Abstract
Sinkhole attacks have been the most dangerous threat to security in recent times. The attackers send malicious requests to Domain Name Server (DNS) that causes unavailability of services and redirects the victim to the destination designed by the malicious attacker. The malicious attacker with the help of these compromised devices forms a BOTNET and uses it for malicious purposes like ransomware, extortion, unauthorized access, fraudulent attempts, data theft, financial gains, eavesdropping, repudiation, etc. The attacker node or the sinkhole node was placed at three different locations to observe the change in count of DIO messages. The purpose of this research was to detect that at what locations can attacker gather a large amount of data. It was observed that when the attacker node was placed at the edge and along the communication links, there was a significant increase in the count of DIO messages. This means that at these points, attacker can gather a lot of information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
https://www.geeksforgeeks.org/what-is-6lowpan/ visited on 23 February 2023
https://www.techopedia.com/definition/3164/edge-router visited 23 February 2023.
Garg R, Sharma S (2017) A study of adaptation layer in 6LoWPAN protocol stack. Int J Wirel Microw Technol 7:49–57. https://doi.org/10.5815/ijwmt.2017.03.05
Bello AD, Lamba OS (2020) How to detect and mitigate Sinkhole attack in wireless sensor network (WSN). Int J Eng Res Technol 09(05)
Musaddiq A, Zikria YB, Zulqarnain, Kim SW (2020) Routing protocol for low-power and lossy networks for heterogeneous traffic network. EURASIP J Wirel Commun Netw. https://doi.org/10.1186/s13638-020-1645-4
Shukla V, Chaturvedi A, Misra MK (2021) On authentication schemes using polynomials over non commutative rings. Wirel Pers Commun 118(1):1–9. https://doi.org/10.1007/s11277-020-08008-4
Vincent A, Francis F, Ayyappadas PS Security aspects in 6lowpan networks: a study. IOSR J Electr Commun Eng 08–12 (2278-8735)
Selvakumar M (2017) An effective mitigation of various attacks in 6lowpan wireless sensor networks. IJIRMPS 5(4):2349–7300
Le A, Loo J, Lasebae A, Aiash M, Luo Y (2012) 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. Int J Commun Syst 25(9):1189–1212. https://doi.org/10.1002/dac.2356
Misra MK, Chaturvedi A, Tripathi SP, Shukla V (2019) A unique key sharing protocol among three users using non-commutative group for electronic health record system. J Disc Math Sci Cryptogr 22(8):1435–1451. https://doi.org/10.1080/09720529.2019.1692450
Chaturvedi A, Srivastava N, Shukla V (2015) A secure wireless communication protocol using Diffie-Hellman key exchange. Int J Comput Appl 126(5):35–38. https://doi.org/10.5120/ijca2015906060
Sajjad SM, Yousaf M (2016) Security analysis of internet of things adaptation layer. Sci Int 28(4):3311–3317
Dunkels A, Eriksson J, Finne N, Tsiftes N (2011) Powertrace: network-level power profiling for low-power wireless networks. SICS Technical Report T2011:05 (ISSN 1100-3154)
Kasinathan P et al (2013) Denial-of-service detection in 6LoWPAN based internet of things. In: ACM SIGSAC conference on computer and communications security (CCS’13)
Alsukyati IS, Singh A (2022) A lightweight scheme for mitigating RPL version number attacks in IoT networks. https://doi.org/10.1109/ACCESS.2022.3251460
Alghamdi W, Schukat M (2021) Precision time protocol attack strategies and their resistance to existing security extensions. https://doi.org/10.1186/s42400-021-0080-y
Glissa G, Meddeb A (2018) 6LowPSec: an end-to-end security protocol for 6LoWPAN. Ad Hoc Netw 82:100–112. https://doi.org/10.1016/j.adhoc.2018.01.013
Hummen R, Hiller J, Wirtz H, Henze M, Shafagh H, Wehrle K (2013) 6LoWPAN fragmentation attacks and mitigation mechanisms. In: 6th ACM conference on security and privacy in wireless and mobile networks (WiSec’13). https://doi.org/10.1145/2462096.2462107
Kim HG (2008) Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. Int Conf Converg Hybrid Inf Technol. https://doi.org/10.1109/ICHT.2008.261
Betreuer TT, Klein A (2011) RPL: IPv6 routing protocol for low power and lossy networks. Network Architecture and Services (Seminar SN SS2011)
Nikravan M, Movaghar, Hosseinzadeh M (2018) A lightweight signcryption scheme for defence against fragment duplication attack in the 6LoWPAN networks. Peer Peer Netw Appl. https://doi.org/10.1007/s12083-018-0659-8
Chakraborty S, Majumder A (2019) 6LoWPAN security: classification, analysis and open research issues. Proc Int Conf Comput Intell IoT 1(1)
Cervantes C, Poplade D, Nogueira M, Santos A (2015) Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In: 2015 IFIP/IEEE international symposium on integrated network management (IM)
Stephen R, Arockiam L (2017) An enhanced technique to detect sinkhole attack in the internet of things. Int J Eng Res Technol 5(13)
Alzubaidi M, Anbar M, Al-Saleem S, Al-Sarawi S, Alieyan K (2017) Review on mechanisms for detecting sinkhole attacks on RPLs. In: 2017 8th international conference on information technology (ICIT), Amman, Jordan, pp 369–37. https://doi.org/10.1109/ICITECH.2017.8080028
Khraisat A, Gondal I, Vamplew P, Kamruzzaman J, Alazab A (2019) A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. J Electron. https://doi.org/10.3390/electronics8111210
Dhanaraj RK, Krishnasamy L, Geman O, Izdrui DR (2021) Black hole and sink hole attack detection in wireless body area networks. Comput Mater Contin. https://doi.org/10.32604/cmc.2021.01536
Sherasiya T, Upadhay H, Patel HB (2016) A survey: intrusion detection system for internet of things. Int J Comput Sci Eng 5(2):91–98
Shukla V, Misra MK, Chaturvedi A (2022) Journey of cryptocurrency in India in view of financial budget 2022–23. Cornell University arxiv, 1–6. https://doi.org/10.48550/arXiv.2203.12606
Kim K, Park SD, Montenegro G, Yoo S, Kushalnagar N (2007) 6LoWPAN ad hoc on-demand distance vector routing (LOAD). Network working group internet-draft (work in progress), vol 19
Thakur N, Shahare P (2017) Sinkhole attack in wireless sensor. Int J Technol Res Eng 4(10)
Taghanaki SR, Jamshidi K, Bohlooli A (2019) DEEM: a decentralized and energy efficient method for detecting sinkhole attacks on the internet of things. In: 2019 9th international conference on computer and knowledge engineering (ICCKE), Mashhad, Iran, pp 325–330. https://doi.org/10.1109/ICCKE48569.2019.8965177
Yadollahzadeh Tabari M, Mataji Z (2020) Detecting sinkhole attack in RPL-based internet of things routing protocol. J AI Data Mining. https://doi.org/10.22044/jadm.2020.9253,2060
Kenji I, Matsunaga T, Toyoda K, Sasase I (2015) Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network. IEICE Commun Exp 4(11):340–345
Ioulianou PP, Vassilakis V, Shahandashti SF (2022) Heartbeat-based detection of blackhole and greyhole attacks in RPL networks. J Cybersec Privacy. https://doi.org/10.3390/JCP2010009
Pongle P, Chavan G (2015) A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 international conference on pervasive computing (ICPC), Pune, India, pp 1–6. https://doi.org/10.1109/PERVASIVE.2015.7087034
Mayzaud A, Badonnel R, Chrisment I (2016) Taxonomy of Attacks in RPL-based Internet of Things. Int J Netw Sec 18(3):459–473
Wazid M et al (2019) RAD-EI: a routing attack detection scheme for edge-based Internet of Things environment. Int J Commun Syst 32(15). https://doi.org/10.1002/dac.1024
Pomal J, Upadhay D (2020) A survey on various detection techniques of sinkhole attacks in WSN. Int Res J Eng Technol 7(11)
Chaturvedi A, Shukla V (2020) Miracle of number theory. Everyman’s Sci 50(3–4):131–134. http://www.sciencecongress.nic.in/pdf/e-book/august_nov_2020.pdf
Shukla V, Chaturvedi A (2018) Cryptocurrency: characteristics and future perspectives 53(2):77–80. 164.100.161.164/pdf/e-book/june-july-18.pdf#page=14
Narwal B, Mohapatra AK (2021) A survey on security and authentication in wireless body area networks. J Syst Architect 113:101883
Shukla V, Mishra A, Agarwal S (2020) A new one time password generation method for financial transactions with randomness analysis. In: Innovations in electrical and electronic engineering (part of the lecture notes in electrical engineering book series (LNEE, volume 661)), pp 713–720. https://doi.org/10.1007/978-981-15-4692-1_54
Shukla V, Mishra A, Yadav A (2019) An authenticated and secure electronic health record system. In: IEEE international conference on information and communication technology, pp 1–5. https://doi.org/10.1109/CICT48419.2019.9066168
Shukla V, Chaturvedi A, Srivastava N (2017) Secure wireless communication protocol: to avoid vulnerabilities in shared authentication. Commun Appl Electron 7(6):4–7. https://doi.org/10.5120/cae2017652680
Narwal B, Mohapatra AK (2020) SEEMAKA: secured energy-efficient mutual authentication and key agreement scheme for wireless body area networks. Wirel Pers Commun 113(4):1985–2008
Sharma M, Narwal B, Anand R, Mohapatra AK, Yadav R (2023) PSECAS: a physical unclonable function based secure authentication scheme for Internet of Drones. Comput Electr Eng 108:108662
Kayalvizhi M, Arul Kumaran G, Nithysari A (2014) Detection and prevention of sinkhole attack on zone routing protocol (ZRP) in MANET. Int J Modern Trends Eng Res
Chaturvedi A, Shukla V, Misra MK (2018) Three party key sharing protocol using polynomial rings. In: 5th IEEE Uttar Pradesh section international conference on electrical, electronics and computer engineering (UPCON), pp 1–5. https://doi.org/10.1109/UPCON.2018.8596905
Narwal B, Mohapatra AK (2021) SAMAKA: secure and anonymous mutual authentication and key agreement scheme for wireless body area networks. Arab J Sci Eng 46(9):9197–9219
Wazid M, Das AK, Kumari S, Khan MK (2016) Design of sinkhole node detection mechanisms for hierarchical wireless sensor networks. Sec Commun Netw 9(17):4596–4614. https://doi.org/10.1002/sec.1652
Yasin NM, Balaji N, Sambasivam G, Basha MSS, Sujatha P (2017) ADSMS: anomaly detection scheme for mitigating sink hole attack in wireless sensor network. In: International conference on technical advancements in computers and communications, (ICTACC)
Ngai ECH, Liu J, Lyu MR (2007) An efficient intruder detection algorithm against Sinkhole attacks in wireless sensor networks. Comput Commun 30(11–12):2353–2364
Hachemi F-E, Mana M, Bensaber BA (2020) Study of the impact of sinkhole attack in IoT using shewhart control charts. In: GLOBECOM 2020—2020 IEEE global communications conference, Taipei, Taiwan, pp 1–5
Yadav H, Tak S (2018) Detection of sinkhole attack in wireless sensor network using ad-hoc on-demand distance vector. Int J Eng Res Technol 7(5)
Kibirige GW, Sanga C A survey on detection of sinkhole attacks in wireless sensor network. Int J Comput Sci Inf 13:20
Kaur P, Kaur N (2017) A hybrid approach to resolve Sinkhole attack in WSN using RAEED and ADOV protocols. Int J Adv Eng Res Dev 4:77
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Singh, S., Gupta, M., Sharma, D.K. (2024). Investigation of Sinkhole Attacks and Network Simulation on 6LoWPAN. In: Chaturvedi, A., Hasan, S.U., Roy, B.K., Tsaban, B. (eds) Cryptology and Network Security with Machine Learning. ICCNSML 2023. Lecture Notes in Networks and Systems, vol 918. Springer, Singapore. https://doi.org/10.1007/978-981-97-0641-9_6
Download citation
DOI: https://doi.org/10.1007/978-981-97-0641-9_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-0640-2
Online ISBN: 978-981-97-0641-9
eBook Packages: EngineeringEngineering (R0)