The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks

被引:119
作者
Anhtuan Le [1 ]
Loo, Jonathan [1 ]
Lasebae, Aboubaker [1 ]
Vinel, Alexey [2 ,3 ]
Chen, Yue [4 ]
Chai, Michael [4 ]
机构
[1] Middlesex Univ, Sch Engn & Informat Sci, London NW4 4BT, England
[2] Tampere Univ Technol, Tampere 33720, Finland
[3] Halmstad Univ, S-30260 Halmstad, Sweden
[4] Queen Mary Univ London, Dept Elect Engn, London E1 4NS, England
基金
英国工程与自然科学研究理事会;
关键词
RPL; Rank attack; performance; security; internal threat;
D O I
10.1109/JSEN.2013.2266399
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Routing protocol for low power and lossy networks (RPL) is the underlying routing protocol of 6LoWPAN, a core communication standard for the Internet of Things. RPL outperforms other wireless sensor and ad hoc routing protocols in quality of service (QoS), device management, and energy saving performance. The Rank concept in RPL serves multiple purposes, including route optimization, prevention of loops, and managing control overhead. In this paper, we analyze several different types of internal threats that are aimed at the Rank property and study their impact on the performance of the wireless sensor network. Our analysis raises the question of an RPL weakness, which is the lack of a monitoring parent in every node. In RPL, the child node only receives the parent information through control messages, but it cannot check the services that its parent provide hence it will follow a bad quality route if it has a malicious parent. Our results show that different types of the Rank attacks can be used to intentionally downgrade specific QoS parameters. This paper also reveals that attack in a high forwarding load area will have more impact on network performance than attack in other areas. The defenders can use the knowledge of such correlation between attack location and its impact to set higher security levels at particular positions by monitoring sensitive network parameters and detecting the anomalies
引用
收藏
页码:3685 / 3692
页数:8
相关论文
共 7 条
[1]  
[Anonymous], 2011, 6LOWPAN WIRELESS EMB
[2]  
Brandt A., 2012, 6550 RFC
[3]  
Dvir A., 2011, 2011 IEEE 8th International Conference on Mobile Ad-Hoc and Sensor Systems, P709, DOI 10.1109/MASS.2011.76
[4]  
Kavitha T., 2010, J INF ASSUR SECUR, V5, P31
[5]   6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach [J].
Le, Anhtuan ;
Loo, Jonathan ;
Lasebae, Aboubaker ;
Aiash, Mahdi ;
Luo, Yuan .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (09) :1189-1212
[6]  
Shi E, 2004, IEEE WIREL COMMUN, V11, P38, DOI 10.1109/MWC.2004.1368895
[7]   Routing Loops in DAG-based Low Power and Lossy Networks [J].
Xie, W. ;
Goyal, M. ;
Hosseini, H. ;
Martocci, J. ;
Bashir, Y. ;
Baccelli, E. ;
Durresi, A. .
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, :888-895