A Softwarized Intrusion Detection System for the RPL-based Internet of Things networks

被引:15
|
作者
Violettas, George [1 ]
Simoglou, George [1 ]
Petridou, Sophia [1 ]
Mamatas, Lefteris [1 ]
机构
[1] Univ Macedonia, Dept Appl Informat, Thessaloniki, Greece
关键词
Internet of Things; RPL protocol; RPL attacks; IoT security; Intrusion Detection System; SECURITY; PROTOCOLS; FUTURE; IDS;
D O I
10.1016/j.future.2021.07.013
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet of Things (IoT) constitutes a pivotal contributor to the Industry 4.0 (I 4.0) vision, technologically transforming production and societies. It enables novel services through the seamless integration of devices, such as motes carrying sensors, with the Internet. However, the broad adoption of IoT technologies is facing security issues due to the direct access to the devices from the Internet, the broadcasting nature of the wireless media, and the potential unattended operation of relevant deployments. In particular, the Routing over Low Power and Lossy Networks (RPL) protocol, a prominent IoT solution, is vulnerable to a large number of attacks, both of general-purpose and RPL-specific nature, while the resource-constraints of the corresponding devices are making attack mitigation even more challenging, e.g., in terms of involved control overhead and detection accuracy. In this paper, we introduce ASSET, a novel Intrusion Detection System (IDS) for RPL with diverse profiles to tackle the above issues that mitigate at least 13 attacks. At the same time, other solutions go up to eight. ASSET, inspired by the network softwarization paradigm, supports a novel, extendable workflow, bringing together three anomaly-detection and four RPL specification-based mechanisms, a novel attacker identification process, as well as multiple attack mitigation strategies. Our IDS also supports an adaptable control & monitoring protocol, trading overhead for accuracy, depending on the network conditions. The proof-of-concept experiments show that ASSET entails a low overhead for the different modes of operation it supports (i.e., 6.28 percent on average) compared to other solutions reaching up to 30 percent. At the same time, it also keeps the power consumption at acceptable levels (from 0.18 up to 1.54 percent more). Moreover, it provides 100 percent accuracy for specific attacks and can identify the attacker in far more attacks than any other similar solution. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:698 / 714
页数:17
相关论文
共 50 条
  • [1] A Central Intrusion Detection System for RPL-Based Industrial Internet of Things
    Aydogan, Emre
    Yilmaz, Selim
    Sen, Sevil
    Butun, Ismail
    Forsstrom, Stefan
    Gidlund, Mikael
    [J]. 2019 15TH IEEE INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS (WFCS), 2019,
  • [2] An Intrusion Detection System for RPL-Based IoT Networks
    Ribera, Eric Garcia
    Alvarez, Brian Martinez
    Samuel, Charisma
    Ioulianou, Philokypros P.
    Vassilakis, Vassilios G.
    [J]. ELECTRONICS, 2022, 11 (23)
  • [3] A taxonomy of attacks in RPL-based internet of things
    [J]. Mayzaud, Anthéa (anthea.mayzaud@inria.fr), 1600, Femto Technique Co., Ltd. (18):
  • [4] Detection of malicious packet dropping attacks in RPL-based internet of things
    Shin, Sooyeon
    Kim, Kyounghoon
    Kwon, Taekyoung
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2019, 31 (02) : 133 - 141
  • [5] A Lightweight Cooperative Intrusion Detection System for RPL-based IoT
    Azzaoui, Hanane
    Boukhamla, Akram Zine Eddine
    Perazzo, Pericle
    Alazab, Mamoun
    Ravi, Vinayakumar
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2024, 134 (04) : 2235 - 2258
  • [6] `An Optimized Approach for Intrusion Detection in Internet of Softwarized Things
    Gaba, Shivani
    Nehra, Anushka
    Budhiraja, Ishan
    Kumar, Vimal
    Singh, Aaisha Makkar
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS, ICC WORKSHOPS, 2023, : 648 - 653
  • [7] RPL-based Multipath Routing Protocols for Internet of Things on Wireless Sensor Networks
    Le, Quan
    Thu Ngo-Quynh
    Magedanz, Thomaz
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC), 2014, : 424 - 429
  • [8] Routing Attacks and Countermeasures in the RPL-Based Internet of Things
    Wallgren, Linus
    Raza, Shahid
    Voigt, Thiemo
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [9] Security Vulnerabilities and Countermeasures in the RPL-based Internet of Things
    Yang, Wei
    Wang, Yuan
    Lai, Zhixiang
    Wan, Yadong
    Cheng, Zhuo
    [J]. 2018 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC 2018), 2018, : 49 - 54
  • [10] EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things
    A. O. Bang
    Udai Pratap Rao
    [J]. Peer-to-Peer Networking and Applications, 2022, 15 : 642 - 665