Advanced metering infrastructure (AMI) is the core component of the smart grid. As the wireless connection between smart meters in AMI is featured with high packet loss and low transmission rate, AMI is considered as a representative of the low power and lossy networks (LLNs). In such communication environment, the routing protocol in AMI network is essential to ensure the reliability and real-time of data transmission. The IPv6 routing protocol for low-power and lossy networks (RPL), proposed by IETF ROLL working group, is considered to be the best routing solution for the AMI communication environment. However, the performance of RPL can be seriously degraded due to jamming attack. In this paper, we analyze the performance degradation problem of RPL protocol under jamming attack. We propose a backup node selection mechanism based on the standard RPL protocol. The proposed mechanism chooses a predefined number of backup nodes that maximize the probability of successful transmission. We evaluation the proposed mechanism through MATLAB simulations, results show the proposed mechanism improves the performance of RPL under jamming attack prominently.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Ancillotti E, Bruno R, Conti M (2012) “RPL routing protocol in advanced metering infrastructures: An analysis of the unreliability problems”. In: proceedings of the Sustainable Internet and ICT for Sustainability, sustain IT, Pisa, Italy, pp 1–10
Winter T, Thubert P, Brandt A, Hui JW, Kelsey R, Levis P, Pister K, Struik R, Vasseur J, Alexander RK (2012) “RPL: Ipv6 routing protocol for low-power and lossy networks”, vol 6550
Renofio JRR, Pellenz ME, Jamhour E, Santin AO, Penna MC, Souza RD (2016) “On the dynamics of the RPL protocol in AMI networks under jamming attacks”. In: proceedings of the IEEE International Conference on Communications, ICC, Kuala Lumpur Malaysia, pp 1–6
Pavkovic B, Theoleyre F, Duda A (2011) “Multipath opportunistic RPL routing over IEEE 802.15.4”. In: proceedings of the International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, MSW im, Miami, Florida, USA, pp 179–186
Duquennoy S, Landsiedel O, Voigt T (2013) “Let the tree bloom: scalable opportunistic routing with ORPL,”. In: proceedings of the ACM Conference on Embedded Network Sensor Systems, SenSys, Roma, Italy, vol 2, pp 1–2:14
Tahir Y, Yang S, McCann JA (2018) BRPL: Backpressure RPL for high-throughput and mobile iots. IEEE Trans Mob Comput 17(1):29–43
Ji X, He Y, Wang J, Dong W, Wu X, Liu Y (2014) “Walking down the STAIRS: efficient collision resolution for wireless sensor networks”. In: proceedings of the IEEE Conference on Computer Communications, INFOCOM, Toronto Canada, pp 961–969
Ji X, He Y, Wang J, Wu K, Liu D, Yi K, Liu Y (2017) “On improving wireless channel utilization: A collision tolerance-based approach”. IEEE T Mobile Comput 16(3):787–800
Mustafa HA, Zhang X, Liu Z, Xu W, Perrig A (2012) Jamming-resilient multipath routing. IEEE T Depend Secure Comp 9(6):852–864
Gnawali O, Levis P (2012) “The minimum rank with hysteresis objective function”, vol 6719
Ancillotti E, Bruno R, Conti M (2013) “The role of the RPL routing protocol for smart grid communications”. IEEE Commun Mag 51(1):75–83
Ropitault T, Lampropulos A, Pelov A, Toutain L, Vedantham R, Chiummiento P (2014) “Doing it right - recommendations for RPL in plc-based networks for the smart grid”. In: proceedings of the IEEE International Conference on Smart Grid Communications, SmartGridComm, Venice, Italy , pp 452–457
Ho Q, Gao Y, Rajalingham G, Le-ngoc T (2015) “Robustness of the routing protocol for low-power and lossy networks (RPL) in smart grid’s neighbor-area networks”. In: proceedings of the IEEE International Conference on Communications, ICC, London, pp 826–831
Yang Z, Ping S, Sun H, Aghvami A (2017) “CRB-RPL: A receiver-based routing protocol for communications in cognitive radio enabled smart grid”. IEEE T Veh Technol 66(7):5985–5994
Lemercier F, Montavont N (2018) “Performance evaluation of a RPL hybrid objective function for the smart grid network”.. In: proceedings of the International Conference on Ad Hoc Networks an Wireless, ADHOC-NOW, Saint-Malo France, pp 27–38
Almusaylim ZA, Al-Humam A, Jhanjhi NZ (2020) “Proposing a secure RPL based internet of things routing protocol: A review”. Ad Hoc Networks 101:102096
Wadhaj I, Ghaleb B, Thomson C, Al-Dubai A, Buchanan WJ (2020) “Mitigation mechanisms against the DAO attack on the routing protocol for low power and lossy networks (RPL)”. IEEE, Access 8:43665–43675
Arena A, Perazzo P, Vallati C, Dini G, Anastasi G (2020) Evaluating and improving the scalability of RPL security in the internet of things. Comput Commun 151:119–132
Murali S, Jamalipour A (2020) “A lightweight intrusion detection for sybil attack under mobile RPL in the internet of things”. IEEE Internet Things J 7(1):379–388
Raoof A, Matrawy A, Lung C (2019) “Routing attacks and mitigation methods for rpl-based internet of things”. IEEE Commun Surv Tutor, 21(2):1582–1606
Airehrour D, Gutiérrez J.A., Ray SK (2019) SecTrust-Rpl: A secure trust-aware RPL routing protocol for internet of things. Future Gener Comp Sy 93:860–876
Zaidi SAR, Ghogho M (2012) “Stochastic geometric analysis of black hole attack on smart grid communication networks”. In: proceedings of the IEEE International Conference on Smart Grid Communications, SmartGridComm, Tainan Taiwan, pp 716–721
Mayzaud A, Badonnel R, Chrisment I (2017) “A distributed monitoring strategy for detecting version number attacks in rpl-based networks”. IEEE Trans Netw Ser Mgmt 14(2):472–486
Wallgren L, Raza S, Voigt T (2013) “Routing attacks and countermeasures in the rpl-based internet of things”
Kamgueu PO, Nataf E, Djotio TN (2018) Survey on RPL enhancements: a focus on topology, security and mobility. Comput Commun 120:10–21
Wei X, Wang Q, Wang T, Fan J (2017) “Jammer localization in multi-hop wireless network: A comprehensive survey”. IEEE Commun Surv Tutor 19(2):765–799
Rappaport TS (1996) Wireless communications - principles and practice. Prentice Hall
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supported by National Key R&D Program of China (2018YFB0904900, 2018YFB0904904).
About this article
Cite this article
Zhang, T., Ji, X. & Xu, W. Jamming-Resilient Backup Nodes Selection for RPL-based Routing in Smart Grid AMI Networks. Mobile Netw Appl (2020). https://doi.org/10.1007/s11036-020-01634-z
- Smart grid
- Advanced metering infrastructure (AMI)
- Jamming attack