Abstract
IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is the standard network layer protocol for achieving efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Resource-constrained and non-tamper resistant nature of smart sensor nodes makes RPL protocol susceptible to different threats. An attacker may use insider or outsider attack strategy to perform Denial-of-Service (DoS) attacks against RPL based networks. Security and Privacy risks associated with RPL protocol may limit its global adoption and worldwide acceptance. A proper investigation of RPL specific attacks and their impacts on an underlying network needs to be done. In this paper, we present and investigate one of the catastrophic attacks named as a copycat attack, a type of replay based DoS attack against the RPL protocol. An in-depth experimental study for analyzing the impacts of the copycat attack on RPL has been done. The experimental results show that the copycat attack can significantly degrade network performance in terms of packet delivery ratio, average end-to-end delay, and average power consumption. To the best of our knowledge, this is the first paper that extensively studies the impact of RPL specific replay mechanism based DoS attack on 6LoWPAN networks.
Similar content being viewed by others
References
Verma A, Ranga V (2020) Security of RPL based 6LoWPAN networks in the internet of things: a review. IEEE Sens J 20(11):5666–5690. https://doi.org/10.1109/JSEN.2020.2973677
Ashton K (2009) That ‘internet of things’ thing. RFID J 22(7):97–114
Xu LD, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Ind Inf 10(4):2233–2243. https://doi.org/10.1109/TII.2014.2300753
Miloslavskaya N, Tolstoy A (2019) Internet of things: information security challenges and solutions. Clust Comput 22(1):103–119
GlobalData (2018) IoT market forecast and growth opportunities. https://www.globaldata.com/store/report/gdtc0168ir--iot-market-forecast-and-growth-opportunities/. Accessed 25 Mar 2020
Raoof A, Matrawy A, Lung C (2019) Routing attacks and mitigation methods for RPL-based internet of things. IEEE Commun Surv Tutor 21(2):1582–1606
Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: a survey. J Netw Comput Appl 88:10–28
Airehrour D, Gutierrez J, Ray SK (2016) Secure routing for internet of things: a survey. J Netw Comput Appl 66:198–213
Ziegeldorf JH, Morchon OG, Wehrle K (2014) Privacy in the internet of things: threats and challenges. Secur Commun Netw 7(12):2728–2742
Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet Things J 4(5):1250–1258. https://doi.org/10.1109/JIOT.2017.2694844
Qadri YA, Ali R, Musaddiq A, Al-Turjman F, Kim DW, Kim SW (2020) The limitations in the state-of-the-art counter-measures against the security threats in H-IoT. Clust Comput 23:2047–2065
Ou Q, Zhen Y, Li X, Zhang Y, Zeng L (2012) Application of internet of things in smart grid power transmission. In: 2012 third FTRA international conference on mobile, ubiquitous, and intelligent computing, pp 96–100
Čolaković A, Hadžialić M (2018) Internet of things (IoT): a review of enabling technologies, challenges, and open research issues. Comput Netw 144:17–39
Winter T, Thubert P, Brandt A, Hui J, Kelsey R, Levis P, Pister K, Struik R, Vasseur JP, Alexander R (2012) RPL: IPv6 routing protocol for low-power and lossy networks. Tech. rep
Musaddiq A, Zikria YB, Hahm O, Yu H, Bashir AK, Kim SW (2018) A survey on resource management in IoT operating systems. IEEE Access 6:8459–8482
Tripathi J (2014) On design, evaluation and enhancement of IP-based routing solutions for low power and lossy networks. PhD thesis, Drexel University
Sfar AR, Natalizio E, Challal Y, Chtourou Z (2018) A roadmap for security challenges in the internet of things. Digit Commun Netw 4(2):118–137
Verma A, Ranga V (2019) Evaluation of network intrusion detection systems for RPL based 6LoWPAN networks in IoT. Wirel Pers Commun 108(3):1571–1594
Shafique U, Khan A, Rehman A, Bashir F, Alam M (2018) Detection of rank attack in routing protocol for low power and Lossy networks. Ann Telecommun 73(7–8):429–438
Sahay R, Geethakumari G, Mitra B (2020) A novel blockchain based framework to secure iot-llns against routing attacks. Computing
Kannhavong B, Nakayama H, Nemoto Y, Kato N, Jamalipour A (2007) A survey of routing attacks in mobile ad hoc networks. IEEE Wirel Commun 14(5):85–91
Du X, Chen H (2008) Security in wireless sensor networks. IEEE Wirel Commun 15(4):60–66
Le A, Loo J, Luo Y, Lasebae A (2013) The impacts of internal threats towards routing protocol for low power and lossy network performance. In: 2013 IEEE symposium on computers and communications (ISCC), pp 789–794
Mayzaud A, Badonnel R, Chrisment I, Est Grand, Nancy I (2016) A taxonomy of attacks in RPL-based internet of things. Int J Netw Secur 18(3):459–473
Kushalnagar N, Montenegro G, Schumacher C (2007) IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals. Tech. rep
Olsson J (2014) 6lowpan demystified. Texas Instruments 13
Hussain MI (2017) Internet of things: challenges and research opportunities. CSI Trans ICT 5(1):87–95
Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutor 17(3):1294–1312
Palattella MR, Accettura N, Vilajosana X, Watteyne T, Grieco LA, Boggia G, Dohler M (2013) Standardized protocol stack for the internet of (important) things. IEEE Commun Surv Tutor 15(3):1389–1406
Tomić I, McCann JA (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet Things J 4(6):1910–1923
Oliveira A, Vazão T (2016) Low-power and lossy networks under mobility: a survey. Comput Netw 107:339–352
Iova O, Picco P, Istomin T, Kiraly C (2016) RPL: the routing standard for the internet of things... or is it? IEEE Commun Mag 54(12):16–22
Gnawali O, Levis P (2010) The ETX objective function for RPL, -draft-gnawali-roll-etxof-01
Gnawali O, Levis P (2012) The minimum rank with hysteresis objective function. Tech. rep
Thubert P (2012) Objective function zero for the routing protocol for low-power and lossy networks (RPL). Tech. rep
Gaddour O, Koubâa A (2012) RPL in a nutshell: a survey. Comput Netw 56(14):3163–3178
Levis P, Clausen T, Hui J, Gnawali O, Ko J (2011) The trickle algorithm. Tech. rep
Vasseur J, Agarwal N, Hui J, Shelby Z, Bertrand P, Chauvenet C (2011) RPL: the IP routing protocol designed for low power and lossy networks. Internet Protocol Smart Objects (IPSO) Alliance 36:1–20
Perrey H, Landsmann M, Ugus O, Wählisch M, Schmidt TC (2016) TRAIL: topology authentication in RPL. In: Proceedings of the 2016 international conference on embedded wireless systems and networks. Junction Publishing, USA, EWSN ’16, pp 59–64
Le A, Loo J, Chai KK, Aiash M (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information (Switzerland) 7(2):25
Le A, Loo J, Lasebae A, Vinel A, Chen Y, Chai M (2013) The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sens J 13(10):3685–3692
Tsao T, Alexander R, Dohler M, Daza V, Lozano A, Richardson M (2015) A security threat analysis for the routing protocol for low-power and lossy networks (RPLs) . Tech. rep
Perazzo P, Vallati C, Anastasi G, Dini G (2017) Dio suppression attack against routing in the internet of things. IEEE Commun Lett 21(11):2524–2527
Verma A, Ranga V (2019) Addressing flooding attacks in IPv6-based low power and lossy networks. In: TENCON 2019-2019 IEEE region 10 conference (TENCON), IEEE, pp 552–557
Verma A, Ranga V (2020) Mitigation of DIS flooding attacks in RPL-based 6LoWPAN networks. Trans Emerging Telecommun Technol 31(2):e3802
Wallgren L, Raza S, Voigt T (2013) Routing attacks and countermeasures in the RPL-based internet of things. Int J Distrib Sens Netw 9(8):794326
Vallati C (2019) Personal communication
Advancare S (2010) Zolertia: Z1 datasheet. http://zolertia.com/sites/default/files/Zolertia-Z1-Datasheet.pdf. Accessed 10 Mar 2020
Barnett V, Lewis T (1974) Outliers in statistical data. Wiley, London
Verma A, Ranga V (2020) CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis. Telecommun Syst Model Anal Des Manag 75(1):43–61
Kumar N, Kumar U (2016) Anomaly-based network intrusion detection: an outlier detection techniques. In: International conference on soft computing and pattern recognition. Springer, pp 262–269
Jabez J, Muthukumar B (2015) Intrusion detection system (IDS): anomaly detection using outlier detection approach. Procedia Comput Sci 48:338–346
Wang H, Li H, Fang J, Wang H (2018) Robust Gaussian Kalman filter with outlier detection. IEEE Signal Process Lett 25(8):1236–1240
Domingues R, Filippone M, Michiardi P, Zouaoui J (2018) A comparative evaluation of outlier detection algorithms: experiments and analyses. Pattern Recogn 74:406–421
Zhi T, Luo H, Liu Y (2018) A Gini impurity-based interest flooding attack defence mechanism in NDN. IEEE Commun Lett 22(3):538–541
Dujovne D, Watteyne T, Vilajosana X, Thubert P (2014) 6TiSCH: deterministic IP-enabled industrial internet (of things). IEEE Commun Mag 52(12):36–41
Zorbas D, Kotzanikolaou P, Douligeris C (2018) R-TSCH: proactive jamming attack protection for IEEE 802.15. 4-TSCH Networks. In: 2018 IEEE symposium on computers and communications (ISCC), IEEE, pp 00766–00771
Acknowledgements
This research is supported by the Ministry of Human Resource Development (MHRD), Government of India.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Verma, A., Ranga, V. The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things. Computing 103, 1479–1500 (2021). https://doi.org/10.1007/s00607-020-00862-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00607-020-00862-1