Skip to main content

Routing Protocol Security for Low-Power and Lossy Networks in the Internet of Things

  • Conference paper
  • First Online:
Big Data Analytics (BDA 2021)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 13147))

Included in the following conference series:

  • 633 Accesses

Abstract

The Internet of Things (IoT) is a two-decade-old technology that allows the interconnection of various cyber-physical objects located anywhere in the world over the internet. A cyber-physical object is an inanimate object with the ability to connect itself to the internet and communicate with other similar objects. This communication is enabled by communication protocols that bridge the gap between hardware devices and the user by ensuring secure communication with optimum efficiency. As the number of IoT devices is increasing exponentially every year with the current estimation of more than 35 billion IoT devices according to a study conducted by findstack.com, there is a need for a lightweight and highly secure communication protocol for IoT devices. This creates a need for handling all the dynamic data exchanges in real-time. Hence, Big Data and IoT technologies are often proposed together for processing and analyzing data streams. Incorporating Big Data analytics in IoT applications enables real-time information transfer, data monitoring and processing easily. To facilitate efficient communication in IoT networks, the Routing Protocol for Low-Power and Lossy Networks (RPL) comes into the picture which is a low power consuming routing protocol that operates on IEEE 802.15. This paper aims to encrypt the RPL Protocol using cryptographic algorithms and compare the results with a non-encrypted RPL Protocol using Cooja Simulator so that the data is securely communicated for Big Data analysis. The (Secure Hash Algorithm) SHA3 algorithm had been used to encrypt the sink nodes of the RPL protocol and the parameters such as average power consumption, network graph, latency is analyzed and compared. The results of this experiment show a considerable drop in latency and power consumption after deploying cryptographic encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gluhak, A., Krco, S., Nati, M., Pfisterer, D., Mitton, N.: Razafindralambo T. Challenges for IoT Experimentation, November, pp. 58–67 (2011)

    Google Scholar 

  2. Le, A., Loo, J., Luo, Y., Lasebae, A.: The impacts of internal threats towards routing protocol for low power and lossy network performance. In: Proceedings of the International Symposium on Computing and Communication, pp. 789–794 (2013)

    Google Scholar 

  3. Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., Schönwälder, J.: Using the RPL protocol for supporting passive monitoring in the Internet of Things. In: Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, no. 4, pp. 366–374 (2016)

    Google Scholar 

  4. Pongle, P.: Computer Engineering Department, Sinhgad College of Engineering, Pune IGC, Computer Engineering Department, Sinhgad College of Engineering, Pune I. A Survey: Attacks on RPL and 6LoWPAN in IoT (2015)

    Google Scholar 

  5. Zaminkar, M.: A Method Based on Encryption and Node Rating for Securing the RPL Protocol Communications in the IoT Ecosystem, October, pp. 1–18 (2020)

    Google Scholar 

  6. Razali, M.F., Rusli, M.E., Jamil, N., Ismail, R.: The Authentication Techniques for Enhancing the RPL Security Mode: A Survey, no. 119, pp. 735–743 (2017)

    Google Scholar 

  7. Gawade, A.U.: Lightweight secure RPL: a need in IoT. Int. Conf. Inf. Technol. 2017, 214–219 (2017)

    Google Scholar 

  8. Gawde, P.A.: Specifications A. Lightweight Authentication and Encryption mechanism in Routing Protocol for Low Power and Lossy Networks (RPL), ICICCS, pp. 226–229 (2018)

    Google Scholar 

  9. Avila, K., Jabba, D., Gomez, J.: Security aspects for RPL-based protocols: a systematic review in IoT. Appl Sci. 10(18), 6472 (2020)

    Article  Google Scholar 

  10. Kamble, A., Malemath, V.S., Patil, D.: Security attacks and secure routing protocols in RPL-based Internet of Things: Survey. In: 2017 International Conference on Emerging Trends and Innovations ICT, ICEI 2017, pp. 33–39 (2017)

    Google Scholar 

  11. Dhanda, S.S., Singh, B., Jindal, P.: Lightweight cryptography: a solution to secure IoT. Wirel. Pers. Commun. 112(3), 1947–1980 (2020). https://doi.org/10.1007/s11277-020-07134-3

    Article  Google Scholar 

  12. Kharrufa, H., Al-Kashoash, H.A.A., Kemp, A.H.: RPL-based routing protocols in IoT applications: a review. IEEE Sens J. 19(15), 5952–5967 (2019)

    Article  Google Scholar 

  13. Tang, W., Wei, Z., Zhang, Z., Zhang, B.: Analysis and optimization strategy of multipath RPL based on the COOJA simulator. IJCSI Int. J. Comput. Sci. Issue. 11(5), 27–30 (2014)

    Google Scholar 

  14. Aggarwal, R.K., Rathee, G.: Security Analysis of RPL Protocol, p. 141405 (2018). http://www.ir.juit.ac.in:8080/jspui/bitstream/123456789/17454/1/SP13345_Rajat_Kumar_Aggarwal_IT_2018.pdf

  15. Herden, O.: Architectural patterns for integrating data lakes into data warehouse architectures. In: Bellatreche, L., Goyal, V., Fujita, H., Anirban Mondal, P., Reddy, K. (eds.) Big Data Analytics: 8th International Conference, BDA 2020, Sonepat, India, December 15–18, 2020, Proceedings, pp. 12–27. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-66665-1_2

    Chapter  Google Scholar 

  16. Singh, S., Singh, J.: Analysis of GPS trajectories mapping on shape files using spatial computing approaches. In: Bellatreche, L., Goyal, V., Fujita, H., Anirban Mondal, P., Reddy, K. (eds.) Big Data Analytics: 8th International Conference, BDA 2020, Sonepat, India, December 15–18, 2020, Proceedings, pp. 91–100. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-66665-1_7

    Chapter  Google Scholar 

  17. Ouaddah, A., Abou Elkalam, A., Ait, O.A.: FairAccess: a new Blockchain-based access control framework for the Internet of Things. Secur. Commun. Netw. 9(18), 5943–5964 (2016)

    Article  Google Scholar 

  18. Khashan, O.A., Ahmad, R., Khafajah, N.M.: An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Netw. 115, 102448 (2021). https://doi.org/10.1016/j.adhoc.2021.102448

    Article  Google Scholar 

  19. Randhawa, P., Shanthagiri, V., Kumar, A.: Violent activity recognition by E-textile sensors based on machine learning methods. J. Intell. Fuzzy Syst. 39(6), 8115–8123 (2020)

    Article  Google Scholar 

  20. Alkhamisi, A.O., Buhari, S.M., Tsaramirsis, G., Basheri, M.: An integrated incentive and trust-based optimal path identification in ad hoc on-demand multipath distance vector routing for MANET. Int. J. Grid. Util. Comput. 11(2), 169–184 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gautam Srivastava .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patel, A., Shanmugapriya, D., Srivastava, G., Lin, J.CW. (2021). Routing Protocol Security for Low-Power and Lossy Networks in the Internet of Things. In: Srirama, S.N., Lin, J.CW., Bhatnagar, R., Agarwal, S., Reddy, P.K. (eds) Big Data Analytics. BDA 2021. Lecture Notes in Computer Science(), vol 13147. Springer, Cham. https://doi.org/10.1007/978-3-030-93620-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-93620-4_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-93619-8

  • Online ISBN: 978-3-030-93620-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics