Abstract
The recent expansion of the Internet of Things (IoT) owes a lot to the significant contribution of the 6LoWPAN protocol, which has been extensively employed in low-power and lossy networks. To facilitate communication in 6LoWPAN networks, the Internet Engineering Task Force (IETF) has suggested the usage of the Routing Protocol for Low-Power and Lossy Networks (RPL). Despite its usefulness, the open and restricted nature of the RPL protocol renders it susceptible to both internal and external attacks. Since IoT devices connected through the RPL protocol have limited resources like processing power, battery life, memory, and bandwidth, ensuring their security is of the utmost importance. One of the primary obstacles to IoT networks is RPL routing attacks, which disrupt the network's normal routing activities and structure. This study investigates the impact of five RPL routing attacks, namely Blackhole, Sybil, Selective Forwarding (SF), Sinkhole, DIO suppression, and DIS flooding, on the IoT networks’ performance. The study evaluated the network's performance for normal and five routing attack scenarios using numerous performance metrics including Link throughput, No. of packets generated (control and data), Sensor data throughput, Packet Delivery Ratio (PDR), and Delay in packet delivery. This work conducted simulations using the Tetcos NetSim v12.1 IoT network simulator tool and is the first to analyze IoT network performance under multiple routing assault scenarios with various performance measures. The analysis showed that the performance metrics of PDR, Sensor data throughput, and No. of data packets transmitted decreased significantly in attack scenarios compared to the normal scenario, with an average decreased percentage of 70%, 70%, and 39.4%, respectively. In contrast, the metrics Link throughput, Delay, and No. of control packets transmitted increased in attack scenarios compared to the normal scenario, with average values supplemented by a factor of 35, 255, and 36, respectively. Additionally, the Destination-Oriented Directed Acyclic Graph (DODAG) real-time formation under different scenarios was provided.
Similar content being viewed by others
Data Availability
Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.
References
Ali H, Duquennoy S, Boldt M (2015) A Performance evaluation of RPL in Contiki. CLOSER 2015 - In: Proceedings of 5th International Conference on Cloud Computing and Services Science, Proceedings. pp 233–240
Ambarkar SS, Shekokar N (2021) Impact Analysis of RPL Attacks on 6Lo WPAN based Internet of Things network. In: Proceeding 2021 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT) 1–5. IEEE. https://doi.org/10.1109/CONECCT52877.2021.9622711
Arış A, Oktuğ SF (2020) Analysis of the RPL version number attack with multiple attackers. In: Proceeding 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE. https://doi.org/10.1109/CyberSA49311.2020.9139695
Barthel D, Vasseur JP, Pister K, Kim M, Dejean N (2012) Routing metrics used for path calculation in low-power and lossy networks. https://doi.org/10.17487/RFC6551
Bokka R, Sadasivam T (2021) DIS flooding attack Impact on the Performance of RPL Based Internet of Things Networks: Analysis. In: Proceeding 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC) 1017–1022 . IEEE. https://doi.org/10.1109/ICESC51422.2021.9532901
Ching TW, Aman AHM, Azamuddin WMH, Sallehuddin H, Attarbashi ZS (2020) Performance analysis of internet of things routing protocol for low power and lossy networks (RPL): energy, overhead and packet delivery. In: Proceeding 2021 3rd International Cyber Resilience Conference (CRC) 1–6. IEEE. https://doi.org/10.1109/CRC50527.2021.9392475
Dhamodharan USRK, Vayanaperumal R (2015) Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. Sci World J 2015:841267. https://doi.org/10.1155/2015/841267
Gaddour O, Koubaa A (2012) RPL in a nutshell: A survey. Comput Netw 56(14):3163–3178. https://doi.org/10.1016/j.comnet.2012.06.016
Helmer G, Wong JS, Honavar V, Miller L, Wang Y (2003) Lightweight agents for intrusion detection. J Syst Softw 67(2):109–122. https://doi.org/10.1016/S0164-1212(02)00092-4
Hkiri A, Karmani M, Machhout M (2022) The routing protocol for low power and lossy networks (RPL) under attack: simulation and analysis. In: 2022 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET) ,143–148. IEEE. https://doi.org/10.1109/IC_ASET53395.2022.9765901
Le A, Loo J, Luo Y, Lasebae A (2013) July The impacts of internal threats towards routing protocol for low power and lossy network performance. In: 2013 IEEE symposium on computers and communications (ISCC) ,000789-000794. IEEE. https://doi.org/10.1109/ISCC.2013.6755045
Luangoudom S, Tran D, Nguyen T, Tran HA, Nguyen G, Ha QT (2020) svBLOCK: Mitigating black hole attack in low-power and lossy networks. Int J Sens Netw 32(2):77–86. https://doi.org/10.1504/IJSNET.2020.104923
Mainetti L, Patrono L, Vilei A (2011) Evolution of wireless sensor networks towards the internet of things: A survey. In: SoftCOM 2011, 19th International Conference on Software, Telecommunications and Computer Networks , 1–6. IEEE
Network Simulator, NetSim, Emulator, 5G, Military Communication, Vehicular networks. Accessed 7 Jan 2022. https://www.tetcos.com/
Patel BH, Shah P (2020) RPL routing protocol performance under sinkhole and selective forwarding attack: experimental and simulated evaluation. TELKOMNIKA (Telecommunication Computing Electronics and Control) 18(4):1849–1856. https://doi.org/10.12928/telkomnika.v18i4.15768
Perazzo P, Vallati C, Anastasi G, Dini G (2017) DIO suppression attack against routing in the Internet of Things. IEEE Commun Lett 21(11):524–2527. https://doi.org/10.1109/LCOMM.2017.2738629
Raoof A, Matrawy A, Lung CH (2018) Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Commun Surv Tutor 21(2):1582–1606. https://doi.org/10.1109/COMST.2018.2885894
Raoof A, Matrawy A, Lung CH (2020) Enhancing routing security in IoT: Performance evaluation of RPL’s secure mode under attacks. IEEE Internet Things J 7(12):11536–11546. https://doi.org/10.1109/JIOT.2020.3022276
Raza S, Wallgren L, Voigt T (2023) SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Netw 11(8):2661–2674. https://doi.org/10.1016/j.adhoc.2013.04.014
Sethi P, Sarangi SR (2017) Internet of things: architectures, protocols, and applications. J Electr Comput Eng. https://doi.org/10.1155/2017/9324035
Sharma G, Grover J, Verma A (2023) Performance evaluation of mobile RPL-based IoT networks under version number attack. Comput Commun 197:12–22. https://doi.org/10.1016/j.comcom.2022.10.014
Singh G, Cheema AK, Kapoor N (2017) Performance evaluation of routing protocol in Internet of Things using Netsim. Int J Adv Comput Res 8(3). http://ijarcs.info/index.php/Ijarcs/article/view/3114
Stephen R, Arockiam L (2007) Intrusion detection system to detect sinkhole attack on RPL protocol in Internet of Things. International Journal of Electrical Electronics and Computer Science 4(4):16–20
Tonapa YT, Wahidah I, Karna NBA (2020) Performance Testing Of Routing Protocol For Low Power And Lossy Networks (rpl) Against Attack Using Cooja Simulator. eProceedings of Engineering 7(2):4093–4101
Verma A, Ranga V (2018) Analysis of routing attacks on RPL based 6LoWPAN networks. Int J Grid Distrib Comput 11(8):43–56. https://doi.org/10.14257/ijgdc.2018.11.8.05
Acknowledgements
We thank the anonymous referees for their useful suggestions.
Funding
This work has no funding resource.
Author information
Authors and Affiliations
Contributions
All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by *1Raveendranadh Bokka, 2Tamilselvan SadasivamThe first draft of the manuscript was written by *1Raveendranadh Bokkaand all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Ethical Approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Consent of Publication
Not applicable.
Conflict of Interest
The authors declare that they have no conflict of interest.
Competing interests
The authors declare that they have no competing interests.
Additional information
Responsible Editor: C. A. Papachristou
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Bokka, R., Sadasivam, T. Simulation-based Analysis of RPL Routing Attacks and Their Impact on IoT Network Performance. J Electron Test (2024). https://doi.org/10.1007/s10836-024-06106-w
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10836-024-06106-w