Skip to main content
Log in

Simulation-based Analysis of RPL Routing Attacks and Their Impact on IoT Network Performance

  • Published:
Journal of Electronic Testing Aims and scope Submit manuscript

Abstract

The recent expansion of the Internet of Things (IoT) owes a lot to the significant contribution of the 6LoWPAN protocol, which has been extensively employed in low-power and lossy networks. To facilitate communication in 6LoWPAN networks, the Internet Engineering Task Force (IETF) has suggested the usage of the Routing Protocol for Low-Power and Lossy Networks (RPL). Despite its usefulness, the open and restricted nature of the RPL protocol renders it susceptible to both internal and external attacks. Since IoT devices connected through the RPL protocol have limited resources like processing power, battery life, memory, and bandwidth, ensuring their security is of the utmost importance. One of the primary obstacles to IoT networks is RPL routing attacks, which disrupt the network's normal routing activities and structure. This study investigates the impact of five RPL routing attacks, namely Blackhole, Sybil, Selective Forwarding (SF), Sinkhole, DIO suppression, and DIS flooding, on the IoT networks’ performance. The study evaluated the network's performance for normal and five routing attack scenarios using numerous performance metrics including Link throughput, No. of packets generated (control and data), Sensor data throughput, Packet Delivery Ratio (PDR), and Delay in packet delivery. This work conducted simulations using the Tetcos NetSim v12.1 IoT network simulator tool and is the first to analyze IoT network performance under multiple routing assault scenarios with various performance measures. The analysis showed that the performance metrics of PDR, Sensor data throughput, and No. of data packets transmitted decreased significantly in attack scenarios compared to the normal scenario, with an average decreased percentage of 70%, 70%, and 39.4%, respectively. In contrast, the metrics Link throughput, Delay, and No. of control packets transmitted increased in attack scenarios compared to the normal scenario, with average values supplemented by a factor of 35, 255, and 36, respectively. Additionally, the Destination-Oriented Directed Acyclic Graph (DODAG) real-time formation under different scenarios was provided.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data Availability

Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Ali H, Duquennoy S, Boldt M (2015) A Performance evaluation of RPL in Contiki. CLOSER 2015 - In: Proceedings of 5th International Conference on Cloud Computing and Services Science, Proceedings. pp 233–240

  2. Ambarkar SS, Shekokar N (2021) Impact Analysis of RPL Attacks on 6Lo WPAN based Internet of Things network. In: Proceeding 2021 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT) 1–5. IEEE. https://doi.org/10.1109/CONECCT52877.2021.9622711

  3. Arış A, Oktuğ SF (2020) Analysis of the RPL version number attack with multiple attackers. In: Proceeding 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE. https://doi.org/10.1109/CyberSA49311.2020.9139695

  4. Barthel D, Vasseur JP, Pister K, Kim M, Dejean N (2012) Routing metrics used for path calculation in low-power and lossy networks. https://doi.org/10.17487/RFC6551

  5. Bokka R, Sadasivam T (2021) DIS flooding attack Impact on the Performance of RPL Based Internet of Things Networks: Analysis. In: Proceeding 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC) 1017–1022 . IEEE. https://doi.org/10.1109/ICESC51422.2021.9532901

  6. Ching TW, Aman AHM, Azamuddin WMH, Sallehuddin H, Attarbashi ZS (2020) Performance analysis of internet of things routing protocol for low power and lossy networks (RPL): energy, overhead and packet delivery. In: Proceeding 2021 3rd International Cyber Resilience Conference (CRC) 1–6. IEEE. https://doi.org/10.1109/CRC50527.2021.9392475

  7. Dhamodharan USRK, Vayanaperumal R (2015) Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. Sci World J 2015:841267. https://doi.org/10.1155/2015/841267

    Article  Google Scholar 

  8. Gaddour O, Koubaa A (2012) RPL in a nutshell: A survey. Comput Netw 56(14):3163–3178. https://doi.org/10.1016/j.comnet.2012.06.016

    Article  Google Scholar 

  9. Helmer G, Wong JS, Honavar V, Miller L, Wang Y (2003) Lightweight agents for intrusion detection. J Syst Softw 67(2):109–122. https://doi.org/10.1016/S0164-1212(02)00092-4

    Article  Google Scholar 

  10. Hkiri A, Karmani M, Machhout M (2022) The routing protocol for low power and lossy networks (RPL) under attack: simulation and analysis. In: 2022 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET) ,143–148. IEEE. https://doi.org/10.1109/IC_ASET53395.2022.9765901

  11. Le A, Loo J, Luo Y, Lasebae A (2013) July The impacts of internal threats towards routing protocol for low power and lossy network performance. In: 2013 IEEE symposium on computers and communications (ISCC) ,000789-000794. IEEE. https://doi.org/10.1109/ISCC.2013.6755045

  12. Luangoudom S, Tran D, Nguyen T, Tran HA, Nguyen G, Ha QT (2020) svBLOCK: Mitigating black hole attack in low-power and lossy networks. Int J Sens Netw 32(2):77–86. https://doi.org/10.1504/IJSNET.2020.104923

    Article  Google Scholar 

  13. Mainetti L, Patrono L, Vilei A (2011) Evolution of wireless sensor networks towards the internet of things: A survey. In: SoftCOM 2011, 19th International Conference on Software, Telecommunications and Computer Networks , 1–6. IEEE

  14. Network Simulator, NetSim, Emulator, 5G, Military Communication, Vehicular networks. Accessed 7 Jan 2022. https://www.tetcos.com/

  15. Patel BH, Shah P (2020) RPL routing protocol performance under sinkhole and selective forwarding attack: experimental and simulated evaluation. TELKOMNIKA (Telecommunication Computing Electronics and Control) 18(4):1849–1856. https://doi.org/10.12928/telkomnika.v18i4.15768

    Article  Google Scholar 

  16. Perazzo P, Vallati C, Anastasi G, Dini G (2017) DIO suppression attack against routing in the Internet of Things. IEEE Commun Lett 21(11):524–2527. https://doi.org/10.1109/LCOMM.2017.2738629

    Article  Google Scholar 

  17. Raoof A, Matrawy A, Lung CH (2018) Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Commun Surv Tutor 21(2):1582–1606. https://doi.org/10.1109/COMST.2018.2885894

    Article  Google Scholar 

  18. Raoof A, Matrawy A, Lung CH (2020) Enhancing routing security in IoT: Performance evaluation of RPL’s secure mode under attacks. IEEE Internet Things J 7(12):11536–11546. https://doi.org/10.1109/JIOT.2020.3022276

    Article  Google Scholar 

  19. Raza S, Wallgren L, Voigt T (2023) SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Netw 11(8):2661–2674. https://doi.org/10.1016/j.adhoc.2013.04.014

    Article  Google Scholar 

  20. Sethi P, Sarangi SR (2017) Internet of things: architectures, protocols, and applications. J Electr Comput Eng. https://doi.org/10.1155/2017/9324035

    Article  Google Scholar 

  21. Sharma G, Grover J, Verma A (2023) Performance evaluation of mobile RPL-based IoT networks under version number attack. Comput Commun 197:12–22. https://doi.org/10.1016/j.comcom.2022.10.014

    Article  Google Scholar 

  22. Singh G, Cheema AK, Kapoor N (2017) Performance evaluation of routing protocol in Internet of Things using Netsim. Int J Adv Comput Res 8(3). http://ijarcs.info/index.php/Ijarcs/article/view/3114

  23. Stephen R, Arockiam L (2007) Intrusion detection system to detect sinkhole attack on RPL protocol in Internet of Things. International Journal of Electrical Electronics and Computer Science 4(4):16–20

    Google Scholar 

  24. Tonapa YT, Wahidah I, Karna NBA (2020) Performance Testing Of Routing Protocol For Low Power And Lossy Networks (rpl) Against Attack Using Cooja Simulator. eProceedings of Engineering 7(2):4093–4101

    Google Scholar 

  25. Verma A, Ranga V (2018) Analysis of routing attacks on RPL based 6LoWPAN networks. Int J Grid Distrib Comput 11(8):43–56. https://doi.org/10.14257/ijgdc.2018.11.8.05

    Article  Google Scholar 

Download references

Acknowledgements

We thank the anonymous referees for their useful suggestions.

Funding

This work has no funding resource.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by *1Raveendranadh Bokka, 2Tamilselvan SadasivamThe first draft of the manuscript was written by *1Raveendranadh Bokkaand all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Raveendranadh Bokka.

Ethics declarations

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Consent of Publication

Not applicable.

Conflict of Interest

The authors declare that they have no conflict of interest.

Competing interests

The authors declare that they have no competing interests.

Additional information

Responsible Editor: C. A. Papachristou

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bokka, R., Sadasivam, T. Simulation-based Analysis of RPL Routing Attacks and Their Impact on IoT Network Performance. J Electron Test (2024). https://doi.org/10.1007/s10836-024-06106-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10836-024-06106-w

Keywords

Navigation