Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses

被引:67
|
作者
Pu, Cong [1 ]
机构
[1] Marshall Univ, Dept Comp Sci & Elect Engn, Huntington, WV 25755 USA
关键词
Internet of Things; Routing protocols; Security; Wireless sensor networks; Analytical models; Routing; Indexes; Denial of Service (DoS); Gini index; Internet of Things (IoT); low-power and lossy networks (LLNs); RPL; sybil attack; ROUTING PROTOCOL; MITIGATION; POWER;
D O I
10.1109/JIOT.2020.2971463
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past few years, Internet of Things (IoT) has emerged as a promising paradigm that connects various physical devices to the Internet, and contributes to the development of countless next-generation applications. As a major enabler for IoT, IPv6-based low-power and lossy networks (LLNs) have been receiving considerable attention as a mature solution for scalable data collection in a ubiquitous computing and communication infrastructure. In order to provide efficient point-to-multipoint and multipoint-to-point communication, a novel routing protocol for LLNs, also well known as RPL, has been proposed and standardized. Nonetheless, due to devices' constraints on processing power, memory, and energy, and the lack of specific security models of the RPL routing protocol, LLNs become an ideal target for various security attacks. In this article, we propose a Gini index-based countermeasure, also called GINI, to effectively detect and mitigate sybil attack in RPL-based LLNs, where the malicious node multicasts an excessive number of DODAG information solicitation (DIS) messages with different fictitious identities to cause the legitimate nodes to restart the Trickle algorithm frequently and broadcast a large number of DODAG information object (DIO) messages to quickly drain the limited energy resource of legitimate nodes. We also present a simple analytical model and its numerical results in terms of detection rate. We evaluate the proposed GINI countermeasure through extensive simulation experiments using OMNeT++ and compare its performance with two existing schemes, SecRPL and two-step detection. The simulation results show that the proposed GINI countermeasure can not only improve the detection rate and detection latency but also reduce energy consumption, indicating a viable approach against sybil attack in the IoT. For continuous improvement and future research, we further discuss the proposed GINI countermeasure in terms of design features, design constraints, and possible extensions.
引用
收藏
页码:4937 / 4949
页数:13
相关论文
共 50 条
  • [21] Denial-of-Service Attacks and Countermeasures in the RPL-Based Internet of Things
    Ioulianou, Philokypros P.
    Vassilakis, Vassilios G.
    COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 374 - 390
  • [22] A Softwarized Intrusion Detection System for the RPL-based Internet of Things networks
    Violettas, George
    Simoglou, George
    Petridou, Sophia
    Mamatas, Lefteris
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 125 : 698 - 714
  • [23] Detection of malicious packet dropping attacks in RPL-based internet of things
    Shin, Sooyeon
    Kim, Kyounghoon
    Kwon, Taekyoung
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2019, 31 (02) : 133 - 141
  • [24] Securing RPL-Based Internet of Things applied for water pipeline monitoring
    Elleuchi, Manel
    Boujeleben, Manel
    Abid, Mohamed
    BenSaleh, Mohammed S.
    2017 25TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2017, : 404 - 410
  • [25] THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack
    Arshad, Danyal
    Asim, Muhammad
    Tariq, Noshina
    Baker, Thar
    Tawfik, Hissam
    Obe, Dhiya Al-Jumeily
    PLOS ONE, 2022, 17 (07):
  • [26] Replay attacks in RPL-based Internet of Things: Comparative and empirical study
    Albinali, Hussah
    Azzedin, Farag
    COMPUTER NETWORKS, 2025, 257
  • [27] An Anomaly-Based IDS for Detecting Attacks in RPL-Based Internet of Things
    Farzaneh, Behnam
    Montazeri, Mohammad Ali
    Jamali, Shahram
    2019 5TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2019, : 61 - 66
  • [28] RPL-based Multipath Routing Protocols for Internet of Things on Wireless Sensor Networks
    Le, Quan
    Thu Ngo-Quynh
    Magedanz, Thomaz
    2014 INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC), 2014, : 424 - 429
  • [29] Provenance-enabled packet path tracing in the RPL-based internet of things
    Suhail, Sabah
    Hussain, Rasheed
    Abdellatif, Mohammad
    Pandey, Shashi Raj
    Khan, Abid
    Hong, Choong Seon
    COMPUTER NETWORKS, 2020, 173
  • [30] An Information-Theoretic Approach for Anomaly Detection in RPL-Based Internet of Things
    La, Vinh Hoa
    de Oca, Edgardo Montes
    Cavalli, Ana
    INTERNET OF THINGS, IFIPIOT 2024, 2025, 737 : 96 - 111