Advertisement

Directed Acyclic Graph Inherited Attacks and Mitigation Methods in RPL: A Review

  • P. S. NandhiniEmail author
  • B. M. Mehtre
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 39)

Abstract

RPL (Routing Protocol for Low Power and Lossy Network) is designed for Low Power and Lossy Network (LLN). In RPL, both the nodes and links have resource constraints. There will be many RPL instances in the network. The operation of RPL requires bidirectional links that exhibits asymmetric properties. LLNs do not have predefined network topology. Directed Acyclic Graph (DAG) is organised as a topology by RPL. It uses control packets for associating the data packets with a RPL instance and for validating the routing states. The manipulation done in the control packets and constrained resource of RPL leads to various attacks such as rank attack, DIS attack, Version attack, etc., In this paper, we have discussed the operation of RPL, classification of attacks and various mitigation methods. We have also concentrated on DAG inherited attacks because it degrades the overall performance of the network.

Keywords

RPL Bidirectional Asymmetric DAG LLN Instance Rank attack Version attack Control packets 

References

  1. 1.
    Conti, M., et al.: Internet of Things security and forensics: challenges and opportunities, pp. 544–546 (2018)CrossRefGoogle Scholar
  2. 2.
    Al-Fuqaha, A., et al.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials 17(4), 2347–2376 (2015)CrossRefGoogle Scholar
  3. 3.
    Pongle, P., Chavan, A.: A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International Conference on Pervasive Computing (ICPC). IEEE (2015)Google Scholar
  4. 4.
    Pai, V., Shenoy, U.K.K.: 6LowPan—performance analysis on low power networks. In: International Conference on Computer Networks and Communication Technologies. Springer, Singapore (2019)Google Scholar
  5. 5.
    Garg, R., Sharma, S.: A study on need of adaptation layer in 6LoWPAN protocol stack. Int. J. Wirel. Microwave Technol. (IJWMT) 7(3), 49–57 (2017)CrossRefGoogle Scholar
  6. 6.
    Winter, T., et al.: RPL: IPv6 routing protocol for low-power and lossy networks. No. RFC 6550 (2012)Google Scholar
  7. 7.
    Clausen, T., Herberg, U., Philipp, M.: A critical evaluation of the IPv6 routing protocol for low power and lossy networks (RPL). In: 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE (2011)Google Scholar
  8. 8.
    Vasseur, J.P.: Terms used in routing for low-power and lossy networks. No. RFC 7102 (2014)Google Scholar
  9. 9.
    Deshmukh-Bhosale, S., Sonavane, S.S.: A real-time ıntrusion detection system for wormhole attack in the RPL based Internet of Things. Proc. Manuf. 32, 840–847 (2019)Google Scholar
  10. 10.
    Verma, A., Ranga, V.: Evaluation of network intrusion detection systems for RPL based 6LoWPAN networks in IoT. Wirel. Pers. Commun. 1–24 (2019)Google Scholar
  11. 11.
    Le, A., et al.: The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sens. J. 13(10) 3685–3692 (2013)CrossRefGoogle Scholar
  12. 12.
    Xie, W., et al.: Routing loops in dag-based low power and lossy networks. In: 2010 24th IEEE International Conference on Advanced Information Networking and Applications. IEEE (2010)Google Scholar
  13. 13.
    Dvir, A., Buttyan, L.: VeRA-version number and rank authentication in rpl. In: 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems. IEEE (2011)Google Scholar
  14. 14.
    Kamble, A., Malemath, V.S., Patil, D.: Security attacks and secure routing protocols in RPL-based Internet of Things: Survey. In: 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI). IEEE (2017)Google Scholar
  15. 15.
    Airehrour, D., Gutierrez, J.A., Ray, S.K.: SecTrust-RPL: a secure trust-aware RPL routing protocol for Internet of Things. Future Gener. Comput. Syst. 93 860–876 (2019)CrossRefGoogle Scholar
  16. 16.
    Shafique, U., et al.: Detection of rank attack in routing protocol for Low Power and Lossy Networks. Ann. Telecommun. 73(7–8) 429–438 (2018)CrossRefGoogle Scholar
  17. 17.
    Semedo, F., Moradpoor, N., Rafiq, M.: Vulnerability assessment of objective function of RPL protocol for Internet of Things. In: Proceedings of the 11th International Conference on Security of Information and Networks. ACM (2018)Google Scholar
  18. 18.
    Stephen, R., Arockiam, L.: E2 V: techniques for detecting and mitigating rank inconsistency attack (RInA) in RPL based Internet of Things. J. Phys.: Conf. Ser. 1142(1) (2018). IOP PublishingGoogle Scholar
  19. 19.
    Sahay, R., Geethakumari, G., Modugu, K.: Attack graph—based vulnerability assessment of rank property in RPL-6LOWPAN in IoT. In: 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). IEEE (2018)Google Scholar
  20. 20.
    Mayzaud, A., et al.: A study of RPL DODAG version attacks. In: IFIP International Conference on Autonomous Infrastructure, Management and Security. Springer, Heidelberg (2014)Google Scholar
  21. 21.
    Perrey, H., et al.: TRAIL: topology authentication in RPL. arXiv preprint arXiv:1312.0984 (2013)
  22. 22.
    Iuchi, K., et al.: Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network. In: 2015 21st Asia-Pacific Conference on Communications (APCC). IEEE (2015)Google Scholar
  23. 23.
    Le, A., et al.: Specification-based IDS for securing RPL from topology attacks. In: 2011 IFIP Wireless Days (WD). IEEE (2011)Google Scholar
  24. 24.
    Perazzo, P., et al.: DIO suppression attack against routing in the Internet of Things. IEEE Commun. Lett. 21(11), 2524–2527 (2017)CrossRefGoogle Scholar
  25. 25.
    Dunkels, A., et al.: Contiki: the open source OS for the Internet of Things. 13 October 2012 (2015)Google Scholar
  26. 26.
    Ghaleb, B., et al.: Addressing the DAO Insider Attack in RPL’s Internet of Things networks. IEEE Commun. Lett. 23(1) 68–71 (2019)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of CSEKongu Engineering CollegePerunduraiIndia
  2. 2.Centre of Excellence in Cyber Security (COECS), IDRBT, Established by RBIHyderabadIndia

Personalised recommendations