Skip to main content
Log in

The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things

  • Regular Paper
  • Published:
Computing Aims and scope Submit manuscript

Abstract

IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is the standard network layer protocol for achieving efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Resource-constrained and non-tamper resistant nature of smart sensor nodes makes RPL protocol susceptible to different threats. An attacker may use insider or outsider attack strategy to perform Denial-of-Service (DoS) attacks against RPL based networks. Security and Privacy risks associated with RPL protocol may limit its global adoption and worldwide acceptance. A proper investigation of RPL specific attacks and their impacts on an underlying network needs to be done. In this paper, we present and investigate one of the catastrophic attacks named as a copycat attack, a type of replay based DoS attack against the RPL protocol. An in-depth experimental study for analyzing the impacts of the copycat attack on RPL has been done. The experimental results show that the copycat attack can significantly degrade network performance in terms of packet delivery ratio, average end-to-end delay, and average power consumption. To the best of our knowledge, this is the first paper that extensively studies the impact of RPL specific replay mechanism based DoS attack on 6LoWPAN networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Verma A, Ranga V (2020) Security of RPL based 6LoWPAN networks in the internet of things: a review. IEEE Sens J 20(11):5666–5690. https://doi.org/10.1109/JSEN.2020.2973677

    Article  Google Scholar 

  2. Ashton K (2009) That ‘internet of things’ thing. RFID J 22(7):97–114

    Google Scholar 

  3. Xu LD, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Ind Inf 10(4):2233–2243. https://doi.org/10.1109/TII.2014.2300753

    Article  Google Scholar 

  4. Miloslavskaya N, Tolstoy A (2019) Internet of things: information security challenges and solutions. Clust Comput 22(1):103–119

    Article  Google Scholar 

  5. GlobalData (2018) IoT market forecast and growth opportunities. https://www.globaldata.com/store/report/gdtc0168ir--iot-market-forecast-and-growth-opportunities/. Accessed 25 Mar 2020

  6. Raoof A, Matrawy A, Lung C (2019) Routing attacks and mitigation methods for RPL-based internet of things. IEEE Commun Surv Tutor 21(2):1582–1606

    Article  Google Scholar 

  7. Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: a survey. J Netw Comput Appl 88:10–28

    Article  Google Scholar 

  8. Airehrour D, Gutierrez J, Ray SK (2016) Secure routing for internet of things: a survey. J Netw Comput Appl 66:198–213

    Article  Google Scholar 

  9. Ziegeldorf JH, Morchon OG, Wehrle K (2014) Privacy in the internet of things: threats and challenges. Secur Commun Netw 7(12):2728–2742

    Article  Google Scholar 

  10. Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet Things J 4(5):1250–1258. https://doi.org/10.1109/JIOT.2017.2694844

    Article  Google Scholar 

  11. Qadri YA, Ali R, Musaddiq A, Al-Turjman F, Kim DW, Kim SW (2020) The limitations in the state-of-the-art counter-measures against the security threats in H-IoT. Clust Comput 23:2047–2065

    Article  Google Scholar 

  12. Ou Q, Zhen Y, Li X, Zhang Y, Zeng L (2012) Application of internet of things in smart grid power transmission. In: 2012 third FTRA international conference on mobile, ubiquitous, and intelligent computing, pp 96–100

  13. Čolaković A, Hadžialić M (2018) Internet of things (IoT): a review of enabling technologies, challenges, and open research issues. Comput Netw 144:17–39

    Article  Google Scholar 

  14. Winter T, Thubert P, Brandt A, Hui J, Kelsey R, Levis P, Pister K, Struik R, Vasseur JP, Alexander R (2012) RPL: IPv6 routing protocol for low-power and lossy networks. Tech. rep

  15. Musaddiq A, Zikria YB, Hahm O, Yu H, Bashir AK, Kim SW (2018) A survey on resource management in IoT operating systems. IEEE Access 6:8459–8482

    Article  Google Scholar 

  16. Tripathi J (2014) On design, evaluation and enhancement of IP-based routing solutions for low power and lossy networks. PhD thesis, Drexel University

  17. Sfar AR, Natalizio E, Challal Y, Chtourou Z (2018) A roadmap for security challenges in the internet of things. Digit Commun Netw 4(2):118–137

    Article  Google Scholar 

  18. Verma A, Ranga V (2019) Evaluation of network intrusion detection systems for RPL based 6LoWPAN networks in IoT. Wirel Pers Commun 108(3):1571–1594

    Article  Google Scholar 

  19. Shafique U, Khan A, Rehman A, Bashir F, Alam M (2018) Detection of rank attack in routing protocol for low power and Lossy networks. Ann Telecommun 73(7–8):429–438

    Article  Google Scholar 

  20. Sahay R, Geethakumari G, Mitra B (2020) A novel blockchain based framework to secure iot-llns against routing attacks. Computing

  21. Kannhavong B, Nakayama H, Nemoto Y, Kato N, Jamalipour A (2007) A survey of routing attacks in mobile ad hoc networks. IEEE Wirel Commun 14(5):85–91

    Article  Google Scholar 

  22. Du X, Chen H (2008) Security in wireless sensor networks. IEEE Wirel Commun 15(4):60–66

    Article  Google Scholar 

  23. Le A, Loo J, Luo Y, Lasebae A (2013) The impacts of internal threats towards routing protocol for low power and lossy network performance. In: 2013 IEEE symposium on computers and communications (ISCC), pp 789–794

  24. Mayzaud A, Badonnel R, Chrisment I, Est Grand, Nancy I (2016) A taxonomy of attacks in RPL-based internet of things. Int J Netw Secur 18(3):459–473

    Google Scholar 

  25. Kushalnagar N, Montenegro G, Schumacher C (2007) IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals. Tech. rep

  26. Olsson J (2014) 6lowpan demystified. Texas Instruments 13

  27. Hussain MI (2017) Internet of things: challenges and research opportunities. CSI Trans ICT 5(1):87–95

    Article  Google Scholar 

  28. Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutor 17(3):1294–1312

    Article  Google Scholar 

  29. Palattella MR, Accettura N, Vilajosana X, Watteyne T, Grieco LA, Boggia G, Dohler M (2013) Standardized protocol stack for the internet of (important) things. IEEE Commun Surv Tutor 15(3):1389–1406

    Article  Google Scholar 

  30. Tomić I, McCann JA (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet Things J 4(6):1910–1923

    Article  Google Scholar 

  31. Oliveira A, Vazão T (2016) Low-power and lossy networks under mobility: a survey. Comput Netw 107:339–352

    Article  Google Scholar 

  32. Iova O, Picco P, Istomin T, Kiraly C (2016) RPL: the routing standard for the internet of things... or is it? IEEE Commun Mag 54(12):16–22

    Article  Google Scholar 

  33. Gnawali O, Levis P (2010) The ETX objective function for RPL, -draft-gnawali-roll-etxof-01

  34. Gnawali O, Levis P (2012) The minimum rank with hysteresis objective function. Tech. rep

  35. Thubert P (2012) Objective function zero for the routing protocol for low-power and lossy networks (RPL). Tech. rep

  36. Gaddour O, Koubâa A (2012) RPL in a nutshell: a survey. Comput Netw 56(14):3163–3178

    Article  Google Scholar 

  37. Levis P, Clausen T, Hui J, Gnawali O, Ko J (2011) The trickle algorithm. Tech. rep

  38. Vasseur J, Agarwal N, Hui J, Shelby Z, Bertrand P, Chauvenet C (2011) RPL: the IP routing protocol designed for low power and lossy networks. Internet Protocol Smart Objects (IPSO) Alliance 36:1–20

    Google Scholar 

  39. Perrey H, Landsmann M, Ugus O, Wählisch M, Schmidt TC (2016) TRAIL: topology authentication in RPL. In: Proceedings of the 2016 international conference on embedded wireless systems and networks. Junction Publishing, USA, EWSN ’16, pp 59–64

  40. Le A, Loo J, Chai KK, Aiash M (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information (Switzerland) 7(2):25

    Google Scholar 

  41. Le A, Loo J, Lasebae A, Vinel A, Chen Y, Chai M (2013) The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sens J 13(10):3685–3692

    Article  Google Scholar 

  42. Tsao T, Alexander R, Dohler M, Daza V, Lozano A, Richardson M (2015) A security threat analysis for the routing protocol for low-power and lossy networks (RPLs) . Tech. rep

  43. Perazzo P, Vallati C, Anastasi G, Dini G (2017) Dio suppression attack against routing in the internet of things. IEEE Commun Lett 21(11):2524–2527

    Article  Google Scholar 

  44. Verma A, Ranga V (2019) Addressing flooding attacks in IPv6-based low power and lossy networks. In: TENCON 2019-2019 IEEE region 10 conference (TENCON), IEEE, pp 552–557

  45. Verma A, Ranga V (2020) Mitigation of DIS flooding attacks in RPL-based 6LoWPAN networks. Trans Emerging Telecommun Technol 31(2):e3802

    Google Scholar 

  46. Wallgren L, Raza S, Voigt T (2013) Routing attacks and countermeasures in the RPL-based internet of things. Int J Distrib Sens Netw 9(8):794326

    Article  Google Scholar 

  47. Vallati C (2019) Personal communication

  48. Advancare S (2010) Zolertia: Z1 datasheet. http://zolertia.com/sites/default/files/Zolertia-Z1-Datasheet.pdf. Accessed 10 Mar 2020

  49. Barnett V, Lewis T (1974) Outliers in statistical data. Wiley, London

    MATH  Google Scholar 

  50. Verma A, Ranga V (2020) CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis. Telecommun Syst Model Anal Des Manag 75(1):43–61

    Article  Google Scholar 

  51. Kumar N, Kumar U (2016) Anomaly-based network intrusion detection: an outlier detection techniques. In: International conference on soft computing and pattern recognition. Springer, pp 262–269

  52. Jabez J, Muthukumar B (2015) Intrusion detection system (IDS): anomaly detection using outlier detection approach. Procedia Comput Sci 48:338–346

    Article  Google Scholar 

  53. Wang H, Li H, Fang J, Wang H (2018) Robust Gaussian Kalman filter with outlier detection. IEEE Signal Process Lett 25(8):1236–1240

    Article  Google Scholar 

  54. Domingues R, Filippone M, Michiardi P, Zouaoui J (2018) A comparative evaluation of outlier detection algorithms: experiments and analyses. Pattern Recogn 74:406–421

    Article  Google Scholar 

  55. Zhi T, Luo H, Liu Y (2018) A Gini impurity-based interest flooding attack defence mechanism in NDN. IEEE Commun Lett 22(3):538–541

    Article  Google Scholar 

  56. Dujovne D, Watteyne T, Vilajosana X, Thubert P (2014) 6TiSCH: deterministic IP-enabled industrial internet (of things). IEEE Commun Mag 52(12):36–41

    Article  Google Scholar 

  57. Zorbas D, Kotzanikolaou P, Douligeris C (2018) R-TSCH: proactive jamming attack protection for IEEE 802.15. 4-TSCH Networks. In: 2018 IEEE symposium on computers and communications (ISCC), IEEE, pp 00766–00771

Download references

Acknowledgements

This research is supported by the Ministry of Human Resource Development (MHRD), Government of India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abhishek Verma.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Verma, A., Ranga, V. The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things. Computing 103, 1479–1500 (2021). https://doi.org/10.1007/s00607-020-00862-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00607-020-00862-1

Keywords

Mathematics Subject Classification

Navigation