Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP

The rapid growth of the Internet of Things (IoT) and the massive propagation of wireless technologies has revealed recent opportunities for development in various domains of real life, such as smart cities and E-Health applications. A slight defense against different forms of attack is offered for t...

Full description

Bibliographic Details
Main Authors: Zahrah A. Almusaylim, NZ Jhanjhi, Abdulaziz Alhumam
Format: Article
Language:English
Published: MDPI AG 2020-10-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/20/21/5997
_version_ 1797550093619953664
author Zahrah A. Almusaylim
NZ Jhanjhi
Abdulaziz Alhumam
author_facet Zahrah A. Almusaylim
NZ Jhanjhi
Abdulaziz Alhumam
author_sort Zahrah A. Almusaylim
collection DOAJ
description The rapid growth of the Internet of Things (IoT) and the massive propagation of wireless technologies has revealed recent opportunities for development in various domains of real life, such as smart cities and E-Health applications. A slight defense against different forms of attack is offered for the current secure and lightweight Routing Protocol for Low Power and Lossy Networks (RPL) of IoT resource-constrained devices. Data packets are highly likely to be exposed in transmission during data packet routing. The RPL rank and version number attacks, which are two forms of RPL attacks, can have critical consequences for RPL networks. The studies conducted on these attacks have several security defects and performance shortcomings. In this research, we propose a Secure RPL Routing Protocol (SRPL-RP) for rank and version number attacks. This mainly detects, mitigates, and isolates attacks in RPL networks. The detection is based on a comparison of the rank strategy. The mitigation uses threshold and attack status tables, and the isolation adds them to a blacklist table and alerts nodes to skip them. SRPL-RP supports diverse types of network topologies and is comprehensively analyzed with multiple studies, such as Standard RPL with Attacks, Sink-Based Intrusion Detection Systems (SBIDS), and RPL+Shield. The analysis results showed that the SRPL-RP achieved significant improvements with a Packet Delivery Ratio (PDR) of 98.48%, a control message value of 991 packets/s, and an average energy consumption of 1231.75 joules. SRPL-RP provided a better accuracy rate of 98.30% under the attacks.
first_indexed 2024-03-10T15:24:33Z
format Article
id doaj.art-5e542a8c27624b7cb6111cc2a856ec1c
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-10T15:24:33Z
publishDate 2020-10-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-5e542a8c27624b7cb6111cc2a856ec1c2023-11-20T18:12:17ZengMDPI AGSensors1424-82202020-10-012021599710.3390/s20215997Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RPZahrah A. Almusaylim0NZ Jhanjhi1Abdulaziz Alhumam2Department of Computer Science, College of Computer Science & IT, King Faisal University, 31982 Al-Hasa, Saudi ArabiaSchool of Computer Science and Engineering (SCE), Taylor’s University, Lakeside Campus, Subang Jaya 47500, MalaysiaDepartment of Computer Science, College of Computer Science & IT, King Faisal University, 31982 Al-Hasa, Saudi ArabiaThe rapid growth of the Internet of Things (IoT) and the massive propagation of wireless technologies has revealed recent opportunities for development in various domains of real life, such as smart cities and E-Health applications. A slight defense against different forms of attack is offered for the current secure and lightweight Routing Protocol for Low Power and Lossy Networks (RPL) of IoT resource-constrained devices. Data packets are highly likely to be exposed in transmission during data packet routing. The RPL rank and version number attacks, which are two forms of RPL attacks, can have critical consequences for RPL networks. The studies conducted on these attacks have several security defects and performance shortcomings. In this research, we propose a Secure RPL Routing Protocol (SRPL-RP) for rank and version number attacks. This mainly detects, mitigates, and isolates attacks in RPL networks. The detection is based on a comparison of the rank strategy. The mitigation uses threshold and attack status tables, and the isolation adds them to a blacklist table and alerts nodes to skip them. SRPL-RP supports diverse types of network topologies and is comprehensively analyzed with multiple studies, such as Standard RPL with Attacks, Sink-Based Intrusion Detection Systems (SBIDS), and RPL+Shield. The analysis results showed that the SRPL-RP achieved significant improvements with a Packet Delivery Ratio (PDR) of 98.48%, a control message value of 991 packets/s, and an average energy consumption of 1231.75 joules. SRPL-RP provided a better accuracy rate of 98.30% under the attacks.https://www.mdpi.com/1424-8220/20/21/5997IoTsecurityRPLrank attackversion number attack
spellingShingle Zahrah A. Almusaylim
NZ Jhanjhi
Abdulaziz Alhumam
Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP
Sensors
IoT
security
RPL
rank attack
version number attack
title Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP
title_full Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP
title_fullStr Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP
title_full_unstemmed Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP
title_short Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP
title_sort detection and mitigation of rpl rank and version number attacks in the internet of things srpl rp
topic IoT
security
RPL
rank attack
version number attack
url https://www.mdpi.com/1424-8220/20/21/5997
work_keys_str_mv AT zahrahaalmusaylim detectionandmitigationofrplrankandversionnumberattacksintheinternetofthingssrplrp
AT nzjhanjhi detectionandmitigationofrplrankandversionnumberattacksintheinternetofthingssrplrp
AT abdulazizalhumam detectionandmitigationofrplrankandversionnumberattacksintheinternetofthingssrplrp