Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses

被引:67
|
作者
Pu, Cong [1 ]
机构
[1] Marshall Univ, Dept Comp Sci & Elect Engn, Huntington, WV 25755 USA
关键词
Internet of Things; Routing protocols; Security; Wireless sensor networks; Analytical models; Routing; Indexes; Denial of Service (DoS); Gini index; Internet of Things (IoT); low-power and lossy networks (LLNs); RPL; sybil attack; ROUTING PROTOCOL; MITIGATION; POWER;
D O I
10.1109/JIOT.2020.2971463
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past few years, Internet of Things (IoT) has emerged as a promising paradigm that connects various physical devices to the Internet, and contributes to the development of countless next-generation applications. As a major enabler for IoT, IPv6-based low-power and lossy networks (LLNs) have been receiving considerable attention as a mature solution for scalable data collection in a ubiquitous computing and communication infrastructure. In order to provide efficient point-to-multipoint and multipoint-to-point communication, a novel routing protocol for LLNs, also well known as RPL, has been proposed and standardized. Nonetheless, due to devices' constraints on processing power, memory, and energy, and the lack of specific security models of the RPL routing protocol, LLNs become an ideal target for various security attacks. In this article, we propose a Gini index-based countermeasure, also called GINI, to effectively detect and mitigate sybil attack in RPL-based LLNs, where the malicious node multicasts an excessive number of DODAG information solicitation (DIS) messages with different fictitious identities to cause the legitimate nodes to restart the Trickle algorithm frequently and broadcast a large number of DODAG information object (DIO) messages to quickly drain the limited energy resource of legitimate nodes. We also present a simple analytical model and its numerical results in terms of detection rate. We evaluate the proposed GINI countermeasure through extensive simulation experiments using OMNeT++ and compare its performance with two existing schemes, SecRPL and two-step detection. The simulation results show that the proposed GINI countermeasure can not only improve the detection rate and detection latency but also reduce energy consumption, indicating a viable approach against sybil attack in the IoT. For continuous improvement and future research, we further discuss the proposed GINI countermeasure in terms of design features, design constraints, and possible extensions.
引用
收藏
页码:4937 / 4949
页数:13
相关论文
共 50 条
  • [41] A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case
    Bang, A. O.
    Rao, Udai Pratap
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (12): : 13703 - 13738
  • [42] A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things
    Al-Amiedy, Taief Alaa
    Anbar, Mohammed
    Belaton, Bahari
    Bahashwan, Abdullah Ahmed
    Hasbullah, Iznan Husainy
    Aladaileh, Mohammad Adnan
    AL Mukhaini, Ghada
    INTERNET OF THINGS, 2023, 22
  • [43] Analysis of Blackhole Attack in RPL-based 6LoWPAN Network: A Case Study
    Rajasekar, V. R.
    Rajkumar, S.
    2021 28TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS, AND SYSTEMS (IEEE ICECS 2021), 2021,
  • [44] Sybil Attack in IoT: Modelling and Defenses
    Rajan, Anjana
    Jithish, J.
    Sankaran, Sriram
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 2323 - 2327
  • [45] Exploring and mitigating hybrid rank attack in RPL-based IoT networks
    Rouissat, Mehdi
    Belkehir, Mohammed
    Mokaddem, Allel
    Bouziani, Merahi
    Alsukayti, Ibrahim Sulaiman
    JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2024, 75 (03): : 204 - 213
  • [46] RPL-based attack detection approaches in IoT networks: review and taxonomy
    Alfriehat, Nadia
    Anbar, Mohammed
    Aladaileh, Mohammed
    Hasbullah, Iznan
    Shurbaji, Tamarah A.
    Karuppayah, Shankar
    Almomani, Ammar
    ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (09)
  • [47] Trust Based Defence System for DDoS Attack Detection in RPL over Internet of Things
    Kiran, Vidhu
    Rani, Shaveta
    Singh, Paramjeet
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (12): : 239 - 245
  • [48] Evaluation of Sybil Attack Detection Approaches in the Internet of Things Content Dissemination
    Evangelista, Danilo
    Mezghani, Farouk
    Nogueira, Michele
    Santos, Aldri
    2016 WIRELESS DAYS (WD), 2016,
  • [49] The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things
    Verma, Abhishek
    Ranga, Virender
    COMPUTING, 2021, 103 (07) : 1479 - 1500
  • [50] The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things
    Abhishek Verma
    Virender Ranga
    Computing, 2021, 103 : 1479 - 1500