org/10.1016/j.comcom.2021.11.010.
  4. A. Raghuvanshi, U. Kumar Singh, M. Shuaib, and S. Alam, “An investigation of various applications and related security challenges of Internet of things,” Materials Today: Proceedings, Mar. 2021, doi: https://doi.org/10.1016/j.matpr.2021.01.821.
  5. M. N. Khan, A. Rao, and S. Camtepe, “Lightweight Cryptographic Protocols for IoT Constrained Devices: A Survey,” IEEE Internet of Things Journal, pp. 4132-4156, 2020, doi: https://doi.org/10.1109/jiot.2020.3026493.
  6. V. Adat and B. B. Gupta, “Security in Internet of Things: issues, challenges, taxonomy, and architecture,” Telecommunication Systems, vol. 67, no. 3, pp. 423-441, Jun. 2017, doi: https://doi.org/10.1007/s11235-017-0345-9.
  7. J. Neeli and S. Patil, “Insight to Security Paradigm, Research Trend & Statistics in Internet of Things(IoT),” Global Transitions Proceedings, Jan. 2021, doi: https://doi.org/10.1016/j.gltp.2021.01.012.
  8. N. Miloslavskaya and A. Tolstoy, “Internet of Things: information security challenges and solutions,” Cluster Computing, vol. 22, no. 1, pp. 103-119, Jul. 2018, doi: https://doi.org/10.1007/s10586-018-2823-6.
  9. J. Howarth, “80+ Amazing IoT Statistics (2022-2030),” Exploding Topics, Dec. 22, 2021. https://explodingtopics.com/blog/iot-stats
  10. Liebermann. N, “2021 IoT Security Landscape - SAM Seamless Network,” Apr. 07, 2022. https://securingsam.com/2021-iot-security-landscape
  11. T. Winter, “RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks,” tools.ietf.org. https://tools.ietf.org/html/rfc6550
  12. Gupta, M., Jain, S., & Patel, R. B, “Security issues in internet of things: principles, challenges, taxonomy. In: Singh, P.K., Singh, Y., Kolekar, M.H., Kar, A.K., Chhabra, J.K., Sen, A. (eds) Recent Innovations in Computing. ICRIC 2020. Lecture Notes in Electrical Engineering, Springer, Singapore 701. https://doi.org/10.1007/978-981-15-8297-4_52, 2021
  13. R. R. Krishna, A. Priyadarshini, A. V. Jha, B. Appasani, A. Srinivasulu, and N. Bizon, “State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions,” Sustainability, vol. 13, no. 16, p. 9463, Jan. 2021, doi: https://doi.org/10.3390/su13169463.
  14. M. A. Boudouaia, A. Ali-Pacha, A. Abouaissa, and P. Lorenz, “Security Against Rank Attack in RPL Protocol,” IEEE Network, vol. 34, no. 4, pp. 133-139, Jul. 2020, doi: https://doi.org/10.1109/mnet.011.1900651.
  15. A. O. Bang and U. P. Rao, “EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things,” Peer-to-Peer Networking and Applications, vol. 15, no. 1, pp. 642-665, Jan. 2022, doi: https://doi.org/10.1007/s12083-021-01275-3.
  16. A. Seyfollahi, M. Moodi, and A. Ghaffari, “MFORPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications,” Computer Standards & Interfaces, vol. 82, p. 103622, Aug. 2022, doi: https://doi.org/10.1016/j.csi.2022.103622.
  17. P. P. Ioulianou, V. G. Vassilakis, and S. F. Shahandashti, “A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks,” Journal of Cyber-security and Privacy, vol. 2, no. 1, pp. 124-152, Mar. 2022, doi: https://doi.org/10.3390/jcp2010009.
  18. A. Agiollo, M. Conti, P. Kaliyar, T.-N. Lin, and L. Pajola, “DETONAR: Detection of Routing Attacks in RPL-Based IoT,” IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1178-1190, Jun. 2021, doi: https://doi.org/10.1109/tnsm.2021.3075496.
  19. Z. A. Almusaylim, N. Jhanjhi, and A. Alhumam, “Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP,” Sensors, vol. 20, no. 21, p. 5997, Oct. 2020, doi: https://doi.org/10.3390/s20215997.
  20. P. S. Nandhini, S. Kuppuswami, and S. Malliga, “Energy efficient thwarting rank attack from RPL based IoT networks: A review,” Materials Today: Proceedings, May 2021, doi: https://doi.org/10.1016/j.matpr.2021.04.167.
  21. A. Mayzaud, R. Badonnel, I, Chrisment, “A taxonomy of attacks in RPL-based internet of things”, International journal of network security, 18 (3), 459-473, 2016, DOI: 10.6633/IJNS.201605
  22. H. Kumar Saini and M. Poriye, “Threats, Detection and Mitigation of Rank Attack: A Survey,” SSRN Electronic Journal, 2021, doi: https://doi.org/10.2139/ssrn.3884409.
  23. A. Le, J. Loo, A. Lasebae, A. Vinel, Y. Chen, and M. Chai, “The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks,” IEEE Sensors Journal, vol. 13, no. 10, pp. 3685-3692, Oct. 2013, doi: https://doi.org/10.1109/jsen.2013.2266399.
  24. M. Rouissat, M. Belkheir, and H. S. A. Belkhira, “A potential flooding version number attack against RPL based IOT networks,” Journal of Electrical Engineering, vol. 73, no. 4, pp. 267-275, Aug. 2022, doi: https://doi.org/10.2478/jee-2022-0035.
  25. M. Rouissat, M. Belkheir, I. S. Alsukayti, and A. Mokaddem, “A Lightweight Mitigation Approach against a New Inundation Attack in RPL-Based IoT Networks,” Applied Sciences, vol. 13, no. 18, p. 10366, Sep. 2023, doi: 10.3390/app131810366.
  26. P. Thubert, (2012, March). Objective function zero for the routing protocol for low-power and lossy networks (RPL). Internet Engineering Task Force. Retrieved July 20, 2022. http://www.ietf.org/rfc/rfc6552.txt
  27. O. Gnawali, P. Levis, (2012 September), The minimum rank with hysteresis objective function. Internet Engineering Task Force. Retrieved July 20, 2022. URL http://www.ietf.org/rfc/rfc6719.txt
  28. D. Airehrour, J. Gutierrez, and S. K. Ray, “Secure routing for internet of things: A survey,” Journal of Network and Computer Applications, vol. 66, pp. 198-213, May 2016, doi: https://doi.org/10.1016/j.jnca.2016.03.006.
  29. M. Amirinasab Nasab, S. Shamshirband, A. Chronopoulos, A. Mosavi, and N. Nabipour, “Energy-Efficient Method for Wireless Sensor Networks Low-Power Radio Operation in Internet of Things,” Electronics, vol. 9, no. 2, p. 320, Feb. 2020, doi: https://doi.org/10.3390/electronics9020320.
  30. S. S. Solapure and H. H. Kenchannavar, “Design and analysis of RPL objective functions using variant routing metrics for IoT applications,” Wireless Networks, vol. 26, no. 6, pp. 4637-4656, May 2020, doi: https://doi.org/10.1007/s11276-020-02348-6.
  31. R. Stephen, L. Arockiam, (2018) “RIAIDRPL: Rank Increased Attacks (RIA) Identification algorithm for avoiding loop in the RPL DODAg”, International Journal of Pure and Applied Mathematics, 119 (16), 1203-1210, 2018.
DOI: https://doi.org/10.2478/jee-2023-0053 | Journal eISSN: 1339-309X | Journal ISSN: 1335-3632
Language: English
Page range: 454 - 462
Submitted on: Oct 23, 2023
Published on: Dec 14, 2023
Published by: Slovak University of Technology in Bratislava
In partnership with: Paradigm Publishing Services
Publication frequency: 6 times per year
Keywords:

© 2023 Mehdi Rouissat, Mohammed Belkheir, Hichem S. A. Belkhira, Allel Mokaddem, Djamila Ziani, published by Slovak University of Technology in Bratislava
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.