Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses

被引:60
|
作者
Pu, Cong [1 ]
机构
[1] Marshall Univ, Dept Comp Sci & Elect Engn, Huntington, WV 25755 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2020年 / 7卷 / 06期
关键词
Internet of Things; Routing protocols; Security; Wireless sensor networks; Analytical models; Routing; Indexes; Denial of Service (DoS); Gini index; Internet of Things (IoT); low-power and lossy networks (LLNs); RPL; sybil attack; ROUTING PROTOCOL; MITIGATION; POWER;
D O I
10.1109/JIOT.2020.2971463
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past few years, Internet of Things (IoT) has emerged as a promising paradigm that connects various physical devices to the Internet, and contributes to the development of countless next-generation applications. As a major enabler for IoT, IPv6-based low-power and lossy networks (LLNs) have been receiving considerable attention as a mature solution for scalable data collection in a ubiquitous computing and communication infrastructure. In order to provide efficient point-to-multipoint and multipoint-to-point communication, a novel routing protocol for LLNs, also well known as RPL, has been proposed and standardized. Nonetheless, due to devices' constraints on processing power, memory, and energy, and the lack of specific security models of the RPL routing protocol, LLNs become an ideal target for various security attacks. In this article, we propose a Gini index-based countermeasure, also called GINI, to effectively detect and mitigate sybil attack in RPL-based LLNs, where the malicious node multicasts an excessive number of DODAG information solicitation (DIS) messages with different fictitious identities to cause the legitimate nodes to restart the Trickle algorithm frequently and broadcast a large number of DODAG information object (DIO) messages to quickly drain the limited energy resource of legitimate nodes. We also present a simple analytical model and its numerical results in terms of detection rate. We evaluate the proposed GINI countermeasure through extensive simulation experiments using OMNeT++ and compare its performance with two existing schemes, SecRPL and two-step detection. The simulation results show that the proposed GINI countermeasure can not only improve the detection rate and detection latency but also reduce energy consumption, indicating a viable approach against sybil attack in the IoT. For continuous improvement and future research, we further discuss the proposed GINI countermeasure in terms of design features, design constraints, and possible extensions.
引用
收藏
页码:4937 / 4949
页数:13
相关论文
共 50 条
  • [1] The DAO Induction Attack Against the RPL-based Internet of Things
    Baghani, Ahmad Shabani
    Rahimpour, Sonbol
    Khabbazian, Majid
    [J]. 2020 28TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2020, : 379 - 383
  • [2] Collaborative Detection and Prevention of Sybil Attacks against RPL-Based Internet of Things
    Khan, Muhammad Ali
    Bin Rais, Rao Naveed
    Khalid, Osman
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (01): : 827 - 843
  • [3] EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things
    A. O. Bang
    Udai Pratap Rao
    [J]. Peer-to-Peer Networking and Applications, 2022, 15 : 642 - 665
  • [4] EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things
    Bang, A. O.
    Rao, Udai Pratap
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (01) : 642 - 665
  • [5] Impact Analysis of Rank Attack on RPL-Based 6LoWPAN Networks in Internet of Things and Aftermaths
    Bang, Ankur
    Rao, Udai Pratap
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (02) : 2489 - 2505
  • [6] Impact Analysis of Rank Attack on RPL-Based 6LoWPAN Networks in Internet of Things and Aftermaths
    Ankur Bang
    Udai Pratap Rao
    [J]. Arabian Journal for Science and Engineering, 2023, 48 : 2489 - 2505
  • [7] Routing Attacks and Countermeasures in the RPL-Based Internet of Things
    Wallgren, Linus
    Raza, Shahid
    Voigt, Thiemo
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [8] Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
    Al-Sarawi, Shadi
    Anbar, Mohammed
    Alabsi, Basim Ahmad
    Aladaileh, Mohammad Adnan
    Rihan, Shaza Dawood Ahmed
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (01): : 491 - 515
  • [9] Security Vulnerabilities and Countermeasures in the RPL-based Internet of Things
    Yang, Wei
    Wang, Yuan
    Lai, Zhixiang
    Wan, Yadong
    Cheng, Zhuo
    [J]. 2018 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC 2018), 2018, : 49 - 54
  • [10] Load balancing for RPL-based Internet of Things: A review
    Pancaroglu, Doruk
    Sen, Sevil
    [J]. AD HOC NETWORKS, 2021, 116