Abstract
The Internet of Things (IoT) is a two-decade-old technology that allows the interconnection of various cyber-physical objects located anywhere in the world over the internet. A cyber-physical object is an inanimate object with the ability to connect itself to the internet and communicate with other similar objects. This communication is enabled by communication protocols that bridge the gap between hardware devices and the user by ensuring secure communication with optimum efficiency. As the number of IoT devices is increasing exponentially every year with the current estimation of more than 35 billion IoT devices according to a study conducted by findstack.com, there is a need for a lightweight and highly secure communication protocol for IoT devices. This creates a need for handling all the dynamic data exchanges in real-time. Hence, Big Data and IoT technologies are often proposed together for processing and analyzing data streams. Incorporating Big Data analytics in IoT applications enables real-time information transfer, data monitoring and processing easily. To facilitate efficient communication in IoT networks, the Routing Protocol for Low-Power and Lossy Networks (RPL) comes into the picture which is a low power consuming routing protocol that operates on IEEE 802.15. This paper aims to encrypt the RPL Protocol using cryptographic algorithms and compare the results with a non-encrypted RPL Protocol using Cooja Simulator so that the data is securely communicated for Big Data analysis. The (Secure Hash Algorithm) SHA3 algorithm had been used to encrypt the sink nodes of the RPL protocol and the parameters such as average power consumption, network graph, latency is analyzed and compared. The results of this experiment show a considerable drop in latency and power consumption after deploying cryptographic encryption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gluhak, A., Krco, S., Nati, M., Pfisterer, D., Mitton, N.: Razafindralambo T. Challenges for IoT Experimentation, November, pp. 58–67 (2011)
Le, A., Loo, J., Luo, Y., Lasebae, A.: The impacts of internal threats towards routing protocol for low power and lossy network performance. In: Proceedings of the International Symposium on Computing and Communication, pp. 789–794 (2013)
Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., Schönwälder, J.: Using the RPL protocol for supporting passive monitoring in the Internet of Things. In: Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, no. 4, pp. 366–374 (2016)
Pongle, P.: Computer Engineering Department, Sinhgad College of Engineering, Pune IGC, Computer Engineering Department, Sinhgad College of Engineering, Pune I. A Survey: Attacks on RPL and 6LoWPAN in IoT (2015)
Zaminkar, M.: A Method Based on Encryption and Node Rating for Securing the RPL Protocol Communications in the IoT Ecosystem, October, pp. 1–18 (2020)
Razali, M.F., Rusli, M.E., Jamil, N., Ismail, R.: The Authentication Techniques for Enhancing the RPL Security Mode: A Survey, no. 119, pp. 735–743 (2017)
Gawade, A.U.: Lightweight secure RPL: a need in IoT. Int. Conf. Inf. Technol. 2017, 214–219 (2017)
Gawde, P.A.: Specifications A. Lightweight Authentication and Encryption mechanism in Routing Protocol for Low Power and Lossy Networks (RPL), ICICCS, pp. 226–229 (2018)
Avila, K., Jabba, D., Gomez, J.: Security aspects for RPL-based protocols: a systematic review in IoT. Appl Sci. 10(18), 6472 (2020)
Kamble, A., Malemath, V.S., Patil, D.: Security attacks and secure routing protocols in RPL-based Internet of Things: Survey. In: 2017 International Conference on Emerging Trends and Innovations ICT, ICEI 2017, pp. 33–39 (2017)
Dhanda, S.S., Singh, B., Jindal, P.: Lightweight cryptography: a solution to secure IoT. Wirel. Pers. Commun. 112(3), 1947–1980 (2020). https://doi.org/10.1007/s11277-020-07134-3
Kharrufa, H., Al-Kashoash, H.A.A., Kemp, A.H.: RPL-based routing protocols in IoT applications: a review. IEEE Sens J. 19(15), 5952–5967 (2019)
Tang, W., Wei, Z., Zhang, Z., Zhang, B.: Analysis and optimization strategy of multipath RPL based on the COOJA simulator. IJCSI Int. J. Comput. Sci. Issue. 11(5), 27–30 (2014)
Aggarwal, R.K., Rathee, G.: Security Analysis of RPL Protocol, p. 141405 (2018). http://www.ir.juit.ac.in:8080/jspui/bitstream/123456789/17454/1/SP13345_Rajat_Kumar_Aggarwal_IT_2018.pdf
Herden, O.: Architectural patterns for integrating data lakes into data warehouse architectures. In: Bellatreche, L., Goyal, V., Fujita, H., Anirban Mondal, P., Reddy, K. (eds.) Big Data Analytics: 8th International Conference, BDA 2020, Sonepat, India, December 15–18, 2020, Proceedings, pp. 12–27. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-66665-1_2
Singh, S., Singh, J.: Analysis of GPS trajectories mapping on shape files using spatial computing approaches. In: Bellatreche, L., Goyal, V., Fujita, H., Anirban Mondal, P., Reddy, K. (eds.) Big Data Analytics: 8th International Conference, BDA 2020, Sonepat, India, December 15–18, 2020, Proceedings, pp. 91–100. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-66665-1_7
Ouaddah, A., Abou Elkalam, A., Ait, O.A.: FairAccess: a new Blockchain-based access control framework for the Internet of Things. Secur. Commun. Netw. 9(18), 5943–5964 (2016)
Khashan, O.A., Ahmad, R., Khafajah, N.M.: An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Netw. 115, 102448 (2021). https://doi.org/10.1016/j.adhoc.2021.102448
Randhawa, P., Shanthagiri, V., Kumar, A.: Violent activity recognition by E-textile sensors based on machine learning methods. J. Intell. Fuzzy Syst. 39(6), 8115–8123 (2020)
Alkhamisi, A.O., Buhari, S.M., Tsaramirsis, G., Basheri, M.: An integrated incentive and trust-based optimal path identification in ad hoc on-demand multipath distance vector routing for MANET. Int. J. Grid. Util. Comput. 11(2), 169–184 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Patel, A., Shanmugapriya, D., Srivastava, G., Lin, J.CW. (2021). Routing Protocol Security for Low-Power and Lossy Networks in the Internet of Things. In: Srirama, S.N., Lin, J.CW., Bhatnagar, R., Agarwal, S., Reddy, P.K. (eds) Big Data Analytics. BDA 2021. Lecture Notes in Computer Science(), vol 13147. Springer, Cham. https://doi.org/10.1007/978-3-030-93620-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-93620-4_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-93619-8
Online ISBN: 978-3-030-93620-4
eBook Packages: Computer ScienceComputer Science (R0)