Skip to main content

Investigation of Sinkhole Attacks and Network Simulation on 6LoWPAN

  • Conference paper
  • First Online:
Cryptology and Network Security with Machine Learning (ICCNSML 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 918))

  • 83 Accesses

Abstract

Sinkhole attacks have been the most dangerous threat to security in recent times. The attackers send malicious requests to Domain Name Server (DNS) that causes unavailability of services and redirects the victim to the destination designed by the malicious attacker. The malicious attacker with the help of these compromised devices forms a BOTNET and uses it for malicious purposes like ransomware, extortion, unauthorized access, fraudulent attempts, data theft, financial gains, eavesdropping, repudiation, etc. The attacker node or the sinkhole node was placed at three different locations to observe the change in count of DIO messages. The purpose of this research was to detect that at what locations can attacker gather a large amount of data. It was observed that when the attacker node was placed at the edge and along the communication links, there was a significant increase in the count of DIO messages. This means that at these points, attacker can gather a lot of information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. https://www.geeksforgeeks.org/what-is-6lowpan/ visited on 23 February 2023

  2. https://www.techopedia.com/definition/3164/edge-router visited 23 February 2023.

  3. Garg R, Sharma S (2017) A study of adaptation layer in 6LoWPAN protocol stack. Int J Wirel Microw Technol 7:49–57. https://doi.org/10.5815/ijwmt.2017.03.05

  4. Bello AD, Lamba OS (2020) How to detect and mitigate Sinkhole attack in wireless sensor network (WSN). Int J Eng Res Technol 09(05)

    Google Scholar 

  5. Musaddiq A, Zikria YB, Zulqarnain, Kim SW (2020) Routing protocol for low-power and lossy networks for heterogeneous traffic network. EURASIP J Wirel Commun Netw. https://doi.org/10.1186/s13638-020-1645-4

  6. Shukla V, Chaturvedi A, Misra MK (2021) On authentication schemes using polynomials over non commutative rings. Wirel Pers Commun 118(1):1–9. https://doi.org/10.1007/s11277-020-08008-4

    Article  Google Scholar 

  7. Vincent A, Francis F, Ayyappadas PS Security aspects in 6lowpan networks: a study. IOSR J Electr Commun Eng 08–12 (2278-8735)

    Google Scholar 

  8. Selvakumar M (2017) An effective mitigation of various attacks in 6lowpan wireless sensor networks. IJIRMPS 5(4):2349–7300

    Google Scholar 

  9. Le A, Loo J, Lasebae A, Aiash M, Luo Y (2012) 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. Int J Commun Syst 25(9):1189–1212. https://doi.org/10.1002/dac.2356

    Article  Google Scholar 

  10. Misra MK, Chaturvedi A, Tripathi SP, Shukla V (2019) A unique key sharing protocol among three users using non-commutative group for electronic health record system. J Disc Math Sci Cryptogr 22(8):1435–1451. https://doi.org/10.1080/09720529.2019.1692450

    Article  MathSciNet  Google Scholar 

  11. Chaturvedi A, Srivastava N, Shukla V (2015) A secure wireless communication protocol using Diffie-Hellman key exchange. Int J Comput Appl 126(5):35–38. https://doi.org/10.5120/ijca2015906060

    Article  Google Scholar 

  12. Sajjad SM, Yousaf M (2016) Security analysis of internet of things adaptation layer. Sci Int 28(4):3311–3317

    Google Scholar 

  13. Dunkels A, Eriksson J, Finne N, Tsiftes N (2011) Powertrace: network-level power profiling for low-power wireless networks. SICS Technical Report T2011:05 (ISSN 1100-3154)

    Google Scholar 

  14. Kasinathan P et al (2013) Denial-of-service detection in 6LoWPAN based internet of things. In: ACM SIGSAC conference on computer and communications security (CCS’13)

    Google Scholar 

  15. Alsukyati IS, Singh A (2022) A lightweight scheme for mitigating RPL version number attacks in IoT networks. https://doi.org/10.1109/ACCESS.2022.3251460

  16. Alghamdi W, Schukat M (2021) Precision time protocol attack strategies and their resistance to existing security extensions. https://doi.org/10.1186/s42400-021-0080-y

  17. Glissa G, Meddeb A (2018) 6LowPSec: an end-to-end security protocol for 6LoWPAN. Ad Hoc Netw 82:100–112. https://doi.org/10.1016/j.adhoc.2018.01.013

  18. Hummen R, Hiller J, Wirtz H, Henze M, Shafagh H, Wehrle K (2013) 6LoWPAN fragmentation attacks and mitigation mechanisms. In: 6th ACM conference on security and privacy in wireless and mobile networks (WiSec’13). https://doi.org/10.1145/2462096.2462107

  19. Kim HG (2008) Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. Int Conf Converg Hybrid Inf Technol. https://doi.org/10.1109/ICHT.2008.261

    Article  Google Scholar 

  20. Betreuer TT, Klein A (2011) RPL: IPv6 routing protocol for low power and lossy networks. Network Architecture and Services (Seminar SN SS2011)

    Google Scholar 

  21. Nikravan M, Movaghar, Hosseinzadeh M (2018) A lightweight signcryption scheme for defence against fragment duplication attack in the 6LoWPAN networks. Peer Peer Netw Appl. https://doi.org/10.1007/s12083-018-0659-8

  22. Chakraborty S, Majumder A (2019) 6LoWPAN security: classification, analysis and open research issues. Proc Int Conf Comput Intell IoT 1(1)

    Google Scholar 

  23. Cervantes C, Poplade D, Nogueira M, Santos A (2015) Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In: 2015 IFIP/IEEE international symposium on integrated network management (IM)

    Google Scholar 

  24. Stephen R, Arockiam L (2017) An enhanced technique to detect sinkhole attack in the internet of things. Int J Eng Res Technol 5(13)

    Google Scholar 

  25. Alzubaidi M, Anbar M, Al-Saleem S, Al-Sarawi S, Alieyan K (2017) Review on mechanisms for detecting sinkhole attacks on RPLs. In: 2017 8th international conference on information technology (ICIT), Amman, Jordan, pp 369–37. https://doi.org/10.1109/ICITECH.2017.8080028

  26. Khraisat A, Gondal I, Vamplew P, Kamruzzaman J, Alazab A (2019) A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. J Electron. https://doi.org/10.3390/electronics8111210

    Article  Google Scholar 

  27. Dhanaraj RK, Krishnasamy L, Geman O, Izdrui DR (2021) Black hole and sink hole attack detection in wireless body area networks. Comput Mater Contin. https://doi.org/10.32604/cmc.2021.01536

  28. Sherasiya T, Upadhay H, Patel HB (2016) A survey: intrusion detection system for internet of things. Int J Comput Sci Eng 5(2):91–98

    Google Scholar 

  29. Shukla V, Misra MK, Chaturvedi A (2022) Journey of cryptocurrency in India in view of financial budget 2022–23. Cornell University arxiv, 1–6. https://doi.org/10.48550/arXiv.2203.12606

  30. Kim K, Park SD, Montenegro G, Yoo S, Kushalnagar N (2007) 6LoWPAN ad hoc on-demand distance vector routing (LOAD). Network working group internet-draft (work in progress), vol 19

    Google Scholar 

  31. Thakur N, Shahare P (2017) Sinkhole attack in wireless sensor. Int J Technol Res Eng 4(10)

    Google Scholar 

  32. Taghanaki SR, Jamshidi K, Bohlooli A (2019) DEEM: a decentralized and energy efficient method for detecting sinkhole attacks on the internet of things. In: 2019 9th international conference on computer and knowledge engineering (ICCKE), Mashhad, Iran, pp 325–330. https://doi.org/10.1109/ICCKE48569.2019.8965177

  33. Yadollahzadeh Tabari M, Mataji Z (2020) Detecting sinkhole attack in RPL-based internet of things routing protocol. J AI Data Mining. https://doi.org/10.22044/jadm.2020.9253,2060

  34. Kenji I, Matsunaga T, Toyoda K, Sasase I (2015) Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network. IEICE Commun Exp 4(11):340–345

    Article  Google Scholar 

  35. Ioulianou PP, Vassilakis V, Shahandashti SF (2022) Heartbeat-based detection of blackhole and greyhole attacks in RPL networks. J Cybersec Privacy. https://doi.org/10.3390/JCP2010009

  36. Pongle P, Chavan G (2015) A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 international conference on pervasive computing (ICPC), Pune, India, pp 1–6. https://doi.org/10.1109/PERVASIVE.2015.7087034

  37. Mayzaud A, Badonnel R, Chrisment I (2016) Taxonomy of Attacks in RPL-based Internet of Things. Int J Netw Sec 18(3):459–473

    Google Scholar 

  38. Wazid M et al (2019) RAD-EI: a routing attack detection scheme for edge-based Internet of Things environment. Int J Commun Syst 32(15). https://doi.org/10.1002/dac.1024

  39. Pomal J, Upadhay D (2020) A survey on various detection techniques of sinkhole attacks in WSN. Int Res J Eng Technol 7(11)

    Google Scholar 

  40. Chaturvedi A, Shukla V (2020) Miracle of number theory. Everyman’s Sci 50(3–4):131–134. http://www.sciencecongress.nic.in/pdf/e-book/august_nov_2020.pdf

  41. Shukla V, Chaturvedi A (2018) Cryptocurrency: characteristics and future perspectives 53(2):77–80. 164.100.161.164/pdf/e-book/june-july-18.pdf#page=14

    Google Scholar 

  42. Narwal B, Mohapatra AK (2021) A survey on security and authentication in wireless body area networks. J Syst Architect 113:101883

    Article  Google Scholar 

  43. Shukla V, Mishra A, Agarwal S (2020) A new one time password generation method for financial transactions with randomness analysis. In: Innovations in electrical and electronic engineering (part of the lecture notes in electrical engineering book series (LNEE, volume 661)), pp 713–720. https://doi.org/10.1007/978-981-15-4692-1_54

  44. Shukla V, Mishra A, Yadav A (2019) An authenticated and secure electronic health record system. In: IEEE international conference on information and communication technology, pp 1–5. https://doi.org/10.1109/CICT48419.2019.9066168

  45. Shukla V, Chaturvedi A, Srivastava N (2017) Secure wireless communication protocol: to avoid vulnerabilities in shared authentication. Commun Appl Electron 7(6):4–7. https://doi.org/10.5120/cae2017652680

  46. Narwal B, Mohapatra AK (2020) SEEMAKA: secured energy-efficient mutual authentication and key agreement scheme for wireless body area networks. Wirel Pers Commun 113(4):1985–2008

    Google Scholar 

  47. Sharma M, Narwal B, Anand R, Mohapatra AK, Yadav R (2023) PSECAS: a physical unclonable function based secure authentication scheme for Internet of Drones. Comput Electr Eng 108:108662

    Article  Google Scholar 

  48. Kayalvizhi M, Arul Kumaran G, Nithysari A (2014) Detection and prevention of sinkhole attack on zone routing protocol (ZRP) in MANET. Int J Modern Trends Eng Res

    Google Scholar 

  49. Chaturvedi A, Shukla V, Misra MK (2018) Three party key sharing protocol using polynomial rings. In: 5th IEEE Uttar Pradesh section international conference on electrical, electronics and computer engineering (UPCON), pp 1–5. https://doi.org/10.1109/UPCON.2018.8596905

  50. Narwal B, Mohapatra AK (2021) SAMAKA: secure and anonymous mutual authentication and key agreement scheme for wireless body area networks. Arab J Sci Eng 46(9):9197–9219

    Article  Google Scholar 

  51. Wazid M, Das AK, Kumari S, Khan MK (2016) Design of sinkhole node detection mechanisms for hierarchical wireless sensor networks. Sec Commun Netw 9(17):4596–4614. https://doi.org/10.1002/sec.1652

  52. Yasin NM, Balaji N, Sambasivam G, Basha MSS, Sujatha P (2017) ADSMS: anomaly detection scheme for mitigating sink hole attack in wireless sensor network. In: International conference on technical advancements in computers and communications, (ICTACC)

    Google Scholar 

  53. Ngai ECH, Liu J, Lyu MR (2007) An efficient intruder detection algorithm against Sinkhole attacks in wireless sensor networks. Comput Commun 30(11–12):2353–2364

    Google Scholar 

  54. Hachemi F-E, Mana M, Bensaber BA (2020) Study of the impact of sinkhole attack in IoT using shewhart control charts. In: GLOBECOM 2020—2020 IEEE global communications conference, Taipei, Taiwan, pp 1–5

    Google Scholar 

  55. Yadav H, Tak S (2018) Detection of sinkhole attack in wireless sensor network using ad-hoc on-demand distance vector. Int J Eng Res Technol 7(5)

    Google Scholar 

  56. Kibirige GW, Sanga C A survey on detection of sinkhole attacks in wireless sensor network. Int J Comput Sci Inf 13:20

    Google Scholar 

  57. Kaur P, Kaur N (2017) A hybrid approach to resolve Sinkhole attack in WSN using RAEED and ADOV protocols. Int J Adv Eng Res Dev 4:77

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shreya Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, S., Gupta, M., Sharma, D.K. (2024). Investigation of Sinkhole Attacks and Network Simulation on 6LoWPAN. In: Chaturvedi, A., Hasan, S.U., Roy, B.K., Tsaban, B. (eds) Cryptology and Network Security with Machine Learning. ICCNSML 2023. Lecture Notes in Networks and Systems, vol 918. Springer, Singapore. https://doi.org/10.1007/978-981-97-0641-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0641-9_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0640-2

  • Online ISBN: 978-981-97-0641-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics