Exploring and mitigating hybrid rank attack in RPL-based IoT networks

被引:1
|
作者
Rouissat, Mehdi [1 ,2 ]
Belkehir, Mohammed [3 ]
Mokaddem, Allel [3 ]
Bouziani, Merahi [4 ]
Alsukayti, Ibrahim Sulaiman [5 ]
机构
[1] Univ Ctr Nour Bachir, El Bayadh, Algeria
[2] Univ Abou Bekr Belkaid Tlemcen, STIC Lab, Tilimsen, Algeria
[3] Univ Ctr Nour Bachir, LIMA Lab, El Bayadh 32000, Algeria
[4] Univ Djillali Liabes Sidi Bel Abbes, LTTNS Labortory, Sidi Bel Abbes, Algeria
[5] Qassim Univ, Coll Comp, Dept Comp Sci, Buraydah 51452, Saudi Arabia
关键词
RPL; IoT; rank attack; security; Contiki; cooja; VERSION NUMBER ATTACKS;
D O I
10.2478/jee-2024-0025
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Despite the widespread adoption of the Routing Protocol for Low-power and Lossy Networks (RPL) in IoT environments, its inherent limitations in addressing security vulnerabilities have left IoT networks vulnerable to ongoing attacks. This paper introduces a novel intrusion detection system tailored specifically for IoT networks, with a focus on mitigating attacks at the network's edge. The study presents the Hybrid Rank Attack (HRA), a sophisticated threat exploiting RPL vulnerabilities by alternately advertising decreased and increased rank values in control messages. Extensive experimentation evaluates the detrimental effects of HRA on critical network metrics including exchanged messages, energy consumption, PDR, latency, and memory footprint. Additionally, a lightweight and distributed countermeasure algorithm is proposed to effectively mitigate the impact of HRA. Simulation-based evaluations demonstrate significant reductions in control overhead (68.7%) and energy consumption (61.83%), with minimal additional RAM utilization (1.05%). This lightweight solution enhances the resilience of RPL-based IoT networks against HRA threats.
引用
收藏
页码:204 / 213
页数:10
相关论文
共 50 条
  • [11] An Intrusion Detection System for RPL-Based IoT Networks
    Ribera, Eric Garcia
    Alvarez, Brian Martinez
    Samuel, Charisma
    Ioulianou, Philokypros P.
    Vassilakis, Vassilios G.
    ELECTRONICS, 2022, 11 (23)
  • [12] Classification of Intrusions in RPL-Based IoT Networks: A Comparison
    Nandhini, P. S.
    Kuppuswami, S.
    Malliga, S.
    MOBILE COMPUTING AND SUSTAINABLE INFORMATICS, 2022, 68 : 849 - 862
  • [13] THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack
    Arshad, Danyal
    Asim, Muhammad
    Tariq, Noshina
    Baker, Thar
    Tawfik, Hissam
    Obe, Dhiya Al-Jumeily
    PLOS ONE, 2022, 17 (07):
  • [14] Multicast DIS attack mitigation in RPL-based IoT-LLNs
    Medjek, Faiza
    Tandjaoui, Djamel
    Djedjig, Nabil
    Romdhani, Imed
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
  • [15] EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things
    A. O. Bang
    Udai Pratap Rao
    Peer-to-Peer Networking and Applications, 2022, 15 : 642 - 665
  • [16] Impact Analysis of Rank Attack on RPL-Based 6LoWPAN Networks in Internet of Things and Aftermaths
    Bang, Ankur
    Rao, Udai Pratap
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (02) : 2489 - 2505
  • [17] EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things
    Bang, A. O.
    Rao, Udai Pratap
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (01) : 642 - 665
  • [18] Impact Analysis of Rank Attack on RPL-Based 6LoWPAN Networks in Internet of Things and Aftermaths
    Ankur Bang
    Udai Pratap Rao
    Arabian Journal for Science and Engineering, 2023, 48 : 2489 - 2505
  • [19] Mitigating Forwarding Misbehaviors in RPL-based Low Power and Lossy Networks
    Pu, Cong
    Hajjar, Salam
    2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2018,
  • [20] IDS to Detect Worst Parent Selection Attack in RPL-Based IoT Network
    Kiran, Usha
    2022 14th International Conference on COMmunication Systems and NETworkS, COMSNETS 2022, 2022, : 769 - 773